咨询与建议

限定检索结果

文献类型

  • 659 篇 会议
  • 310 篇 期刊文献

馆藏范围

  • 969 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 525 篇 工学
    • 395 篇 计算机科学与技术...
    • 337 篇 软件工程
    • 141 篇 信息与通信工程
    • 107 篇 电气工程
    • 59 篇 控制科学与工程
    • 53 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 35 篇 机械工程
    • 34 篇 网络空间安全
    • 28 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 25 篇 交通运输工程
    • 25 篇 安全科学与工程
    • 22 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 11 篇 动力工程及工程热...
    • 11 篇 土木工程
  • 238 篇 理学
    • 149 篇 数学
    • 50 篇 统计学(可授理学、...
    • 47 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 17 篇 化学
  • 125 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 67 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 7 篇 教育学
  • 6 篇 经济学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 90 篇 feature extracti...
  • 72 篇 accuracy
  • 62 篇 semantics
  • 53 篇 computational mo...
  • 45 篇 data models
  • 42 篇 training
  • 41 篇 federated learni...
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 21 篇 benchmark testin...
  • 20 篇 object detection
  • 20 篇 data mining
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 227 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 39 篇 school of comput...
  • 38 篇 shandong fundame...
  • 38 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 24 篇 shandong provinc...
  • 21 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 17 篇 xi'an key labora...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 wang lei

语言

  • 876 篇 英文
  • 83 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
969 条 记 录,以下是411-420 订阅
排序:
Workflow Scheduling Method in Multi-Cluster Environments Using Tasks' Spatiotemporal Attributes
Workflow Scheduling Method in Multi-Cluster Environments Usi...
收藏 引用
Electronic Information Engineering and Computer Communication (EIECC), International Conference on
作者: Yudong Geng Jing Chen Honghua Yan Qingshui Hao Aimin Zhang Tianxiang Zhang Mingchao Ji Tonglin Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Greenthink Electric Power Technology Co. Ltd Jinan China
Nowadays, computing resources are widely distributed and diverse, and the demand for efficient execution of various workflow tasks on wide-area resources has been raised. multi-objection scheduling method based on spa... 详细信息
来源: 评论
network Situation Awareness Model Based on Incomplete Information Game  5th
Network Situation Awareness Model Based on Incomplete Inform...
收藏 引用
5th International Conference on security and Privacy in New computing Environments, SPNCE 2022
作者: Zhang, Hongbin Yin, Yan Zhao, Dongmei Liu, Bin Wang, Yanxia Liu, Zhen School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050000 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Science and Technology Shijiazhuang050000 China Hebei Geological Workers’ University Shijiazhuang050081 China
Game theory has been widely used in network security situational awareness. However, most of the currently proposed game-based offensive and defensive situational awareness methods are for traffic data, and there are ... 详细信息
来源: 评论
CRS-Diff: Controllable Remote Sensing Image Generation with Diffusion Model
arXiv
收藏 引用
arXiv 2024年
作者: Tang, Datao Cao, Xiangyong Hou, Xingsong Jiang, Zhongyuan Liu, Junmin Meng, Deyu The School of Computer Science and Technology the Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China The School of Information and Communications Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The School of Cyber Engineering Xidian University Shaanxi Xi’an710049 China The School of Mathematics and Statistics the Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China Guangdong Guangzhou510555 China
The emergence of generative models has revolutionized the field of remote sensing (RS) image generation. Despite generating high-quality images, existing methods are limited in relying mainly on text control condition... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural networks
arXiv
收藏 引用
arXiv 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China University of Kent CanterburyCT2 7NP United Kingdom Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China Intelligent Transportation Systems Lab Innopolis University Innopolis Russia School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi’an710071 China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
Safe and Reliable Diffusion Models via Subspace Projection
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Huiqiang Zhu, Tianqing Wang, Linlin Yu, Xin Gao, Longxiang Zhou, Wanlei Faculty of Data Science City University of Macau China School of Computer Science University of Queensland QLD Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Large-scale text-to-image (T2I) diffusion models have revolutionized image generation, enabling the synthesis of highly detailed visuals from textual descriptions. However, these models may inadvertently generate inap... 详细信息
来源: 评论
CoG-DQA: Chain-of-Guiding Learning with Large Language Models for Diagram Question Answering
CoG-DQA: Chain-of-Guiding Learning with Large Language Model...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Shaowei Wang Lingling Zhang Longji Zhu Tao Qin Kim-Hui Yap Xinyu Zhang Jun Liu School of Computer Science and Technology Xi'an Jiaotong University China Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Ministry of Education Xi'an Shaanxi China School of Electrical & Electronic Engineering Nanyang Technological University Singapore
Diagram Question Answering (DQA) is a challenging task, requiring models to answer natural language questions based on visual diagram contexts. It serves as a crucial basis for academic tutoring, technical support, an... 详细信息
来源: 评论
SML: A Backdoor Defense for Non-Intrusive Speech Quality Assessment via Semi-Supervised and Multi-Task Learning
SML: A Backdoor Defense for Non-Intrusive Speech Quality Ass...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Ying Ren Wenjie Zhang Jiahong Ye Jie Li Diqun Yan Bin Ma Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China College of Digital Technology and Engineering Ningbo University of Finance and Economics Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Non-intrusive speech quality assessment (NISQA) is widely used in speech downstream tasks due to its ability to predict the quality of speech without a reference speech. However, few researchers have focused on the ba... 详细信息
来源: 评论
Neural network-Based Safety Optimization Control for Constrained Discrete-Time Systems
Neural Network-Based Safety Optimization Control for Constra...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Xueli Wang Shangwei Zhao Ming Yang Xiaoming Wu Xin Wang Shuo Xu Xu Hu Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Qilu University of Technology Jinan China Department of Automation Shanghai Jiao Tong University Shanghai China Public Security Bureau of Jinan Jinan China
This paper proposes a constraint-aware safety control approach via adaptive dynamic programming (ADP) to address the control optimization issues for discrete-time systems subjected to state constraints. First, the con...
来源: 评论
Interoperability Solution for Blockchain-Based Internet of Vehicles Driven by Multiple Oracles
Interoperability Solution for Blockchain-Based Internet of V...
收藏 引用
International Conference on Intelligent Transportation
作者: Wei Tong Ce Shen Zesong Dong Jian Li Hangzhou Institute of Technology Xidian University Hangzhou China Shaanxi Key Laboratory of Network and System Security Xi'an China Hangzhou Huaxin Mechanical & Electrical Engineering Co. Ltd Hangzhou China
The increasing blockchain-based Internet of Vehicles (BIoV) networks attract attention, and there is little cross-chain data interaction solution in this scenario yet. Due to the limited data amount and types, BIoV ne...
来源: 评论
Recommendation Model Based on Social Homogeneity Factor and Social Influence Factor  17th
Recommendation Model Based on Social Homogeneity Factor and ...
收藏 引用
17th EAI International Conference on Collaborative computing: networking, Applications, and Worksharing, CollaborateCom 2021
作者: Ying, Weizhi Yu, Qing Wang, Zuohua Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin300384 China China Everbright Bank CO. LTD. Beijing100035 China
In recent years, more and more recommendation algorithms incorporate social information. However, most social recommendation algorithms often only consider the social homogeneity factor between users and do not consid... 详细信息
来源: 评论