咨询与建议

限定检索结果

文献类型

  • 661 篇 会议
  • 316 篇 期刊文献

馆藏范围

  • 977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 533 篇 工学
    • 402 篇 计算机科学与技术...
    • 340 篇 软件工程
    • 145 篇 信息与通信工程
    • 106 篇 电气工程
    • 66 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 36 篇 网络空间安全
    • 35 篇 机械工程
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 交通运输工程
    • 22 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 动力工程及工程热...
  • 237 篇 理学
    • 149 篇 数学
    • 48 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 18 篇 化学
  • 127 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 6 篇 经济学
  • 6 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 62 篇 semantics
  • 53 篇 computational mo...
  • 45 篇 data models
  • 42 篇 federated learni...
  • 42 篇 training
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 21 篇 benchmark testin...
  • 20 篇 object detection
  • 20 篇 data mining
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 39 篇 school of comput...
  • 39 篇 school of comput...
  • 38 篇 shandong fundame...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 21 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 17 篇 xi'an key labora...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 wang lei

语言

  • 877 篇 英文
  • 90 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
977 条 记 录,以下是421-430 订阅
排序:
RobustPFL: Robust Personalized Federated Learning
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Chen, Guorong Wang, Wei Wu, Yufang Li, Chao Xu, Guangquan Ji, Shouling Li, Tao Shen, Meng Han, Yufei Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China Beijing Jiaotong University 3 Shangyuancun Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University Tianjin Key Laboratory of Advanced Networking College of Intelligence and Computing Tianjin300350 China Zhejiang University College of Computer Science and Technology Hangzhou310027 China ITAI Haihe Lab Tianjin China Nankai University College of Computer Science Tianjin300350 China Beijing Institute of Technology School of Cyberspace Security Beijing100081 China Peng Cheng Laboratory Cyberspace Security Research Center Shenzhen518066 China INRIA Bretagne Rennes35042 France
Conventional federated learning (FL) coordinated by a central server focuses on training a global model and protecting the privacy of clients' training data by storing it locally. However, the statistical heteroge... 详细信息
来源: 评论
A Nature-Inspired Energy-Efficient Clustering Protocol Based on Improved Hybrid Grey Wolf Optimization for FANETs
A Nature-Inspired Energy-Efficient Clustering Protocol Based...
收藏 引用
IEEE International Conference on Electronics and Communication Engineering (ICECE)
作者: Mengying Xu Yunxiao Zu Jie Zhou Jiapeng Dai Jing Chen Meiru Liu School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing China Xinjiang Production and Construction Corps Key Laboratory of Computing Intelligence and Network Information Security Shihezi China Department of Information Science and Technology Shihezi University Shihezi China
Flying ad hoc networks (FANETs) are composed of multiple UA V nodes that are distributed across a wide area and linked via wireless communication to gather and transmit environmental data. However, the battery-powered... 详细信息
来源: 评论
Multi-Channel Hypergraph Convolution Group Recommendation with Member Information Enhancement  25
Multi-Channel Hypergraph Convolution Group Recommendation wi...
收藏 引用
25th IEEE International Conferences on High Performance computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Chen, Tianhao Gao, Qian Fan, Jun Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Jinan250014 China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Shandong Jinan250353 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Shandong Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd Shandong Jinan250101 China
Group recommendation involves comprehensively considering various aspects, including members and items, to predict the overall interests of a group and recommend suitable items through a recommendation system. With th... 详细信息
来源: 评论
An Early Detection Model of Prostate Cancer Based on MRI  9
An Early Detection Model of Prostate Cancer Based on MRI
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Liu, Yuankun Xing, Lumin Wang, Di Nie, Xin Zhang, Xueyan Wu, Di Liu, Wenjian The First Affiliated Hospital of Shandong First Medical University Shandong Provincial Qianfoshan Hospital Jinan China City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Chongqing Jianzhu College Chongqing China Shandong Youth University of Political Science School of Information Work Office Jinan China University of Southern Queensland School of Mathematics Physics and Computing QLD Australia
Prostate cancer is a prevalent form of cancer among men, with a high rate of occurrence but relatively lower mortality compared to other types of cancer. Early detection is crucial because it allows for earlier interv... 详细信息
来源: 评论
Using Depth-Enhanced Spatial Transformation for Student Gaze Target Estimation in Dual-View Classroom Images
Using Depth-Enhanced Spatial Transformation for Student Gaze...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haonan Miao Peizheng Zhao Yuqi Sun Fang Nan Xiaolong Zhang Yaqiang Wu Feng Tian School of Computer Science and Technology Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Advanced Technology Xi’an Jiaotong-Liverpool University Suzhou China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an China
Dual-view gaze target estimation in classroom environments has not been thoroughly explored. Existing methods lack consideration of depth information, primarily focusing on 2D image information and neglecting the late... 详细信息
来源: 评论
RKSeg+: make full use of Runge–Kutta methods in medical image segmentation
收藏 引用
Multimedia Systems 2024年 第2期30卷 65-65页
作者: Zhu, Mai Fu, Chong Wang, Xingwei School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang110819 China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China
The dynamical system perspective has been used to build efficient image classification networks and semantic segmentation networks. Furthermore, the Runge–Kutta (RK) methods are powerful tools for building networks f... 详细信息
来源: 评论
EeCA: A Novel Approach for Energy Conservation in MEC via NDN-Based Content Caching
EeCA: A Novel Approach for Energy Conservation in MEC via ND...
收藏 引用
Asia-Pacific network Operations and Management Symposium (APNOMS)
作者: Jiaxin Xu Huiling Shi Haoxiang Chu Wei Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
In the context of escalating demands on wireless networks owing to the widespread application of 5G and the Internet of Things (IoT), enhancing network performance and user experience through the convergence of Multi-...
来源: 评论
Social Internet of Tings Trust Management Based on Implicit Social Relationship  5th
Social Internet of Tings Trust Management Based on Implicit ...
收藏 引用
5th International Conference on security and Privacy in New computing Environments, SPNCE 2022
作者: Zhang, Hongbin Fan, Fan Zhao, Dongmei Liu, Bin Wang, Yanxia Liu, Jian School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050000 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Science Shijiazhuang China Hebei Geological Workers’ University Shijiazhuang050081 China
The "Social Internet of Things (SIoT)" is a combination of the Internet of Things (IoT) and social networks to form a new paradigm. The SIoT promotes the development of smart cities, smart transportation, an... 详细信息
来源: 评论
Optimizing Resource Utilization in Consumer Electronics networks Through an Enhanced Grey Wolf Optimization Algorithm With UAV Collaboration
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Yang, Xiaoteng Feng, Jie Liu, Lei Pei, Qingqi Xidian University School of Telecommunications Engineering Xi’an 710071 China Xidian University Guangzhou Institute of Technology Guangzhou 510555 China Xidian University State Key Laboratory of Integrated Services Network the Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an 710071 China
With the continuous advancement of electronic technology, consumer electronic devices (CEs) have become indispensable to people’s daily lives. However, with the increasing complexity of device functions and the rapid... 详细信息
来源: 评论
On Covert Communication Performance with Outdated CSI in Wireless Greedy Relay Systems
On Covert Communication Performance with Outdated CSI in Wir...
收藏 引用
作者: Bai, Jiaqing He, Ji Chen, Yanping Shen, Yulong Jiang, Xiaohong Future University Hakodate School of System Information Science Hakodate041-8655 Japan School of Computer Science and Technology Xidian University Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xi'an710071 China Department of Computer Science and Technology Xi'An University of Posts and Telecommunications Xi'an710121 China
Communication performance relies largely on the availability of channel state information (CSI). This paper investigates the impact of outdated CSI on the achievable covert communication performance in a two-hop wirel... 详细信息
来源: 评论