咨询与建议

限定检索结果

文献类型

  • 661 篇 会议
  • 316 篇 期刊文献

馆藏范围

  • 977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 533 篇 工学
    • 402 篇 计算机科学与技术...
    • 340 篇 软件工程
    • 145 篇 信息与通信工程
    • 106 篇 电气工程
    • 66 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 36 篇 网络空间安全
    • 35 篇 机械工程
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 交通运输工程
    • 22 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 动力工程及工程热...
  • 237 篇 理学
    • 149 篇 数学
    • 48 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 18 篇 化学
  • 127 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 6 篇 经济学
  • 6 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 62 篇 semantics
  • 53 篇 computational mo...
  • 45 篇 data models
  • 42 篇 federated learni...
  • 42 篇 training
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 21 篇 benchmark testin...
  • 20 篇 object detection
  • 20 篇 data mining
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 39 篇 school of comput...
  • 39 篇 school of comput...
  • 38 篇 shandong fundame...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 21 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 17 篇 xi'an key labora...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 wang lei

语言

  • 877 篇 英文
  • 90 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
977 条 记 录,以下是471-480 订阅
排序:
Species-Based Differential Evolution with Migration for Multimodal Optimization  14th
Species-Based Differential Evolution with Migration for Mult...
收藏 引用
14th International Conference on Bio-inspired computing: Theories and Applications, BIC-TA 2019
作者: Li, Wei Fan, Yaochi Jiang, Qiaoyong School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China
Due to the fact that many realistic problems are multimodal optimization problems (MMOPs), multimodal optimization has attracted a growing interest. In this paper, a Species-based differential evolution with migration... 详细信息
来源: 评论
Feature Aggregation network for Memory-Based Industrial Anomaly Detection
Feature Aggregation Network for Memory-Based Industrial Anom...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Min Li Delong Han Rui Shao Jinghui He Faculty of Data Science City University of Macau China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the process of large-scale industrial production, complex defects of different shapes and sizes can occur in industrial products and their components, and these defects seriously affect the performance of industria... 详细信息
来源: 评论
FAST: a dual-tier few-shot learning paradigm for whole slide image classification  24
FAST: a dual-tier few-shot learning paradigm for whole slide...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Kexue Fu Xiaoyuan Luo Linhao Qu Shuo Wang Ying Xiong Ilias Maglogiannis Longxiang Gao Manning Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China and Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Digital Medical Research Center School of Basic Medical Sciences Fudan University and Shanghai Key Lab of Medical Image Computing and Computer Assisted Intervention Fudan University University of Piraeus
The expensive fine-grained annotation and data scarcity have become the primary obstacles for the widespread adoption of deep learning-based Whole Slide Images (WSI) classification algorithms in clinical practice. Unl...
来源: 评论
A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in network Moving Target Defense  7
A Hybrid Routing Mutation Mechanism based on Mutation Cost a...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Guo, Kun Gao, Yibo Wang, Dongbin Zhi, Hui Zhang, Tao Lu, Yueming Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Cyberspace Security Research Center Peng Cheng Laboratory Beijing China Beijing University of Posts and Telecommunications National Engineering Laboratory for Mobile Network Beijing China TravelSky Technology Limited Beijing China China Academy of Launch Vehicle Technology Beijing China
network moving target defense technology can effectively defend against attacker monitoring of the service. The technology makes it more difficult for attackers to attack and can ensure secure communication for servic... 详细信息
来源: 评论
A Threshold-Free Random Access Preamble Detection Method Based on Joint Clustering for 6G NTN
A Threshold-Free Random Access Preamble Detection Method Bas...
收藏 引用
2021 IEEE Globecom Workshops, GC Wkshps 2021
作者: Zhen, Li Wang, Yue Sun, Teng Wang, Wenjing Yu, Keping Kharel, Rupak Xi'An University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Global Information and Telecommunication Institute Waseda University Tokyo Japan Manchester Metropolitan University Department of Computing and Mathematics United Kingdom
Thanks to its irreplaceable superiority in providing seamless coverage, satellite communication is expected to play an important role in supporting ubiquitous and continuous connectivity services for 6G wireless netwo... 详细信息
来源: 评论
Improved YOLOv5 Object Detection Method for Cervical Fluid Cell Pathological Image Detection
Improved YOLOv5 Object Detection Method for Cervical Fluid C...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Qingyan Ding Xuecheng Dong Na Li Yu Pan Wan Zheng Dept. Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Cervical liquid-based cell pathology image detection and recognition is a key task in gynecological pathology aimed at early detection of cervical precancerous lesions. In this study, a deep learning based method is p... 详细信息
来源: 评论
Trust Evaluation Model of Social Internet of Things Based on Multi-relationships
Trust Evaluation Model of Social Internet of Things Based on...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Fan, Fan Zhang, Hongbin Zhao, Dongmei Wang, Yanxia Liu, Bin Liu, Jian Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei Geological Workers' University Shijiazhuang China Hebei University of Science and Technology School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China
Trust plays a vital role in ensuring the security of the Social Internet of Things. Due to the increased mobility of intelligent devices, there are frequent interactions between machines and changes in social relation... 详细信息
来源: 评论
Task Offloading and Primary Node Selection in Blockchain, Digital Twin, and MEC Enabled Internet of Vehicles  100
Task Offloading and Primary Node Selection in Blockchain, Di...
收藏 引用
100th IEEE Vehicular technology Conference, VTC 2024-Fall
作者: Du, Jianbo Fang, Huifang Li, Shulei Du, Pengfei Kong, Ziwen Kang, Jiawen Niyato, Dusit Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security School of Communications and Information Engineering Xi'an China Xidian University School of Communications Engineering Xi'an710071 China Tianyuan Ruixin Communication Technology Co. LTD. Xi'an710071 China Xihua University Engineering Research Center of Intelligent Airground Integrated Vehicle and Traffic Control Ministry of Education Chengdu610039 China Guangdong University of Technology School of Automation China Nanyang Technological University School of Computer Science and Engineering Singapore
In this paper, we investigate the safe task offloading and primary node selection in blockchain, digital twin (DT) and Multi-access Edge computing (MEC) enabled Internet of Vehicles (IoV). Edge servers centers provide... 详细信息
来源: 评论
Few-shot Open Relation Extraction with Gaussian Prototype and Adaptive Margin
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Tianlin Zhang, Lingling Wang, Jiaxin Lei, Yunkuo Li, Yifei Wang, Haofen Liu, Jun School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi’an710049 China School of Computer Science and Technology Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi’an710049 China College of Design and Innovation Tongji University Shanghai200092 China
Few-shot relation extraction with none-of-the-above (FsRE with NOTA) aims at predicting labels in few-shot scenarios with unknown classes. FsRE with NOTA is more challenging than the conventional few-shot relation ext... 详细信息
来源: 评论
An Auto-Parallel Method for Deep Learning Models Based on Genetic Algorithm  29
An Auto-Parallel Method for Deep Learning Models Based on Ge...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zeng, Yan Huang, Chengchuang Ni, Yijie Zhou, Chunbao Zhang, Jilin Wang, Jue Zhou, Mingyao Xue, Meiting Zhang, Yunquan Hangzhou Dianzi University School of Computer Science and Technology Hangzhou310018 China Ministry of Education Key Laboratory for Modeling and Simulation of Complex Systems Hangzhou310018 China Data Security Governance Zhejiang Engineering Research Center Hangzhou310018 China Hangzhou Dianzi University School of ITMO Joint Institute Hangzhou310018 China Institute of Computer Network Information Center of the Chinese Academy of Sciences Beijing100086 China HuaWei China Institute of Computing Technology of the Chinese Academy of Sciences State Key Laboratory of Computer Architecture Beijing100086 China
As the size of datasets and neural network models increases, automatic parallelization methods for models have become a research hotspot in recent years. The existing auto-parallel methods based on machine learning or... 详细信息
来源: 评论