咨询与建议

限定检索结果

文献类型

  • 661 篇 会议
  • 316 篇 期刊文献

馆藏范围

  • 977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 533 篇 工学
    • 402 篇 计算机科学与技术...
    • 340 篇 软件工程
    • 145 篇 信息与通信工程
    • 106 篇 电气工程
    • 66 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 36 篇 网络空间安全
    • 35 篇 机械工程
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 交通运输工程
    • 22 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 动力工程及工程热...
  • 237 篇 理学
    • 149 篇 数学
    • 48 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 18 篇 化学
  • 127 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 6 篇 经济学
  • 6 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 62 篇 semantics
  • 53 篇 computational mo...
  • 45 篇 data models
  • 42 篇 federated learni...
  • 42 篇 training
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 21 篇 benchmark testin...
  • 20 篇 object detection
  • 20 篇 data mining
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 39 篇 school of comput...
  • 39 篇 school of comput...
  • 38 篇 shandong fundame...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 21 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 17 篇 xi'an key labora...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 wang lei

语言

  • 877 篇 英文
  • 90 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
977 条 记 录,以下是481-490 订阅
排序:
A Driving Risk Prediction Approach Based on Generative Adversarial networks and VANET for Autonomous Trams
A Driving Risk Prediction Approach Based on Generative Adver...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Wenjiang Ji Jiangcheng Yang Yichuan Wang Lei Zhu Yuan Qiu Xinhong Hei College of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Driving safety is an essential prerequisite to the rapid development of autonomous trams. However, the relationship of driving risk factors is nonlinear, which makes modeling difficult. To improve the accuracy of driv... 详细信息
来源: 评论
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Mo...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xinhong Hei Hao Zhang Wenjiang Ji Yichuan Wang Lei Zhu Yuan Qiu College of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Risk prediction is one of the most important tasks in assistant and automatic driving. In recent years, by the help of VANET and various sensors in the cars, the status of cars and roads can be collected in real time ... 详细信息
来源: 评论
A fine-grained petri model for SQL time-blind injection
A fine-grained petri model for SQL time-blind injection
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Guiling Zhang Yaling Zhang Yichuan Wang Lei Zhu Wenjiang Ji School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
With the background of severe SQL injection attacks, the existing SQL injection modeling methods cannot reflect the process of SQL injection attacks in a fine-grained manner. Based on the discussion of attack technolo... 详细信息
来源: 评论
MGRR-SQL: Multi-Granularity Relevant Retrieval-Based in-Context Learning Approach for Text-to-SQL Generation
MGRR-SQL: Multi-Granularity Relevant Retrieval-Based in-Cont...
收藏 引用
Advanced Algorithms and Control Engineering (ICAACE), International Conference on
作者: Yiming Zhan Zhao Li Tong Chen Shiwei Wu Yang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Evay Info Technology Co. Ltd. Jinan China School of Cyberspace Security (School of Cryptology) Hainan University Haikou China
In-Context learning serves as a vital component for enhancing Text-to-SQL task performance. However, current in-context learning methodologies for Text-to-SQL applications fail to sufficiently bridge the significant c... 详细信息
来源: 评论
Stackelberg Game for Cognitive Ambient Backscatter network with Perfect and Imperfect Spectrum Sensing
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and networking 2025年
作者: Ning, Bing Dong, Yulei Li, Jianjun Ye, Yinghui Hao, Wanming Zhongyuan University of Technology School of Information and Communication Engineering Zhengzhou451191 China Xi’an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi’an710121 China Xidian University School of Telecommunication Engineering Xi’an710071 China Zhengzhou University School of Information Engineering Zhengzhou450001 China
The combination of cognitive radio and ambient backscatter communication can effectively improve spectrum utilization and reduce power consumption. However, when multiple backscatter devices coexist in this network, t... 详细信息
来源: 评论
Learning Fine-Grained Information Alignment for Calibrated Cross-Modal Retrieval
Learning Fine-Grained Information Alignment for Calibrated C...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jianhua Dong Shengrong Zhao Hu Liang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Masked Language Modeling (MLM) and Image-Text Matching (ITM) are always used in fusion encoder to learn the joint representation of images and text. In existing methods, the masking strategy of MLM leads to the neglec...
来源: 评论
HG-ETC: Fine-Grained Application Behaviors Classification From Encrypted network Traffic
HG-ETC: Fine-Grained Application Behaviors Classification Fr...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Weihua Liu Xiaohui Han Wenbo Zuo Yu Sun Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quancheng Provincial Laboratory Jinan China
The classification of encrypted traffic has garnered widespread attention from both researchers and industrial companies. However, existing application behavior-based encrypted traffic classification methods often ext... 详细信息
来源: 评论
A Knowledge Distillation-Driven Lightweight CNN Model for Detecting Malicious Encrypted network Traffic
A Knowledge Distillation-Driven Lightweight CNN Model for De...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yuecheng Wen Xiaohui Han Wenbo Zuo Weihua Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quancheng Provincial Laboratory Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the realm of cybersecurity, efficiently and precisely identifying and mitigating potential threats from malicious encrypted traffic is crucial. As deep learning evolves, methods relying on Convolutional Neural Netw... 详细信息
来源: 评论
Augmentation-Aware Self-Supervision for Data-Efficient GAN Training
arXiv
收藏 引用
arXiv 2022年
作者: Hou, Liang Cao, Qi Yuan, Yige Zhao, Songtao Ma, Chongyang Pan, Siyuan Wan, Pengfei Wang, Zhongyuan Shen, Huawei Cheng, Xueqi CAS Key Laboratory of AI Safety and Security Institute of Computing Technology Chinese Academy of Sciences China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Kuaishou Technology China
Training generative adversarial networks (GANs) with limited data is challenging because the discriminator is prone to overfitting. Previously proposed differentiable augmentation demonstrates improved data efficiency... 详细信息
来源: 评论
AMHF-TP: Multifunctional therapeutic peptides prediction based on multi-granularity hierarchical features
收藏 引用
Quantitative Biology 2025年 第1期 44-58页
作者: Shouheng Tuo YanLing Zhu Jiangkun Lin Jiewei Jiang School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an Key Laboratory of Big Data and Intelligent Computing School of Electronic Engineering Xi'an University of Posts and Telecommunications
Multifunctional therapeutic peptides(MFTP) hold immense potential in diverse therapeutic contexts, yet their prediction and identification remain challenging due to the limitations of traditional methodologies, such a...
来源: 评论