咨询与建议

限定检索结果

文献类型

  • 661 篇 会议
  • 316 篇 期刊文献

馆藏范围

  • 977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 533 篇 工学
    • 402 篇 计算机科学与技术...
    • 340 篇 软件工程
    • 145 篇 信息与通信工程
    • 106 篇 电气工程
    • 66 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 36 篇 网络空间安全
    • 35 篇 机械工程
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 交通运输工程
    • 22 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 动力工程及工程热...
  • 237 篇 理学
    • 149 篇 数学
    • 48 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 18 篇 化学
  • 127 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 6 篇 经济学
  • 6 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 62 篇 semantics
  • 53 篇 computational mo...
  • 45 篇 data models
  • 42 篇 federated learni...
  • 42 篇 training
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 21 篇 benchmark testin...
  • 20 篇 object detection
  • 20 篇 data mining
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 39 篇 school of comput...
  • 39 篇 school of comput...
  • 38 篇 shandong fundame...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 21 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 17 篇 xi'an key labora...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 wang lei

语言

  • 877 篇 英文
  • 90 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
977 条 记 录,以下是501-510 订阅
排序:
A Low-rank Matching Attention based Cross-modal Feature Fusion Method for Conversational Emotion Recognition
arXiv
收藏 引用
arXiv 2023年
作者: Shou, Yuntao Liu, Huan Cao, Xiangyong Meng, Deyu Dong, Bo School of Computer Science and Technology The Ministry of Education Key Laboratory for Intelligent Networks and Network Security The Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong Shaanxi Xi’an710049 China School of Computer Science and Technology Xi’an Jiaotong Shaanxi Xi’an710049 China The BigKE Joint Innovation Center SHMEEA Shanghai China School of Mathematics and Statistics Xi’an Jiaotong University Xi’an China
Conversational emotion recognition (CER) is an important research topic in human-computer interactions. Although recent advancements in transformer-based cross-modal fusion methods have shown promise in CER tasks, the... 详细信息
来源: 评论
The security and Privacy of Mobile Edge computing: An Artificial Intelligence Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Cheng Yuan, Zenghui Zhou, Pan Xu, Zichuan Li, Ruixuan Wu, Dapeng Oliver Hubei Engineering Research Center on Big Data Security Key Laboratory of Distributed System Security of Hubei Province School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Software The Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian University of Technology Dalian116024 China Intelligent and Distributed Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong
Mobile Edge computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network’s edge. By shifting the load of cloud computing to individu... 详细信息
来源: 评论
Aerial intelligent reflecting surface for secure wireless networks:Secrecy capacity and optimal trajectory strategy
收藏 引用
Intelligent and Converged networks 2022年 第1期3卷 119-133页
作者: Hehao Niu Zheng Chu Zhengyu Zhu Fuhui Zhou Institute of Electronic Countermeasure National University of Defense TechnologyHefei 230037China. Institute for Communication Systems University of SurreyGuildfordGU27XHUK Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts&TelecommunicationsXi’an 710121China School of Information Engineering Zhengzhou UniversityZhengzhou 450001China College of Electronic and Information Engineering Nanjing University of Aeronautics and Astronauticsand also with the Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum SpaceNanjing University of Aeronautics and AstronauticsNanjing 210000China.
This work investigates the potential of the aerial intelligent reflecting surface(AIRS)in secure communication,where an intelligent reflecting surface(IRS)carried by an unmanned aerial vehicle(UAV)is utilized to help ... 详细信息
来源: 评论
Outage Performance of Relay-Assisted Mutualistic Backscatter Communications Under Energy-Causality Constraint
收藏 引用
IEEE Transactions on Communications 2024年
作者: Ye, Yinghui Tian, Yujia Chu, Xiaoli Sun, Sumei Lu, Guangyue Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Shangqiu Branch of China Mobile Communications Corporation Shangqiu476000 China The University of Sheffield Department of Electronic and Electrical Engineering United Kingdom Agency for Science Technology and Research Institute for Infocomm Research Singapore
Existing works on mutualistic backscatter communications (MBC) rely on the existence of direct links connecting both the primary user (PU) and the backscatter device (BD) to the destination node (D), rendering them in... 详细信息
来源: 评论
BEW-YOLO: An Improved Method for PCB Defect Detection Based on YOLOv7
BEW-YOLO: An Improved Method for PCB Defect Detection Based ...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Zhiyao Li Aimin Li Yuechen Zhang Xiaotong Kong Wenqiang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The PCB defect object size is small and the detection process is susceptible to background interference, usually have the problem of missed and false detection. In order to solve the above problems, an improved method...
来源: 评论
Filter-Enhanced Hypergraph Transformer for Multi-Behavior Sequential Recommendation
Filter-Enhanced Hypergraph Transformer for Multi-Behavior Se...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhufeng Shao Shoujin Wang Wenpeng Lu Weiyu Zhang Hongjiao Guan Long Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Data Science Institute University of Technology Sydney Sydney Australia
Sequential recommendation has been developed to predict the next item in which users are most interested by capturing user behavior patterns embedded in their historical interaction sequences. However, most existing m...
来源: 评论
A SUPERVISED INFORMATION ENHANCED MULTI-GRANULARITY CONTRASTIVE LEARNING FRAMEWORK FOR EEG BASED EMOTION RECOGNITION
arXiv
收藏 引用
arXiv 2024年
作者: Li, Xiang Song, Jian Zhao, Zhigang Wang, Chunxiao Song, Dawei Hu, Bin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Institute of Engineering Medicine Beijing Institute of Technology Beijing China
This study introduces a novel Supervised Info-enhanced Contrastive Learning framework for EEG based Emotion Recognition (SI-CLEER). SI-CLEER employs multi-granularity contrastive learning to create robust EEG contextu... 详细信息
来源: 评论
SGD-YOLOv5: A Small Object Detection Model for Complex Industrial Environments
SGD-YOLOv5: A Small Object Detection Model for Complex Indus...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Jiabin Pei Xiaoming Wu Xiangzhi Liu Longxiang Gao Shui Yu Xi Zheng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science University of Technology Sydney Sydney Australia Macquarie University Sydney Australia
Due to the complexity of industrial environments, such as construction sites and production workshops, the objects to be detected are easily occluded and perceived as small objects, which poses certain challenges for ... 详细信息
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
From Data Integrity to Global ModeI Integrity for Decentralized Federated Learning: A Blockchain-based Approach
From Data Integrity to Global ModeI Integrity for Decentrali...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Na Wang Yao Zhao Youyang Qu Lei Cui Bai Li Longxiang Gao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of IT Deakin University VIC Australia Zhejiang Tianheng Information Technology Company China
Decentralized Federated Learning (DFL) is extensively applied in various areas, e.g., healthcare, finance, and Internet of Things (loT), offering practical solutions for distributed intelligent applications and data c... 详细信息
来源: 评论