咨询与建议

限定检索结果

文献类型

  • 661 篇 会议
  • 316 篇 期刊文献

馆藏范围

  • 977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 533 篇 工学
    • 402 篇 计算机科学与技术...
    • 340 篇 软件工程
    • 145 篇 信息与通信工程
    • 106 篇 电气工程
    • 66 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 36 篇 网络空间安全
    • 35 篇 机械工程
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 交通运输工程
    • 22 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 动力工程及工程热...
  • 237 篇 理学
    • 149 篇 数学
    • 48 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 18 篇 化学
  • 127 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 6 篇 经济学
  • 6 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 62 篇 semantics
  • 53 篇 computational mo...
  • 45 篇 data models
  • 42 篇 federated learni...
  • 42 篇 training
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 21 篇 benchmark testin...
  • 20 篇 object detection
  • 20 篇 data mining
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 39 篇 school of comput...
  • 39 篇 school of comput...
  • 38 篇 shandong fundame...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 21 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 17 篇 xi'an key labora...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 wang lei

语言

  • 877 篇 英文
  • 90 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
977 条 记 录,以下是521-530 订阅
排序:
NextSeg: Automatic COVID-19 Lung Infection Segmentation from CT Images Based on Next-ViT
NextSeg: Automatic COVID-19 Lung Infection Segmentation from...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Aimei Dong Ruixin Wang Xuening Zhang Jian Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The spread of COVID-19 has brought great disaster to the world, and automatic segmentation of the infected region can help doctors make a quick diagnosis and reduce workload. However, automatic segmentation of infecte... 详细信息
来源: 评论
Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems
Towards Black-Box Adversarial Attacks on Interpretable Deep ...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Zhan, Yike Zheng, Baolin Wang, Qian Mou, Ningping Guo, Binqing Li, Qi Shen, Chao Wang, Cong School of Cyber Science and Engineering Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Hubei China Institute of Network Sciences and Cyberspace BNRist Tsinghua University Beijing China School of Cyber Science and Engineering Xi'an Jiaotong University Shaanxi China City University of Hong Kong Departrnent of Computer Science Hong Kong Hong Kong
Recent works have empirically shown that neural network interpretability is susceptible to malicious manipulations. However, existing attacks against Interpretable Deep Learning Systems (IDLSes) all focus on the white... 详细信息
来源: 评论
Burst Sequence Based Graph Neural network for Video Traffic Identification
Burst Sequence Based Graph Neural Network for Video Traffic...
收藏 引用
15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024
作者: Xiong, Jian Bao, YingShuo Li, ShengBao Zhao, Kun Peng, LiZhi Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China Quancheng Laboratory Jinan China School of Cyber Security University of Chinese Academy of Sciences Beijing China Shandong Branch of National Computer Network Emergency Response Technical Team/Coordination Center of China Jinan China Inspur Computer Technology Co. Ltd. Jinan China
With the vigorous development of video applications and the comprehensive upgrade of encryption protocols, video content review is becoming increasingly difficult. As a practical solution, video traffic identific... 详细信息
来源: 评论
Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV networking
Blockchain-Based Identity Authentication Oriented to Multi-C...
收藏 引用
IEEE International Conference on Blockchain (Blockchain)
作者: Zesong Dong Wei Tong Zhiwei Zhang Jian Li Weidong Yang Yulong Shen Hangzhou Institute of Technology Xidian University Hangzhou China Shaanxi Key Laboratory of Network and System Security Xi’an China Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi’an China School of Computer Science and Technology Xidian University Xi’an China
Unmanned Aerial Vehicle (UAV) networking is increasingly used in field environments such as power inspection, agricultural plant protection, and emergency rescue. To guarantee UAV networking security, UAV identity aut...
来源: 评论
A Robust key Exchange and Tamper-Resistant Protocol for HAN and NAN networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area networks (HAN) and Neighborhood Area networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Provably Secure Efficient key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV networking
arXiv
收藏 引用
arXiv 2023年
作者: Dong, Zesong Tong, Wei Zhang, Zhiwei Li, Jian Yang, Weidong Shen, Yulong The Hangzhou Institute of Technology Xidian University Hangzhou China The School of Computer Science and Technology Xidian University Xi’an China The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi’an China Shaanxi Key Laboratory of Network and System Security Xi’an China
Unmanned Aerial Vehicle (UAV) networking is increasingly used in field environments such as power inspection, agricultural plant protection, and emergency rescue. To guarantee UAV networking security, UAV identity aut... 详细信息
来源: 评论
Spatio-temporal GNN-Based Cell-Free Massive MIMO network with Maximal Benefit-Cost Ratio
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Jiang, Jing Li, Yanni Ye, Yinghui Feng, Dan Zhang, Jiayi Sutthiphan, Worakrin Niyato, Dusit Xi'an Uni versity of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Beijing Jiaotong University Frontiers Science Center for Smart High-Speed Railway System Beijing100044 China National Telecommunication Public Company Mobile System Development Department Bangkok10210 Thailand Nanyang Technological University College of Computing and Data Science Singapore
Due to the network's rapid expansion, mobile networks bear extra high deployment costs. Being a key enabler of 6th generation (6G) mobile networks, it is crucial that cell-free massive MIMO (CF mMIMO) networks ach... 详细信息
来源: 评论
UAV-RIS-Aided Energy-Efficient and QoS-Aware Emergency Communications Based on DRL  100
UAV-RIS-Aided Energy-Efficient and QoS-Aware Emergency Commu...
收藏 引用
100th IEEE Vehicular technology Conference, VTC 2024-Fall
作者: Hu, Jiawei Ju, Ying Wang, Haoyu Liu, Lei Pei, Qingqi Shee, Y.G. Zhu, Xiaojie Wu, Celimuge University of California Department of Electrical Engineering and Computer Science IrvineCA92697 United States Xidian University Guangzhou Institute of Technology Guangzhou510555 China Xi'an University of Posts Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Universiti Tunku Abdul Rahman Department of Electrical and Electronic Engineering Kajang43000 Malaysia King Abdullah University of Science and Technology Department of Computer Electrical and Mathematical Sciences and Engineering Thuwal239556900 Saudi Arabia The University of Electro-Communications Graduate School of Informatics and Engineering Tokyo182-8585 Japan
Ensuring reliable communication can be incredibly challenging in emergencies due to the breakdown of conventional infrastructure. However, a promising solution is on the horizon: the integration of reconfigurable inte... 详细信息
来源: 评论
Channel Drop Out:A Simple Way to Prevent CNN from Overfitting in Motor Imagery Based BCI
Channel Drop Out:A Simple Way to Prevent CNN from Overfittin...
收藏 引用
2021国际计算机前沿大会
作者: Jing Luo Yaojie Wang Rong Xu Guangming Liu Xiaofan Wang Yijing Gong Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and EngineeringXi'an University of Technology Shaanxi Province Institute of Water Resources and Electric Power Investigation and Design
With the development of deep learning,many motor imagery brain-computer interfaces based on convolutional neural networks(CNNs) show outstanding ***,the trial number of EEG in the training set is usually limited,and r...
来源: 评论