咨询与建议

限定检索结果

文献类型

  • 661 篇 会议
  • 316 篇 期刊文献

馆藏范围

  • 977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 533 篇 工学
    • 402 篇 计算机科学与技术...
    • 340 篇 软件工程
    • 145 篇 信息与通信工程
    • 106 篇 电气工程
    • 66 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 36 篇 网络空间安全
    • 35 篇 机械工程
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 交通运输工程
    • 22 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 动力工程及工程热...
  • 237 篇 理学
    • 149 篇 数学
    • 48 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 18 篇 化学
  • 127 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 6 篇 经济学
  • 6 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 62 篇 semantics
  • 53 篇 computational mo...
  • 45 篇 data models
  • 42 篇 federated learni...
  • 42 篇 training
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 21 篇 benchmark testin...
  • 20 篇 object detection
  • 20 篇 data mining
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 39 篇 school of comput...
  • 39 篇 school of comput...
  • 38 篇 shandong fundame...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 21 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 17 篇 xi'an key labora...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 wang lei

语言

  • 877 篇 英文
  • 90 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
977 条 记 录,以下是601-610 订阅
排序:
Cluster Caching Strategy Based on User Characteristics in Edge networks
Cluster Caching Strategy Based on User Characteristics in Ed...
收藏 引用
Asia-Pacific network Operations and Management Symposium (APNOMS)
作者: Ye Zhang Wei Zhang Hao Hao Kai Zhang Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
To meet the growing traffic demand and relieve the pressure on the core network, edge caching and device-to-device (D2D) communication are used in next generation mobile networks. In this paper, based on a three-way c...
来源: 评论
Job2Vec: A Self-Supervised Contrastive Learning Based HPC Job Power Consumption Prediction Framework
Job2Vec: A Self-Supervised Contrastive Learning Based HPC Jo...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Jie Zhang Jian Song Xiang Li Xuesen Tian Zhigang Zhao Lu Wu Chunxiao Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the context of the rapid development of big data and artificial intelligence, the field of HPC is facing significant challenges in energy consumption. To address this challenge, this paper proposes a power consumpt...
来源: 评论
Few-Shot Hyperspectral Image Classification Based on Cross-Domain Spectral Semantic Relation Transformer
Few-Shot Hyperspectral Image Classification Based on Cross-D...
收藏 引用
IEEE International Conference on Image Processing
作者: Mengxin Cao Guixin Zhao Aimei Dong Guohua Lv Ying Guo Xiangjun Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In practical hyperspectral image (HSI) classification tasks, we often encounter the problems of few-shot classification and domain misalignment between source domains and target domains. To solve this classification p...
来源: 评论
Cross Modal Sentiment Classification of Social Media Based on Meta Heuristic Algorithm
Cross Modal Sentiment Classification of Social Media Based o...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Wantong Du Wanli Min Yushui Geng Hu Liang Hehu Zhou Ministry of Education Shandong Computer Science Center Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Synthesis Electronic Technology Co. Ltd
The evolution of online social media has reshaped public behaviors, and social data infused with emotions provides crucial decision support for sentiment analysis tasks. Conventional multimodal approaches, influenced ... 详细信息
来源: 评论
Detecting Inconsistent Vulnerable Software Version in security Vulnerability Reports  1
收藏 引用
4th International Conference on Frontiers in Cyber security, FCS 2021
作者: Ren, Hansong Li, Xuejun Lei, Liao Ou, Guoliang Sun, Hongyu Wu, Gaofei Tian, Xiao Hu, Jinglu Zhang, Yuqing School of Cyber Engineering Xidian University Shaanxi Xian710126 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guangxi Guilin541010 China National Computer Network Intrusion Prevention Center University of Chinese Academy of Sciences Beijing100049 China School of Information Production and Systems Waseda University Tokyo169-805 Japan College of Computer and Cyberspace Security Hainan University Haikou570228 China
At present, the vulnerability database research has mainly focused on whether the disclosed information is accurate. However, the information differences between the various vulnerability databases have received littl... 详细信息
来源: 评论
A Lithium-Ion Battery Health State Assessment and Remaining Useful Life Prediction Method Based on Multi Slope Features
SSRN
收藏 引用
SSRN 2024年
作者: Chen, Gaige Zhong, Siqi Yang, Yahong Zhang, Xiaoshen Deng, Wei Liu, Jinsong School of Communications and Information Engineering School of Artificial Intelligence Xi’an University of Posts and Telecommunications Shaanxi Xi’an710121 China Shaanxi Union Research Center of University and Enterprise for 5G+ Industrial Internet Communication Terminal Technology Xi’an University of Posts and Telecommunications Shaanxi Xi’an710121 China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications Shaanxi Xi’an710121 China State Key Laboratory of Space Power Sources Shanghai Institute of Space Power-sources Shanghai200245 China Xi'an Aviation Brake Technology Co. Ltd Shaanxi Xi’an710065 China Contemporary Amperex Technology Co. Ltd. Fujian Ningde352107 China
In the field of battery management, accurately predicting the remaining useful life (RUL) of lithium-ion batteries is critical to guarding battery and device safety. However, current prediction methods are mainly base... 详细信息
来源: 评论
Detection method of trusted blockchain link flood attack based on trusted execution environment
Detection method of trusted blockchain link flood attack bas...
收藏 引用
Information technology: IoT and Smart City (ITIoTSC), International Conference on
作者: Ruixue Kuang Lianhai Wang Shuhui Zhang Shujiang Xu Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan Shandong China
In order to improve the detection accuracy and improve the detection speed, this paper designs a detection method of trusted blockchain link flood attack based on the trusted execution environment. First, above all, a... 详细信息
来源: 评论
Joint Secure and Covert Communications for Active STAR-RIS Assisted ISAC Systems
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Guo, Liang Jia, Jie Mu, Xidong Liu, Yuanwei Chen, Jian Wang, Xingwei Northeastern University School of Computer Science and Engineering China Northeastern University Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China BelfastBT3 9DT United Kingdom Department of Electrical and Electronic Engineering China
This paper investigates the design of jointly supporting physical layer security (PLS) and covert communications (CCs) in an active simultaneously transmitting and reflecting reconfigurable intelligent surface (a-STAR... 详细信息
来源: 评论
A Web Attack Detection Method Based on DistilBERT and Feature Fusion for Power Micro-Application Server
A Web Attack Detection Method Based on DistilBERT and Featur...
收藏 引用
Advanced Electronics, Electrical and Green Energy (AEEGE), International Conference on
作者: Li Nige Chen Lu Zhao Lei Teng Zhenning Wang Zhiqiang Shao Yiyang Gui Xiaolin State Grid Smart Grid Research Institute Co. Ltd. State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology Nanjing China Shaanxi Province Key Laboratory of Computer Network Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China
The widespread use of power micro-applications has significantly expanded the attack surface of their server side, thus increasing the risk of vulnerability attacks such as SQL injection, XSS, and CRLF injection. To e...
来源: 评论
A Study on a Reduced Indicator System for the network security Situational Assessment Model
A Study on a Reduced Indicator System for the Network Securi...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Hongbin Zhang Yikang Bai Dongmei Zhao Bin Liu Ying Xu Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang China School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China
It is a challenge to monitor the network security state in a large-scale network environment because the selection of situation assessment indicators is overrun by massive observational information. To address this is...
来源: 评论