咨询与建议

限定检索结果

文献类型

  • 649 篇 会议
  • 298 篇 期刊文献

馆藏范围

  • 947 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 506 篇 工学
    • 380 篇 计算机科学与技术...
    • 328 篇 软件工程
    • 136 篇 信息与通信工程
    • 101 篇 电气工程
    • 57 篇 控制科学与工程
    • 51 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 34 篇 机械工程
    • 33 篇 网络空间安全
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 25 篇 安全科学与工程
    • 23 篇 仪器科学与技术
    • 22 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 建筑学
  • 231 篇 理学
    • 146 篇 数学
    • 49 篇 统计学(可授理学、...
    • 44 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 16 篇 化学
  • 123 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 7 篇 经济学
  • 6 篇 军事学
  • 5 篇 教育学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 62 篇 semantics
  • 53 篇 computational mo...
  • 45 篇 data models
  • 43 篇 training
  • 41 篇 federated learni...
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 21 篇 benchmark testin...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 visualization
  • 19 篇 speech processin...
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 223 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 22 篇 school of comput...
  • 22 篇 shandong provinc...
  • 18 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 17 篇 xi'an key labora...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 13 篇 key laboratory o...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 17 篇 shen yulong
  • 17 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 xiaohui han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 lu wenpeng
  • 11 篇 jing zhao
  • 11 篇 chen yanping

语言

  • 882 篇 英文
  • 55 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
947 条 记 录,以下是61-70 订阅
排序:
Formal Modeling and Defense Methods for 5G network Endpoint Access Denial of Service Attacks
Formal Modeling and Defense Methods for 5G Network Endpoint ...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Tong Wei, Wei Wang, Yichuan Deng, Xi Zhu, Lei Ji, Wenjiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China School of Computer Science Xi'an Shiyou University Xi'an China
5G terminal access denial-of-service attack is one of the more common types of 5G signaling network attacks. It manifests itself as a large number of abnormal access requests occupying core network resources. Normal r... 详细信息
来源: 评论
Activity Recognition Method Based on Kernel Supervised Laplacian Eigenmaps
Activity Recognition Method Based on Kernel Supervised Lapla...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Pengjia Tu Cheng Tian Dandan Du Junhuai Li Huaijun Wang School of Computer Science and Engineering Xi’an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
Laplacian dimensionality reduction can effectively achieve feature transformation and preserve the important structure of high-dimensional features. However, the trained model with this method usually require better g...
来源: 评论
A Gradient-Guided Method for Hyperspectral Band Selection Based on Spatial-Spectral Weighting
A Gradient-Guided Method for Hyperspectral Band Selection Ba...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Jing Hu Ke Lit Yunfei Ju Minghua Zhao Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China
Hyperspectral image(HSI) band selection is a crucial task in image processing. It is necessary to screen out bands with rich information and low correlation, to achieve data dimensionality reduction and retain key inf... 详细信息
来源: 评论
Hyperspectral Band Selection Based on Classification Reward Adjustment
Hyperspectral Band Selection Based on Classification Reward ...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Jing Hu Jiawei Liang Yunfei Ju Minghua Zhao Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China
Hyperspectral image band selection is a crucial link in image processing. It is necessary to screen out bands with rich information and low correlation, to achieve data dimensionality reduction and retain key informat... 详细信息
来源: 评论
Crucial Interaction Elements Detection for 5G Core network based on the Complex network Model
Crucial Interaction Elements Detection for 5G Core Network b...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Ruinan Peng Xinhong Hei Yichuan Wang Xiaoxue Liu Yeqiu Xiao School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
This paper focuses on the issue of crucial interaction elements detection in the 5G core network. Given the current absence of an effective method for quantification evaluating the importance of interaction elements, ... 详细信息
来源: 评论
A Novel Auralization Model for network security Situation Assessment
A Novel Auralization Model for Network Security Situation As...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yeqiu Xiao Yibin Ma Yichuan Wang Kun Jiang Lanlan Cui School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Situation assessment is one of indispensable part for protecting network security. However, with the development of network attacks, the timeliness of attack threat assessment using traditional mathematical methods ha... 详细信息
来源: 评论
Compiler Differentiation Detection Method for Binary Similarity
Compiler Differentiation Detection Method for Binary Similar...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xiaoxue Liu Xinwei Duan Xinhong Hei Yichuan Wang Xin Song School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology
Compiler differential detection can be performed by detecting the similarity between the binary compiled by the compiler and the ideal compiled file. This article proposes a javac compiler differentiation detection sy... 详细信息
来源: 评论
A Novel Multipath Data Transmission Method with Traffic Obfuscation
A Novel Multipath Data Transmission Method with Traffic Obfu...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xinhong Hei Jianfeng Chen Yichuan Wang Xin Song Lei Zhu School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
With the rapid progress of network communication technology, the issues of user identity and privacy are critical. However, there are many disadvantages in traditional single-path data transmission, for example, the l... 详细信息
来源: 评论
Self-Evaluation of Large Language Model based on Glass-box Features
Self-Evaluation of Large Language Model based on Glass-box F...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Huang, Hui Qu, Yingqi Liu, Jing Yang, Muyun Xu, Bing Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Baidu Inc. Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
The proliferation of open-source Large Language Models (LLMs) underscores the pressing need for evaluation methods. Existing works primarily rely on external evaluators, focusing on training and prompting strategies. ... 详细信息
来源: 评论
Research on Code Virtualization Methods for Cloud Applications
Research on Code Virtualization Methods for Cloud Applicatio...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Zhoukai Wang Zuoyan Xu Yaling Zhang Xin Song Yichuan Wang School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology
With the vigorous development of technologies such as the Internet, mobile devices, and the Internet of Things, cloud services have gained a crucial position in our life and have become an essential part of daily oper... 详细信息
来源: 评论