咨询与建议

限定检索结果

文献类型

  • 647 篇 会议
  • 291 篇 期刊文献

馆藏范围

  • 938 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 503 篇 工学
    • 378 篇 计算机科学与技术...
    • 328 篇 软件工程
    • 136 篇 信息与通信工程
    • 99 篇 电气工程
    • 57 篇 控制科学与工程
    • 51 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 34 篇 机械工程
    • 33 篇 网络空间安全
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 25 篇 安全科学与工程
    • 23 篇 仪器科学与技术
    • 22 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 建筑学
  • 231 篇 理学
    • 146 篇 数学
    • 49 篇 统计学(可授理学、...
    • 44 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 16 篇 化学
  • 123 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 7 篇 经济学
  • 6 篇 军事学
  • 5 篇 教育学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 52 篇 computational mo...
  • 45 篇 data models
  • 42 篇 training
  • 41 篇 federated learni...
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 220 篇 key laboratory o...
  • 197 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 21 篇 school of comput...
  • 21 篇 shandong provinc...
  • 18 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 16 篇 xi'an key labora...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 13 篇 key laboratory o...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 17 篇 shen yulong
  • 17 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 wenpeng lu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 lu wenpeng
  • 11 篇 jing zhao
  • 11 篇 chen yanping
  • 11 篇 xiaohui han
  • 11 篇 fu chong

语言

  • 873 篇 英文
  • 55 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
938 条 记 录,以下是711-720 订阅
排序:
Numerical Calculation of Partial Differential Equation Deduction in Adaptive Total Variation Image Denoising  12
Numerical Calculation of Partial Differential Equation Deduc...
收藏 引用
12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2019
作者: Zhao, Minghua Wang, Qin Muniru, Abdul Nasir Ning, Jiawei Li, Peng Li, Bing School of computer science and engineering Xi'an University of Technology Xi'an Shaanxi China Shaanxi Key Laboratory of Network Computing and Security Technology Xi'an Shaanxi China
Total variation model of image denoising is easy to influence the gradient and lose the details of image. Due to these weaknesses, many adaptive total variation (ATV) models of image denoising have been proposed to el... 详细信息
来源: 评论
Dynamic Detection of Malicious Code on Android Based on Improved Multi-feature Gaussian Kernel  15th
Dynamic Detection of Malicious Code on Android Based on Impr...
收藏 引用
15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2019, co-located with the 5th International Conference on Harmony Search, Soft computing and Applications, ICHSA 2019
作者: Yu, Qing Luo, Xixi Wang, Zuohua Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin300384 China China Everbright Bank Co. Ltd. Tianjin300384 China
In recent years, with the increasing demand for mobile Internet, smartphones represented by the Android system begin to play an increasingly important role in people’s daily life. Due to the payment and social functi... 详细信息
来源: 评论
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
收藏 引用
Science China(Information Sciences) 2021年 第8期64卷 195-212页
作者: Yanyu HUANG Siyi LV Zheli LIU Xiangfu SONG Jin LI Yali YUAN Changyu Dong College of Cyber Science and the College of Computer Science Tianjin Key Laboratory of Network and Data Security TechnologyNankai University School of Computer Science and Technology Shandong University School of Computer Science Guangzhou University Department of Computer Science University of G?ttingen School of Computing Newcastle University
Symmetric searchable encryption(SSE) allows the users to store and query their private data in the encrypted database. Many SSE schemes for different scenarios have been proposed in the past few years, however, most o... 详细信息
来源: 评论
Social Recommendation Combining Implicit Information and Rating Bias
Social Recommendation Combining Implicit Information and Rat...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Weizhi Ying Qing Yu Zuohua Wang Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China China Everbright Bank CO.LTD Beijing China
In recent years, more and more recommendation algorithm considers social information. However, in the existing social recommendation algorithm focused on the rating prediction task, the user's rating bias and the ... 详细信息
来源: 评论
A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends
arXiv
收藏 引用
arXiv 2022年
作者: Zhao, Yao Qu, Youyang Xiang, Yong Uddin, Md Palash Peng, Dezhong Gao, Longxiang School of Information Technology Deakin University Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science China College of Computer Science Sichuan University China
Recent advances in edge computing (EC) have pushed cloud-based data caching services to edge, however, such emerging edge storage comes with numerous challenging and unique security issues. One of them is the problem ... 详细信息
来源: 评论
Research on the Distribution Characteristics of Standardized Big Data Resources Based on Data Visualization——Taking Standardization Practice in Shandong Province as an Example
Research on the Distribution Characteristics of Standardized...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Jinyang Sun Dongdong Peng Zhe Lu Mengran Zhai Ning Qi Yuanhua Qi SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China Jinan Municipal Bureau of Big Data Jinan China Shandong Institute of Economy and Informatization Development Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology Shandong Academy of Sciences Jinan China
Standardized big data, as a product of the combination of big data and standardization work, objectively reflects the status quo and trends of standardization work. An in-depth study of the distribution characteristic... 详细信息
来源: 评论
Graph Learning-Based Multi-User Multi-Task Offloading in Wireless computing Power networks
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Dai, Yueyue Rao, Xiaoyang Gu, Bruce Qu, Youyang Yang, Huiran Lu, Yunlong Huazhong University of Science and Technology Research Center of6G Mobile Communications School of Cyber Science and Engineering Wuhan430074 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education China Australia University of Chinese Academy of Sciences Institute of Information Engineering Chinese Academy of Sciences Beijing China and the School of Cyber Security Beijing China Beijing Jiaotong University School of Electronic and Information Engineering Beijing100044 China
To enhance service quality, wireless computing power networks (WCPNs) need to realize flexible scheduling and allocation of computation resources across heterogeneous computing servers. Due to large user scales and di... 详细信息
来源: 评论
CMW-Net: Learning a Class-Aware Sample Weighting Mapping for Robust Deep Learning
arXiv
收藏 引用
arXiv 2022年
作者: Shu, Jun Yuan, Xiang Meng, Deyu Xu, Zongben School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi China Peng Cheng Laboratory Guangdong Shenzhen China The Macau Institute of Systems Engineering Macau University of Science and Technology Taipa China
Modern deep neural networks (DNNs) can easily overfit to biased training data containing corrupted labels or class imbalance. Sample re-weighting methods are popularly used to alleviate this data bias issue. Most curr... 详细信息
来源: 评论
A Resilient Decentralized Learning Approach against Byzantine Attack via Reputation Evaluation
A Resilient Decentralized Learning Approach against Byzantin...
收藏 引用
Youth Academic Annual Conference of Chinese Association of Automation (YAC)
作者: Heng Zhang Wenting Wang Xuguo Jiao Ming Yang Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan P. R. China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan P. R. China College of Control Science and Engineering Zhejiang University Hangzhou China State Grid Shandong Electric Power Research Institute Jinan China School of Information and Control Engineering Qingdao University of Technology Qingdao China
Machine learning is a key component of many applications, among which decentralized learning has attracted wide attention because of its cost-effectiveness and high efficiency. However, decentralized learning is vulne... 详细信息
来源: 评论
Enhanced Competitive Swarm Optimizer for Multi-task Optimization  2020
Enhanced Competitive Swarm Optimizer for Multi-task Optimiza...
收藏 引用
Proceedings of the 2020 9th International Conference on computing and Pattern Recognition
作者: Wei Li Junqing Yuan Haonan Luo Zhou Lei Qingzheng Xu School of Computer Science and Engineering Xi'an University of Technology and Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China College of Information and Communication National University of Defense Technology Xi'an China
In the real world, many problems possess the high degree of similarity. Inspired by multifactorial inheritance model, evolutionary multi-task optimization paradigm is proposed to simultaneously solve multiple optimiza... 详细信息
来源: 评论