咨询与建议

限定检索结果

文献类型

  • 640 篇 会议
  • 298 篇 期刊文献

馆藏范围

  • 938 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 494 篇 工学
    • 368 篇 计算机科学与技术...
    • 320 篇 软件工程
    • 133 篇 信息与通信工程
    • 99 篇 电气工程
    • 48 篇 控制科学与工程
    • 45 篇 生物工程
    • 43 篇 电子科学与技术(可...
    • 36 篇 机械工程
    • 33 篇 网络空间安全
    • 27 篇 生物医学工程(可授...
    • 26 篇 光学工程
    • 25 篇 安全科学与工程
    • 24 篇 交通运输工程
    • 21 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 13 篇 土木工程
    • 11 篇 建筑学
  • 229 篇 理学
    • 144 篇 数学
    • 49 篇 统计学(可授理学、...
    • 43 篇 生物学
    • 42 篇 物理学
    • 22 篇 系统科学
    • 16 篇 化学
  • 122 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 65 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 20 篇 基础医学(可授医学...
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 7 篇 经济学
  • 6 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学

主题

  • 88 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 53 篇 computational mo...
  • 46 篇 data models
  • 43 篇 training
  • 38 篇 federated learni...
  • 37 篇 deep learning
  • 33 篇 neural networks
  • 26 篇 transformers
  • 25 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 219 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 shaanxi key labo...
  • 37 篇 shandong fundame...
  • 37 篇 school of comput...
  • 34 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 28 篇 qilu university ...
  • 28 篇 shandong provinc...
  • 19 篇 school of comput...
  • 19 篇 school of comput...
  • 19 篇 shandong provinc...
  • 18 篇 shaanxi key labo...
  • 16 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 15 篇 xi'an key labora...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...

作者

  • 28 篇 yichuan wang
  • 23 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 16 篇 haiyan jin
  • 15 篇 xiangzhi liu
  • 15 篇 shen yulong
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 guohua lv
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lei zhu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 lu wenpeng
  • 11 篇 jing zhao
  • 11 篇 chen yanping
  • 11 篇 xiaohui han

语言

  • 872 篇 英文
  • 55 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
938 条 记 录,以下是71-80 订阅
排序:
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge computing
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Ming Northeastern University School of Computer Science and Engineering Engineering Research Center of Security Technology of Complex Network System Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University School of Computer Science and Engineering Shenyang110819 China
Mobile edge computing (MEC) integrated with network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
arXiv
收藏 引用
arXiv 2025年
作者: You, Zhichao Dong, Xuewen Li, Shujun Liu, Ximeng Ma, Siqi Shen, Yulong School of Computer Science & Technology Xidian University China Shaanxi Key Laboratory of Network and System Security Xi’an China University of Kent Canterbury United Kingdom College of Computer and Data Science Fuzhou University Fuzhou China School of System and Computing University of New South Wales CanberraACT2612 Australia
Reconstruction attacks against federated learning (FL) aim to reconstruct users’ samples through users’ uploaded gradients. Local differential privacy (LDP) is regarded as an effective defense against various attack... 详细信息
来源: 评论
Adaptive ELM-Based Time-Constrained Control of Uncertain Robotic Manipulators With Minimum Learning Computation
收藏 引用
IEEE Transactions on Emerging Topics in computing 2025年
作者: Jin, Xiaozheng Hou, Yuhan Wu, Xiaoming Chi, Jing Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Jinan250013 China Qilu Institute of Technology School of Intelligent Manufacturing and Control Engineering Shandong Jinan250200 China Shandong University of Finance and Economics School of Computing and Artificial Intelligence Shandong Jinan250014 China
This paper studies the extreme learning machine (ELM)-based time-constrained trajectory tracking control of a class of robotic manipulator systems with model/input uncertainties, matched and mismatched disturbances. A... 详细信息
来源: 评论
STAD: Joint Spatial-Temporal Dimension and Channel Correlation for Time Series Anomaly Detection
STAD: Joint Spatial-Temporal Dimension and Channel Correlati...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Mingle Zhou Xingli Wang Delong Han Jin Wan Jiachen Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd
Accurately identifying real anomalies and pseudo-anomalies in complex multi-dimensional time series data has been a difficult problem in time series anomaly detection. To solve this problem, this paper proposes a new ... 详细信息
来源: 评论
Symbiosis Rather Than Aggregation: Towards Generalized Federated Learning via Model Symbiosis
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Liu, Yuange Liu, Yuru Zhang, Weishan Zheng, Chaoqun Jiang, Wei Luo, Daobin Qiao, Qiao Meng, Lingzhao Zhao, Hongwei Yang, Su College of Computer Science and Technology Qingdao266580 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China Information Science Academy of China Electronics Technology Group Corporation Beijing100036 China Fudan University School of Computer Science Shanghai200433 China
Federated Learning (FL) faces significant challenges in scenarios with non-IID (non-independent and identically distributed) data distributions across participating clients. Traditional aggregation-based approaches of... 详细信息
来源: 评论
AMHF-TP:Multifunctional therapeutic peptides prediction based on multi-granularity hierarchical features
收藏 引用
Quantitative Biology 2025年 第1期13卷 127-141页
作者: Shouheng Tuo YanLing Zhu Jiangkun Lin Jiewei Jiang School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’anChina Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’anChina Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’anChina School of Electronic Engineering Xi’an University of Posts and TelecommunicationsXi’anChina
Multifunctional therapeutic peptides(MFTP)hold immense potential in diverse therapeutic contexts,yet their prediction and identification remain challenging due to the limitations of traditional methodologies,such as e... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural networks
arXiv
收藏 引用
arXiv 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China University of Kent CanterburyCT2 7NP United Kingdom Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China Intelligent Transportation Systems Lab Innopolis University Innopolis Russia School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi’an710071 China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
Safe and Reliable Diffusion Models via Subspace Projection
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Huiqiang Zhu, Tianqing Wang, Linlin Yu, Xin Gao, Longxiang Zhou, Wanlei Faculty of Data Science City University of Macau China School of Computer Science University of Queensland QLD Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Large-scale text-to-image (T2I) diffusion models have revolutionized image generation, enabling the synthesis of highly detailed visuals from textual descriptions. However, these models may inadvertently generate inap... 详细信息
来源: 评论
SML: A Backdoor Defense for Non-Intrusive Speech Quality Assessment via Semi-Supervised and Multi-Task Learning
SML: A Backdoor Defense for Non-Intrusive Speech Quality Ass...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Ying Ren Wenjie Zhang Jiahong Ye Jie Li Diqun Yan Bin Ma Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China College of Digital Technology and Engineering Ningbo University of Finance and Economics Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Non-intrusive speech quality assessment (NISQA) is widely used in speech downstream tasks due to its ability to predict the quality of speech without a reference speech. However, few researchers have focused on the ba... 详细信息
来源: 评论
RobustPFL: Robust Personalized Federated Learning
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Chen, Guorong Wang, Wei Wu, Yufang Li, Chao Xu, Guangquan Ji, Shouling Li, Tao Shen, Meng Han, Yufei Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China Beijing Jiaotong University 3 Shangyuancun Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University Tianjin Key Laboratory of Advanced Networking College of Intelligence and Computing Tianjin300350 China Zhejiang University College of Computer Science and Technology Hangzhou310027 China ITAI Haihe Lab Tianjin China Nankai University College of Computer Science Tianjin300350 China Beijing Institute of Technology School of Cyberspace Security Beijing100081 China Peng Cheng Laboratory Cyberspace Security Research Center Shenzhen518066 China INRIA Bretagne Rennes35042 France
Conventional federated learning (FL) coordinated by a central server focuses on training a global model and protecting the privacy of clients' training data by storing it locally. However, the statistical heteroge... 详细信息
来源: 评论