咨询与建议

限定检索结果

文献类型

  • 648 篇 会议
  • 311 篇 期刊文献

馆藏范围

  • 959 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 524 篇 工学
    • 391 篇 计算机科学与技术...
    • 330 篇 软件工程
    • 148 篇 信息与通信工程
    • 121 篇 电气工程
    • 60 篇 控制科学与工程
    • 57 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 39 篇 网络空间安全
    • 37 篇 机械工程
    • 28 篇 光学工程
    • 28 篇 安全科学与工程
    • 26 篇 交通运输工程
    • 26 篇 生物医学工程(可授...
    • 22 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 12 篇 土木工程
  • 238 篇 理学
    • 153 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 16 篇 化学
  • 129 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 21 篇 基础医学(可授医学...
    • 12 篇 公共卫生与预防医...
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 8 篇 经济学
  • 7 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 53 篇 computational mo...
  • 46 篇 data models
  • 43 篇 training
  • 41 篇 federated learni...
  • 38 篇 deep learning
  • 33 篇 neural networks
  • 26 篇 transformers
  • 25 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 222 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 shandong fundame...
  • 37 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 22 篇 shandong provinc...
  • 20 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 16 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 15 篇 xi'an key labora...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 shen yulong
  • 17 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 chen yanping
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 jing zhao
  • 11 篇 xiaohui han

语言

  • 884 篇 英文
  • 65 篇 其他
  • 12 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
959 条 记 录,以下是791-800 订阅
排序:
Multi-Channel Hypergraph network for Sequential Diagnosis Prediction in Healthcare
Multi-Channel Hypergraph Network for Sequential Diagnosis Pr...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xin Zhang Xueping Peng Weimin Chen Weiyu Zhang Xiaoqiang Ren Wenpeng Luv Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia Shandong Mental Health Center Jinan China
Sequential diagnosis prediction (SDP) is a complex and challenging task, aming to predict future diagnoses of patients by analyzing their historical medical records. Although graph neural networks(GNNs) has been appli... 详细信息
来源: 评论
Research and Application of Smart Water Meter Monitoring System Based on NB-IoT
Research and Application of Smart Water Meter Monitoring Sys...
收藏 引用
IEEE Information technology and Mechatronics Engineering Conference (ITOEC)
作者: Yuanyuan Zhao Tixiang Zhang Huijuan Hao Xiaojie Zhang Shandong Computer Science Center Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Qilu University of Technology (Shandong Academy of Sciences) Jinan P. R. China Shandong Yonate Environmental Technology Co. Ltd. Jinan P. R. China
With the increasing shortage of water resources and the improvement of environmental awareness, intelligent water meter monitoring systems have become a hot research topic in the field of water conservation. This pape...
来源: 评论
Fully Synthetic Videos and Random Background-Pasting Method for Flame Segmentation
SSRN
收藏 引用
SSRN 2022年
作者: Jia, Yang Zhang, Xinmeng Kuang, Yaxi Chen, Yanping Wang, Gang Zhang, Qixing School of Computer Science Xi'an University of Posts and Telecommunications 710121 China Shaanxi Key Laboratory of Network Data Intelligent Processing Xi'an University of Posts and Telecommunications 710121 China Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an University of Posts and Telecommunications 710121 China School of Information Science and Technology University of Science and Technology of China 230026 China XNIF262 710061 China State Key Laboratory of Fire Science University of Science and Technology of China 230026 China
Video-based flame detection (VFD) aims to recognize fire events by the image features. Flame segmentation is an essential task in VFD, which provides suspected regions for feature analysis and object recognition. The ... 详细信息
来源: 评论
CSLP: Collaborative Solution to Long-Tail Problem and Popularity Bias in Sequential Recommendation
CSLP: Collaborative Solution to Long-Tail Problem and Popula...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Yan Huang Zhenyu Yang Wenyue Hu Baojie Xu Zhibo Zhang The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Sequential Recommender Systems (SRS), leveraging the temporal information from users' behaviors, have noticeably improved user experience against traditional systems. However, these behaviors often follow long-tai... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Disentangling Interest and Conformity Representation to Mitigate Popularity Bias for Sequential Recommendation
Disentangling Interest and Conformity Representation to Miti...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Wenyue Hu Zhenyu Yang Yan Huang Zhibo Zhang Baojie Xu Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The objective of sequential recommendation is to predict user preferences for items based on historical interaction sequences. This process often leads to a phenomenon known as popularity bias, where popular items are... 详细信息
来源: 评论
Research on Classroom Behavior Target Detection Algorithm based on YOLOv7
Research on Classroom Behavior Target Detection Algorithm ba...
收藏 引用
IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Wenke Qiu Xiaoming Wu Xiangzhi Liu Computer Science and Qilu University of Technology (Shandong Academy of Sciences) Jinan ShanDong China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The integration of video information for the purpose of detecting students’ behavior in the classroom, with the aim of enhancing teaching efficiency and maintaining a stable classroom environment, offers significant ... 详细信息
来源: 评论
CTI-JE: A Joint Extraction Framework of Entities and Relations in Unstructured Cyber Threat Intelligence
CTI-JE: A Joint Extraction Framework of Entities and Relatio...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yang Liu Xiaohui Han Wenbo Zuo Haiqing Lv Jing Guo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China Information Research Institute Qilu University of Technology(Shandong Academy of Sciences) Jinan China
Advanced Persistent Threat (APT) pose an increasingly serious challenge to the security of businesses and organizations. In order to cope with these threats more effectively, effective utilization of cybers threat int... 详细信息
来源: 评论
Knowledge Distillation Using Global Fusion and Feature Restoration for Industrial Defect Detectors
Knowledge Distillation Using Global Fusion and Feature Resto...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Zhengqian Feng Xiyao Yue Wang Li Mingle Zhou Delong Han Gang Li SHANDONG SCICOM Information and Economy Research Institute CO. . Ltd Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Deep learning technology has been widely applied in industrial quality inspection tasks to improve the accuracy of defect detection, object recognition, and classification. However, in the task of object detection, bo... 详细信息
来源: 评论
An Entity Relation Extraction Framework Based on Large Language Model and Multi-Tasks Iterative Prompt Engineering
An Entity Relation Extraction Framework Based on Large Langu...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Haibin Geng Chenglong Shi Xuesong Jiang Zan Kong Song Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Document-level entity relation extraction is an important task in the field of natural language processing, which plays an important role in semantic understanding and knowledge graph construction. However, existing d... 详细信息
来源: 评论