咨询与建议

限定检索结果

文献类型

  • 647 篇 会议
  • 287 篇 期刊文献

馆藏范围

  • 934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 499 篇 工学
    • 375 篇 计算机科学与技术...
    • 328 篇 软件工程
    • 136 篇 信息与通信工程
    • 99 篇 电气工程
    • 57 篇 控制科学与工程
    • 50 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 34 篇 机械工程
    • 33 篇 网络空间安全
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 25 篇 安全科学与工程
    • 23 篇 仪器科学与技术
    • 22 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 建筑学
  • 231 篇 理学
    • 146 篇 数学
    • 49 篇 统计学(可授理学、...
    • 44 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 16 篇 化学
  • 123 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 7 篇 经济学
  • 6 篇 军事学
  • 5 篇 教育学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 52 篇 computational mo...
  • 45 篇 data models
  • 42 篇 training
  • 39 篇 federated learni...
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 220 篇 key laboratory o...
  • 197 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 21 篇 school of comput...
  • 20 篇 shandong provinc...
  • 18 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 16 篇 xi'an key labora...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 17 篇 shen yulong
  • 17 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 lu wenpeng
  • 11 篇 jing zhao
  • 11 篇 chen yanping
  • 11 篇 fu chong
  • 11 篇 mingle zhou
  • 11 篇 wei zhang

语言

  • 869 篇 英文
  • 55 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
934 条 记 录,以下是821-830 订阅
排序:
Global context aware RCNN for object detection
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Wenchao Fu, Chong Xie, Haoyu Zhu, Mai Tie, Ming Chen, Junxin School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Science and Technology on Space Physics Laboratory Beijing100076 China College of Medicine and Biological Information Engineering Northeastern University Shenyang110819 China
RoIPool/RoIAlign is an indispensable process for the typical two-stage object detection algorithm, it is used to rescale the object proposal cropped from the feature pyramid to generate a fixed size feature map. Howev... 详细信息
来源: 评论
Optimizing network resource allocation with graph pointer neural network in large-scale AI systems
收藏 引用
Digital Communications and networks 2024年
作者: Peiying Zhang Yilin Li Athanasios V. Vasilakos Konstantin Igorevich Kostromitin Jianyong Zhang Mohsen Guizani Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao 266580 China State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710071 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250013 China Department of Networks and Communications College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University P.O. Box 1982 Dammam 31441 Saudi Arabia Department of Physics of Nanoscale Systems South Ural State University Chelyabinsk 454080 the Russian Federation Institute of Lightwave Technology Beijing Jiaotong University Beijing 100044 China Key Lab of All Optical Network and Advanced Telecommunication of EMC Institute of Lightwave Technology Beijing Jiaotong University Beijing 100044 China Machine Learning Department Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI) Abu Dhabi 999041 United Arab Emirates
For increasingly complex communication demands of large-scale AI communication systems, the Space-Air-Ground Integrated network (SAGIN) better caters to demands but also raises concerns about resource scarcity and div... 详细信息
来源: 评论
A Slice-Guided Method of Indoor Scene Structure Retrieving  12th
A Slice-Guided Method of Indoor Scene Structure Retrieving
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Wang, Lijuan Wang, Yinghui Wang, Ningna Ning, Xiaojuan Lv, Ke Huang, Liangyi Xi’an University of Technology South Jinhua Road no. 5 Xi’an710032 China Xi’an Technology University Mid Xuefu Road no. 2 Xi’an710021 China Shaanxi Key Laboratory of Network Computing and Security Technology South Jinhua Road no. 5 Xi’an710032 China *** B.V. Vijzelstraat 66-80 Amsterdam1017HL Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington DC20052 United States
The structure information of indoor scene is necessary for a robot who works in a room. In order to achieve structure of an indoor scene, a slice-guided method of indoor scene structure retrieving is proposed in this ... 详细信息
来源: 评论
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs  3
Exploiting Meta-Path with Attention Mechanism for Fine-Grain...
收藏 引用
2019 3rd International Conference on Data Mining, Communications and Information technology, DMCIT 2019
作者: Wang, Zhixiao Yan, Wenyao Wang, Wendong Gao, Ang Yu, Lei Yang, Shaobo Nie, GaoYang School of Computer Science and Engineering Xi'an University of Technology Xi'an710048 China Telematics Group University of Goettingen Goettingen37077 Germany Shaanxi Key Laboratory of Network Computing and Security Xi'an710048 China School of Electronic and Information Engineering Xi'an Jiaotong University Xi'an710048 China College of Xi'an Innovation Yan'an University Xi'an710100 China Yan'an University Yan'an716000 China National Satellite Meteorological Center China Meteorological Administration Beijing100081 China
Based on the huge volumes of user check-in data in LBSNs, users' intrinsic mobility patterns can be well explored, which is fundamental for predicting where a user will visit next given his/her historical check-in... 详细信息
来源: 评论
Slice-Based Window Detection from Scene Point Clouds
Slice-Based Window Detection from Scene Point Clouds
收藏 引用
International Conference on Virtual Reality and Visualization (ICVRV)
作者: Wen Hao Yinghui Wang Wei Liang Xiaojuan Ning Ye Li Institute of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
In this paper, we propose a comprehensive strategy to detect the windows from scene point clouds. First, the planar points are extracted after computing the dimensionality structure of each point. The planar points ar... 详细信息
来源: 评论
Joint object contour points and semantics for instance segmentation
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Wenchao Fu, Chong Zhu, Mai Cao, Lin Tie, Ming Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China Science and Technology on Space Physics Laboratory Beijing100076 China School of Computer Science University of Auckland New Zealand
The attributes of object contours has great significance for instance segmentation task. However, most of the current popular deep neural networks do not pay much attention to the object edge information. Inspired by ...
来源: 评论
An attribute-based encryption scheme with LSSS key-policy from lattices
Advances in Intelligent Systems and Computing
收藏 引用
Advances in Intelligent Systems and computing 2018年 613卷 217-230页
作者: Liu, Lihua Wang, Shangping Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an710054 China School of Mathematics and Computer Science Shaanxi University of Technology HanzhongShaanxi723001 China
A new attribute-based encryption scheme (ABE) from lattices with Linear Secret Sharing Scheme (LSSS) key-policy is presented. In the new scheme, the key of an attribute under an access policy represented by LSSS is ge... 详细信息
来源: 评论
Novel Color Orthogonal Moments-Based Image Representation and Recognition
Research Square
收藏 引用
Research Square 2020年
作者: He, Bing Liu, Jun Yang, Tengfei Xiao, Bin Peng, Yanguo School of Physics and Electrical Engineering Weinan Normal University Weinan714000 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an University of Posts & Telecommunications Xi’an710121 China School of Computer Science and Technology Weinan Normal University Weinan714000 China School of Cyberspace Security Xi’an University of Posts & Telecommunications Xi’an710121 China Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China School of Computer Science and Technology Xidian University Xi’an710071 China
Inspired by quaternion algebra and the idea of fractional-order transformation, we propose a new set of quaternion fractional-order generalized Laguerre orthogonal moments (QFr-GLMs) based on fractional-order generali... 详细信息
来源: 评论
Trust-PBFT: A PeerTrust-Based Practical Byzantine Consensus Algorithm
Trust-PBFT: A PeerTrust-Based Practical Byzantine Consensus ...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Wei Tong Xuewen Dong Jiawei Zheng Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an China School of Cyber Engineering Xidian University Xi'an China School of Computer Science and Technology Xidian University Xi'an China
Blockchain is becoming increasingly popular, while the performance problems have confused its implementation, especially the limited size of the distributed network. In this paper, we propose Trust-PBFT, a combination... 详细信息
来源: 评论
Transferring knowledge distillation for multilingual social event detection
arXiv
收藏 引用
arXiv 2021年
作者: Ren, Jiaqian Peng, Hao Jiang, Lei Wu, Jia Tong, Yongxin Wang, Lihong Bai, Xu Wang, Bo Yang, Qiang Institute of Information Engineering Chinese Academy of Sciences The School of Cyber Security University of Chinese Academy of Sciences Beijing100041 China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The School of Cyber Science and Technology Beihang University Beijing100083 China Institute of Information Engineering Chinese Academy of Sciences Beijing100041 China The Department of Computing Macquarie University Sydney Australia The State Key Laboratory of Software Development Environment The School of Computer Science and Engineering Beihang University Beijing100083 China The National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China The Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong AI Group WeBank Co. Ltd. China
Recently published graph neural networks (GNNs) show promising performance at social event detection tasks. However, most studies are oriented toward monolingual data in languages with abundant training samples. This ... 详细信息
来源: 评论