咨询与建议

限定检索结果

文献类型

  • 649 篇 会议
  • 298 篇 期刊文献

馆藏范围

  • 947 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 506 篇 工学
    • 380 篇 计算机科学与技术...
    • 328 篇 软件工程
    • 136 篇 信息与通信工程
    • 101 篇 电气工程
    • 57 篇 控制科学与工程
    • 51 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 34 篇 机械工程
    • 33 篇 网络空间安全
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 25 篇 安全科学与工程
    • 23 篇 仪器科学与技术
    • 22 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 建筑学
  • 231 篇 理学
    • 146 篇 数学
    • 49 篇 统计学(可授理学、...
    • 44 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 16 篇 化学
  • 123 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 7 篇 经济学
  • 6 篇 军事学
  • 5 篇 教育学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 62 篇 semantics
  • 53 篇 computational mo...
  • 45 篇 data models
  • 43 篇 training
  • 41 篇 federated learni...
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 21 篇 benchmark testin...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 visualization
  • 19 篇 speech processin...
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 223 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 22 篇 school of comput...
  • 22 篇 shandong provinc...
  • 18 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 17 篇 xi'an key labora...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 13 篇 key laboratory o...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 17 篇 shen yulong
  • 17 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 xiaohui han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 lu wenpeng
  • 11 篇 jing zhao
  • 11 篇 chen yanping

语言

  • 882 篇 英文
  • 55 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
947 条 记 录,以下是821-830 订阅
排序:
Intelligent recommendation of related items based on naive bayes and collaborative filtering combination model
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1682卷
作者: Wei Wei Zhuo Wang Changlong Fu Robertas Damaševičius Rafal Scherer Marcin Wožniak School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 Shaanxi Key Laboratory for Network Computing and Security Technology China.
Nowadays, data plays a unique role in various fields. Based on the background of the era of big data, this paper collects user evaluations of certain commodities and labels the evaluations into positive emotions and n...
来源: 评论
A more compact object detector head network with feature enhancement and relational reasoning
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Wenchao Fu, Chong Chang, Xiangshi Zhao, Tengfei Li, Xiang Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Baidu Smart Life Group NO. 10 Xibeiwang East Street Ke Ji Yuan Haidian District Beijing100193 China School of Computer Science University of Auckland New Zealand
Modeling implicit feature interaction patterns is of significant importance to object detection tasks. However, in the two-stage detectors, due to the excessive use of hand-crafted components, it is very difficult to ... 详细信息
来源: 评论
Revisiting Recent and Current Anomaly Detection based on Machine Learning in Ad-Hoc networks  5
Revisiting Recent and Current Anomaly Detection based on Mac...
收藏 引用
5th Annual International Conference on network and Information Systems for Computers, ICNISC 2019
作者: Wang, Zhixiao Chen, Mingyu Yan, Wenyao Wang, Wendong Gao, Ang Nie, Gaoyang Wang, Feng Yang, Shaobo Xi'An University of Technology Xi'an710048 China Goettingen University Goettingen37077 Germany Xi'An Jiaotong University Xi'an710049 China Shaanxi Provincial Key Laboratory of Network Computing and Security Technology Xi'an710048 China College of xi'An Innovation Yan'An University Xi'an710100 China Yan'An University Yan'an716000 China National Satellite Meteorological Center China Meteorological Administration Beijing100081 China
Ad-Hoc network which is one kind of self-organized networks is much more vulnerable than the infrastructural network with the properties of highly changeable linkage, dynamic structure, and wireless connections so tha... 详细信息
来源: 评论
Deep Learning for Password Guessing and Password Strength Evaluation, A Survey
Deep Learning for Password Guessing and Password Strength Ev...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Tao Zhang Zelei Cheng Yi Qin Qiang Li Lin Shi Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis Guangxi University for Nationalities Nanning China Department of Computer and Information Technology Purdue University West Lafayette USA PLA Information Engineering University Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Cloud Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
Text passwords are the most widely used authentication methods and will also be used in the future. Text passwords can be regarded as meaningful strings, and deep learning methods have an advantage of text processing.... 详细信息
来源: 评论
Clustering-based codebook design for MIMO communication system
arXiv
收藏 引用
arXiv 2019年
作者: Jiang, Jing Wang, Xiaojing Sidhu, Guftaar Ahmad Sardar Zhen, Li Gao, Runchen Shaanxi Key Laboratory of Information Communication Network and Security Xi'An University of Posts and Telecommunications Xi'an China COMSATS Institute of Information Technology Islamabad Pakistan
Codebook design is one of the core technologies in limited feedback multi-input multi-output (MIMO) communication systems. However, the conventional codebook designs usually assume MIMO vectors are uniformly distribut... 详细信息
来源: 评论
Dynamic hybrid precoding relying on twin-resolution phase shifters in millimeter-wave communication systems
arXiv
收藏 引用
arXiv 2020年
作者: Feng, Chenghao Shen, Wenqian Gao, Xinyu An, Jianping Hanzo, Lajos School of Information and Electronics Beijing Institute of Technology Beijing100081 China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications Xi’anShaanxi710121 China Huawei Technologies Co. Ltd Beijing100085 China Department of Electronics and Computer Science University of Southampton SouthamptonSO17 1BJ United Kingdom
Hybrid analog/digital precoding in millimeter-wave (mmWave) multi-input multi-ouput (MIMO) systems is capable of achieving the near-optimal full-digital performance at reduced hardware cost and power consumption compa... 详细信息
来源: 评论
A Hole Repairing Method Based on Edge-Preserving Projection  12th
A Hole Repairing Method Based on Edge-Preserving Projection
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Wang, Yinghui Zhao, Yanni Wang, Ningna Ning, Xiaojuan Shi, Zhenghao Zhao, Minghua Lv, Ke Huang, Liangyi Institute of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an China Department of Computer Science Shannxi Vocational and Technical College Xi’an China Booking B.V. Herengracht 597 Amsterdam1017 CE Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington D.C. United States
A point cloud hole repairing method based on edge-preserving projection is proposed in order to maintain sharp features of holes. First, the hole boundary points are acquired by quadrants and angles, then connections ... 详细信息
来源: 评论
A Hole Repairing Method Based on Slicing  12th
A Hole Repairing Method Based on Slicing
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Zhao, Yanni Wang, Yinghui Wang, Ningna Ning, Xiaojuan Shi, Zhenghao Zhao, Minghua Lv, Ke Huang, Liangyi Institute of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an China Department of Computer Science Shannxi Vocational and Technical College Xi’an China Booking B.V. Herengracht 597 Amsterdam1017 CE Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington D.C. United States
The repairing of 3D point cloud holes has an important meaning to ensure the integrity of cloud data. We present a slice-based repairing method for 3D point cloud in this paper. Firstly, the model is horizontal sliced... 详细信息
来源: 评论
Global context aware RCNN for object detection
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Wenchao Fu, Chong Xie, Haoyu Zhu, Mai Tie, Ming Chen, Junxin School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Science and Technology on Space Physics Laboratory Beijing100076 China College of Medicine and Biological Information Engineering Northeastern University Shenyang110819 China
RoIPool/RoIAlign is an indispensable process for the typical two-stage object detection algorithm, it is used to rescale the object proposal cropped from the feature pyramid to generate a fixed size feature map. Howev... 详细信息
来源: 评论
Optimizing network resource allocation with graph pointer neural network in large-scale AI systems
收藏 引用
Digital Communications and networks 2024年
作者: Peiying Zhang Yilin Li Athanasios V. Vasilakos Konstantin Igorevich Kostromitin Jianyong Zhang Mohsen Guizani Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao 266580 China State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710071 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250013 China Department of Networks and Communications College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University P.O. Box 1982 Dammam 31441 Saudi Arabia Department of Physics of Nanoscale Systems South Ural State University Chelyabinsk 454080 the Russian Federation Institute of Lightwave Technology Beijing Jiaotong University Beijing 100044 China Key Lab of All Optical Network and Advanced Telecommunication of EMC Institute of Lightwave Technology Beijing Jiaotong University Beijing 100044 China Machine Learning Department Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI) Abu Dhabi 999041 United Arab Emirates
For increasingly complex communication demands of large-scale AI communication systems, the Space-Air-Ground Integrated network (SAGIN) better caters to demands but also raises concerns about resource scarcity and div... 详细信息
来源: 评论