咨询与建议

限定检索结果

文献类型

  • 648 篇 会议
  • 311 篇 期刊文献

馆藏范围

  • 959 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 524 篇 工学
    • 391 篇 计算机科学与技术...
    • 330 篇 软件工程
    • 148 篇 信息与通信工程
    • 121 篇 电气工程
    • 60 篇 控制科学与工程
    • 57 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 39 篇 网络空间安全
    • 37 篇 机械工程
    • 28 篇 光学工程
    • 28 篇 安全科学与工程
    • 26 篇 交通运输工程
    • 26 篇 生物医学工程(可授...
    • 22 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 12 篇 土木工程
  • 238 篇 理学
    • 153 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 16 篇 化学
  • 129 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 21 篇 基础医学(可授医学...
    • 12 篇 公共卫生与预防医...
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 8 篇 经济学
  • 7 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 53 篇 computational mo...
  • 46 篇 data models
  • 43 篇 training
  • 41 篇 federated learni...
  • 38 篇 deep learning
  • 33 篇 neural networks
  • 26 篇 transformers
  • 25 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 222 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 shandong fundame...
  • 37 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 22 篇 shandong provinc...
  • 20 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 16 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 15 篇 xi'an key labora...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 shen yulong
  • 17 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 chen yanping
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 jing zhao
  • 11 篇 xiaohui han

语言

  • 884 篇 英文
  • 65 篇 其他
  • 12 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
959 条 记 录,以下是911-920 订阅
排序:
Fast Gumbel-Max Sketch and its Applications
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yuanming Wang, Pinghui Qi, Yiyan Cheng, Kuankuan Zhao, Junzhou Tian, Guangjian Guan, Xiaohong The MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University P.O. Box 1088 No. 28 Xianning West Road Shaanxi Xi'An710049 China The Center for Intelligent and Networked Systems Tsinghua National Lab for Information Science and Technology Tsinghua University Beijing100084 China Huawei Noah's Ark Lab Hong Kong
The well-known Gumbel-Max Trick for sampling elements from a categorical distribution (or more generally a non-negative vector) and its variants have been widely used in areas such as machine learning and information ... 详细信息
来源: 评论
Symmetry Breaking in Neural network Optimization: Insights from Input Dimension Expansion
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Jun-Jie Cheng, Nan Li, Fu-Peng Wang, Xiu-Cheng Chen, Jian-Nan Pang, Long-Gang Meng, Deyu Northwest Institute of Nuclear Technology No. 28 Pingyu Road Shaanxi Xi’an710024 China School of Telecommunications Engineering Xidian University No. 2 South Taibai Road Shaanxi Xi’an710071 China State Key Laboratory of ISN No. 2 South Taibai Road Shaanxi Xi’an710071 China Institute of Particle Physics Central China Normal University No. 152 Luoyu Road Hubei Wuhan30079 China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China
Understanding the mechanisms behind neural network optimization is crucial for improving network design and performance. While various optimization techniques have been developed, a comprehensive understanding of the ...
来源: 评论
Novel Color Orthogonal Moments-Based Image Representation and Recognition
Research Square
收藏 引用
Research Square 2020年
作者: He, Bing Liu, Jun Yang, Tengfei Xiao, Bin Peng, Yanguo School of Physics and Electrical Engineering Weinan Normal University Weinan714000 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an University of Posts & Telecommunications Xi’an710121 China School of Computer Science and Technology Weinan Normal University Weinan714000 China School of Cyberspace Security Xi’an University of Posts & Telecommunications Xi’an710121 China Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China School of Computer Science and Technology Xidian University Xi’an710071 China
Inspired by quaternion algebra and the idea of fractional-order transformation, we propose a new set of quaternion fractional-order generalized Laguerre orthogonal moments (QFr-GLMs) based on fractional-order generali... 详细信息
来源: 评论
A Multichannel CNN-GRU Hybrid Architecture for sEMG Gesture Recognition
A Multichannel CNN-GRU Hybrid Architecture for sEMG Gesture ...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Shouliang Song Anming Dong Jiguo Yu Yubing Han You Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Big Data Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Haikan New Media Research Institute Co. Ltd.
Surface electromyography (sEMG) signal is a physiological electrical signal produced by muscle contraction. Different gestures can be effectively recognized from the characteristics of the sEMG signal. Currently, conv...
来源: 评论
Investigating Bi-level optimization for learning and vision from a unified perspective: A survey and beyond
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Risheng Gao, Jiaxin Zhang, Jin Meng, Deyu Lin, Zhouchen DUT-RU International School of Information Science & Engineering Dalian University of Technology Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian116024 China Department of Mathematics Southern University of Science and Technology National Center for Applied Mathematics Shenzhen China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an Shaanxi China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Cooperative Medianet Innovation Center Shanghai Jiao Tong University Shanghai200240 China
Bi-Level Optimization (BLO) is originated from the area of economic game theory and then introduced into the optimization community. BLO is able to handle problems with a hierarchical structure, involving two levels o... 详细信息
来源: 评论
STR: Secure computation on additive shares using the share-transform-reveal strategy
arXiv
收藏 引用
arXiv 2020年
作者: Xia, Zhihua Gu, Qi Zhou, Wenhao Xiong, Lizhi Weng, Jian Xiong, Naixue N. College of Cyber Security Jinan University Guangzhou510632 China Engineering Research Center of Digital Forensics Ministry of Education School of Computer and Software Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology Nanjing210044 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China The College of Intelligence and Computing Tianjin University Tianjin300350 China
The rapid development of cloud computing probably benefits many of us while the privacy risks brought by semi-honest cloud servers have aroused the attention of more and more people and legislatures. In the last two d... 详细信息
来源: 评论
Robust Imagined Speech Production from Electrocorticography with Adaptive Frequency Enhancement
Robust Imagined Speech Production from Electrocorticography ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xu Xu Chong Fu Junxin Chen Gwanggil Jeon David Camacho School of Computer Science and Engineering Northeastern University Shenyang China School of Software Dalian University of Technology Dalian China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China College of Information Technology Incheon National University Incheon Korea Department of Computer Systems Engineering Universidad Politécnica de Madrid Madrid Spain
Imagined speech production with electrocorticography (ECoG) plays a crucial role in brain-computer interface system. A challenging issue is the great variation underlying the frequency bands of the ECoG signals’ enco... 详细信息
来源: 评论
G²Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors
收藏 引用
IEEE Transactions on Information Forensics and security 2024年 19卷 8773-8785页
作者: Haoxin Yang Xuemiao Xu Cheng Xu Huaidong Zhang Jing Qin Yi Wang Pheng-Ann Heng Shengfeng He School of Computer Science and Engineering South China University of Technology Guangzhou China Guangdong Engineering Center for Large Model and GenAI Technology State Key Laboratory of Subtropical Building and Urban Science Guangzhou China Centre for Smart Health The Hong Kong Polytechnic University Hong Kong China School of Future Technology South China University of Technology Guangzhou China School of Computer Science and Network Security Dongguan University of Technology Dongguan China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong SAR China School of Computing and Information Systems Singapore Management University Victoria St Singapore
Reversible face anonymization, unlike traditional face pixelization, seeks to replace sensitive identity information in facial images with synthesized alternatives, preserving privacy without sacrificing image clarity... 详细信息
来源: 评论
Outage Analysis of Aerial Semi-Grant-Free NOMA Systems
arXiv
收藏 引用
arXiv 2022年
作者: Lei, Hongjiang Zhu, Chen Park, Ki-Hong Ansari, Imran Shafique Lei, Weijia Tang, Hong Kim, Kyeong Jin The School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Chongqing Key Lab of Mobile Communications Technology Chongqing400065 China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Shaanxi Xi’an710121 China Thuwal23955-6900 Saudi Arabia James Watt School of Engineering University of Glasgow GlasgowG12 8QQ United Kingdom The Mitsubishi Electric Research Laboratories CambridgeMA02139 United States
In this paper, we analyze the outage performance of Unmanned Aerial Vehicles (UAVs)-enabled downlink Non-Orthogonal Multiple Access (NOMA) communication systems with the Semi-Grant-Free (SGF) transmission scheme. A UA... 详细信息
来源: 评论
Adaptively secure key-policy ABE scheme with fast decryption
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 26-32页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng School of Computer Science and Technology Xidian University Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China Faculty of Software Fujian Normal University Fuzhou350108 China School of Telecommunication Engineering Xidian University Xi'an710071 China
In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc... 详细信息
来源: 评论