咨询与建议

限定检索结果

文献类型

  • 648 篇 会议
  • 311 篇 期刊文献

馆藏范围

  • 959 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 524 篇 工学
    • 391 篇 计算机科学与技术...
    • 330 篇 软件工程
    • 148 篇 信息与通信工程
    • 121 篇 电气工程
    • 60 篇 控制科学与工程
    • 57 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 39 篇 网络空间安全
    • 37 篇 机械工程
    • 28 篇 光学工程
    • 28 篇 安全科学与工程
    • 26 篇 交通运输工程
    • 26 篇 生物医学工程(可授...
    • 22 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 12 篇 土木工程
  • 238 篇 理学
    • 153 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 16 篇 化学
  • 129 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 21 篇 基础医学(可授医学...
    • 12 篇 公共卫生与预防医...
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 8 篇 经济学
  • 7 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 53 篇 computational mo...
  • 46 篇 data models
  • 43 篇 training
  • 41 篇 federated learni...
  • 38 篇 deep learning
  • 33 篇 neural networks
  • 26 篇 transformers
  • 25 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 222 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 shandong fundame...
  • 37 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 22 篇 shandong provinc...
  • 20 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 16 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 15 篇 xi'an key labora...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 shen yulong
  • 17 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 chen yanping
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 jing zhao
  • 11 篇 xiaohui han

语言

  • 884 篇 英文
  • 65 篇 其他
  • 12 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
959 条 记 录,以下是921-930 订阅
排序:
On the Secrecy of UAV Systems With Linear Trajectory
arXiv
收藏 引用
arXiv 2020年
作者: Pan, Gaofeng Lei, Hongjiang An, Jianping Zhang, Shuo Alouini, Mohamed-Slim School of Information and Electronics Engineering Beijing Institute of Technology Beijing100081 China Thuwal23955-6900 Saudi Arabia School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Shannxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xi’anShaanxi710121 China School of Information and Electronics Engineering Beijing Institute of Technology Beijing100081 China National Key Laboratory of Science and Technology on Aerospace Intelligence Control Beijing100854 China Beijing Aerospace Automatic Control Institute Beijing100854 China Thuwal23955-6900 Saudi Arabia
By observing the fact that moving in a straight line is a common flying behavior of unmanned aerial vehicles (UAVs) in normal applications, e.g., power line inspections, and air patrols along with highway/streets/bord... 详细信息
来源: 评论
Research on the Distribution Characteristics of Standardized Big Data Resources Based on Data Visualization——Taking Standardization Practice in Shandong Province as an Example
Research on the Distribution Characteristics of Standardized...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Jinyang Sun Dongdong Peng Zhe Lu Mengran Zhai Ning Qi Yuanhua Qi SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China Jinan Municipal Bureau of Big Data Jinan China Shandong Institute of Economy and Informatization Development Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology Shandong Academy of Sciences Jinan China
Standardized big data, as a product of the combination of big data and standardization work, objectively reflects the status quo and trends of standardization work. An in-depth study of the distribution characteristic... 详细信息
来源: 评论
A Resilient Decentralized Learning Approach against Byzantine Attack via Reputation Evaluation
A Resilient Decentralized Learning Approach against Byzantin...
收藏 引用
Youth Academic Annual Conference of Chinese Association of Automation (YAC)
作者: Heng Zhang Wenting Wang Xuguo Jiao Ming Yang Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan P. R. China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan P. R. China College of Control Science and Engineering Zhejiang University Hangzhou China State Grid Shandong Electric Power Research Institute Jinan China School of Information and Control Engineering Qingdao University of Technology Qingdao China
Machine learning is a key component of many applications, among which decentralized learning has attracted wide attention because of its cost-effectiveness and high efficiency. However, decentralized learning is vulne... 详细信息
来源: 评论
Federated Learning over Coupled Graphs
arXiv
收藏 引用
arXiv 2023年
作者: Lei, Runze Wang, Pinghui Zhao, Junzhou Lan, Lin Tao, Jing Deng, Chao Feng, Junlan Wang, Xidian Guan, Xiaohong The MOE Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University P.O. Box 1088 No. 28 Xianning West Road Shaanxi Xi’an710049 China China Mobile Research Institute China China Mobile Group Design Institute China The Center for Intelligent and Networked Systems Tsinghua National Lab for Information Science and Technology Tsinghua University Beijing100084 China
Graphs are widely used to represent the relations among entities. When one owns the complete data, an entire graph can be easily built, therefore performing analysis on the graph is straightforward. However, in many s... 详细信息
来源: 评论
Exploiting Gabor Feature Extraction Method for Chinese Character Writing Quality Evaluation
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1575卷
作者: Zhixiao Wang Wenyao Yan Mingtao Guo Jiulong Zhang School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Shaanxi Key Laboratory Xi'an of Network Computing and Security Technology China School of Data Science and Computer Xi'an innovation college of Yan'an University Xi'an 710100 China
The automatic evaluation of Chinese character writing quality has a wide application prospect. Most of the existing evaluation methods of Chinese character writing quality are based on radical segmentation and feature...
来源: 评论
Similarity Algorithm Based on Minimum Tilt Outer Rectangle Clustering of UAV Videos
Similarity Algorithm Based on Minimum Tilt Outer Rectangle C...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Wei Ding Luyao Wang Wei Zhang Myung Jin Lee Ling Wang Kwang Woo Nam Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Industry-University Cooperstion Foundation Chungbuk National University Cheongju Korea School of Computer Science Northeast Electric Power University Jilin China School of Computer Science and Engineering Kunsan National University Gunsan Korea
In this paper, we propose a new UAV video similarity measurement algorithm to cluster and analyze UAV videos by measuring the similarity between UAV videos and train them in sub-groups, which in turn improves the effi... 详细信息
来源: 评论
Rapid Maize Seedling Detection Based on Receptive-Field and Cross-Dimensional Information Interaction
Rapid Maize Seedling Detection Based on Receptive-Field and ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Fengqi Hao Shulei Zhu Dexin Ma Xiangjun Dong Hoiio Kong Xia Liu Chunhua Mu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Data Science City University of Macau Macau China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Communication College Qingdao Agricultural University Qingdao China National Engineering Laboratory of Wheat and Maize/Key Laboratory of Biology and Genetic Improvement of Maize in Northern Yellow-huai River Plain Ministry of Agriculture Maize Research Institute Shandong Academy of Agricultural Sciences Jinan China
The seedling stage is important in the growth and development of maize, and it is also a critical period that affects maize yield and quality. Accurately recognizing this stage of maize is challenging, as current maiz... 详细信息
来源: 评论
IBAQ: Frequency-Domain Backdoor Attack Threatening Autonomous Driving via Quadratic Phase
收藏 引用
ACM Transactions on Autonomous and Adaptive Systems 1000年
作者: Jinghan Qiu Honglong Chen Junjian Li Yudong Gao Junwei Li Xingang Wang College of Control Science and Engineering China University of Petroleum China the Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology China
The rapid evolution of backdoor attacks has emerged as a significant threat to the security of autonomous driving models. An attacker injects a backdoor into the model by adding triggers to the samples, which can be a... 详细信息
来源: 评论
G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Haoxin Xu, Xuemiao Xu, Cheng Zhang, Huaidong Qin, Jing Wang, Yi Heng, Pheng-Ann He, Shengfeng The School of Computer Science and Engineering South China University of Technology Guangzhou China Guangdong Engineering Center for Large Model and GenAI Technology State Key Laboratory of Subtropical Building and Urban Science China The Centre for Smart Health The Hong Kong Polytechnic University Hong Kong The School of Future Technology South China University of Technology Guangzhou China The School of Computer Science and Network Security Dongguan University of Technology Dongguan China The Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong The School of Computing and Information Systems Singapore Management University Singapore
Reversible face anonymization, unlike traditional face pixelization, seeks to replace sensitive identity information in facial images with synthesized alternatives, preserving privacy without sacrificing image clarity... 详细信息
来源: 评论
Verifiable Privacy Preservation Scheme for Outsourcing Medi-cal Image to Cloud Through ROI Based Crypto-Watermarking
Verifiable Privacy Preservation Scheme for Outsourcing Medi-...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social computing (CPSCom) Green computing and Communications (GreenCom)
作者: Chuan Zhou Yi Zhou XingHan An Yan Liu Min Wang XiangZhi Liu Tianjin University Tianjin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China College of Environmental Science and Engineering Beijing Forestry University Beijing China Inspur Software Co. Ltd. Jinan China The Party School of cpc Jinan Municipal Committee Jinan China
A novel verifiable privacy preservation scheme for outsourcing medical image to cloud through ROI based crypto-watermarking is proposed in the paper. In the proposed scheme, data owner firstly carries out substitution...
来源: 评论