咨询与建议

限定检索结果

文献类型

  • 648 篇 会议
  • 311 篇 期刊文献

馆藏范围

  • 959 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 524 篇 工学
    • 391 篇 计算机科学与技术...
    • 330 篇 软件工程
    • 148 篇 信息与通信工程
    • 121 篇 电气工程
    • 60 篇 控制科学与工程
    • 57 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 39 篇 网络空间安全
    • 37 篇 机械工程
    • 28 篇 光学工程
    • 28 篇 安全科学与工程
    • 26 篇 交通运输工程
    • 26 篇 生物医学工程(可授...
    • 22 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 12 篇 土木工程
  • 238 篇 理学
    • 153 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 16 篇 化学
  • 129 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 21 篇 基础医学(可授医学...
    • 12 篇 公共卫生与预防医...
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 8 篇 经济学
  • 7 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 53 篇 computational mo...
  • 46 篇 data models
  • 43 篇 training
  • 41 篇 federated learni...
  • 38 篇 deep learning
  • 33 篇 neural networks
  • 26 篇 transformers
  • 25 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 222 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 shandong fundame...
  • 37 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 22 篇 shandong provinc...
  • 20 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 16 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 15 篇 xi'an key labora...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 shen yulong
  • 17 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 chen yanping
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 jing zhao
  • 11 篇 xiaohui han

语言

  • 884 篇 英文
  • 65 篇 其他
  • 12 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
959 条 记 录,以下是941-950 订阅
排序:
Crsanet: Class Representations Self-Attention network for the Segmentation of Thyroid Nodules
SSRN
收藏 引用
SSRN 2023年
作者: Sun, Shiyao Fu, Chong Xu, Sen Wen, Yingyou Ma, Tao School of Computer Science and Engineering Northeastern University Shenyang110819 China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China General Hospital of Northern Theatre Command Shenyang110016 China Medical Imaging Research Department Neusoft Research of Intelligent Healthcare Technology Co. Ltd. Shenyang China Dopamine Group Ltd. Auckland1542 New Zealand
Segmenting accurate thyroid nodules in medical ultrasound images is always non-trivial due to the large variation in size, shape and texture of nodules, and also the presence of surrounding tissues and organs with sim... 详细信息
来源: 评论
Corrigendum to “A variable-length model for masquerade detection” [J. Syst. Softw. 85 (2012) 2470–2478]
收藏 引用
Journal of Systems and Software 2013年 第3期86卷 868-868页
作者: Xi Xiao Xinguang Tian Qibin Zhai Shutao Xia Graduate School at Shenzhen Tsinghua University 518055 Shenzhen China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences 100049 Beijing China Key Laboratory of Network Science and Technology Institute of Computing Technology Chinese Academy of Sciences 100190 Beijing China
来源: 评论
Intelligent decoding method for Ground-penetrating radar based on improved YOLOv5
Intelligent decoding method for Ground-penetrating radar bas...
收藏 引用
Computer, Big Data and Artificial Intelligence (ICCBD+AI), International Conference on
作者: ZeYu Chen YongKang Wang HongLiang Liu Chuan Wang XinBo Jiang Ning Zhang Zhen Huang Lei Jiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) JiNan China Technological Innovation Department Shandong Hi-Speed Group Co Ltd JiNan China School of Qilu Transportation Shandong University JiNan China No.1 Engineering Development Co. Ltd. of China Railway 14Th Bureau Group RiZhao China
Ground-penetrating radar (GPR) is a non-invasive detection technique that effectively gathers information about subsurface materials. In tunneling projects, GPR can provide a fast and accurate forecast of the geologic... 详细信息
来源: 评论
A Novel Method for ECG Signal Classification via One-Dimensional Convolutional Neural network
arXiv
收藏 引用
arXiv 2020年
作者: Hua, Xuan Han, Jungang Zhao, Chen Tang, Haipeng He, Zhuo Tang, Jinshan Chen, Qing-Hui Tang, Shaojie Zhou, Weihua College of Electronic Engineering Xi’an University of Posts and Telecommunications Xi’an710121 China Key Laboratory of Network Data Analysis and Intelligent Processing in Shaanxi Xi’an710121 China College of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an710121 China College of Computing Michigan Technological University HoughtonMI49931 United States School of Computing University of Southern Mississippi Long Beach39560 United States Deprtment of Kinesiology and Integrative Physiology Michigan Technological University HoughtonMI49931 United States School of Automation Xi’an University of Posts and Telecommunications Xi’an710121 China
This paper presents an end-to-end ECG signal classification method based on a novel segmentation strategy via 1D Convolutional Neural networks (CNN) to aid the classification of ECG signals. The ECG segmentation strat... 详细信息
来源: 评论
A Systematic Literature Review of Robust Federated Learning: Issues, Solutions, and Future Research Directions
收藏 引用
ACM computing Surveys 1000年
作者: Md Palash Uddin Yong Xiang Mahmudul Hasan Jun Bai Yao Zhao Longxiang Gao School of Information Technology Deakin University Burwood Australia Deakin University Burwood Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Academy of Sciences Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Federated Learning (FL) has emerged as a promising paradigm for training machine learning models across distributed devices while preserving their data privacy. However, the robustness of FL models against adversarial... 详细信息
来源: 评论
A 2-bit graphene encoder based on the plasmon-induced transparency effect and its sensing characteristics
收藏 引用
Results in Physics 2024年 59卷
作者: Zhu, Aijun Li, Zongteng Hou, Weigang Yang, Xinghua Cheng, Lei Hu, Cong Qiao, Fei Mahapatra, Rabi Guangxi Key Laboratory of Automatic Detecting Technology and Instruments Guilin University of Electronic Technology Guilin 541004 China Shanxi Key Laboratory of Advanced Semiconductor Optoelectronic Devices and Integrated Systems Jincheng Shanxi 048000 China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing 400000 China College of Science Beijing Forestry University Beijing 100083 China Jincheng Research Institute of Opto-mechatronics Industry Jincheng Shanxi 048000 China Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips Guangxi Normal University Guilin 541004 China Department of Electronic Engineering Tsinghua University Beijing 100084 China Department of Computer Science and Engineering Texas A&M University College Station 77843-3112 TX United States
A 2-bit encoder based on the plasmon-induced transparency (PIT) effect was proposed and investigated in the range from 2 to 7 THz. The Lorentz oscillation coupling model was utilized to confirm the simulation. By tuni... 详细信息
来源: 评论
S3 Agent: Unlocking the Power of VLLM for Zero-Shot Multi-modal Sarcasm Detection
收藏 引用
ACM Transactions on Multimedia computing, Communications, and Applications 1000年
作者: Peng Wang Yongheng Zhang Hao Fei Qiguang Chen Yukai Wang Jiasheng Si Wenpeng Lu Min Li Libo Qin School of Computer Science and Engineering Central South University China National University of Singapore Singapore Harbin Institute of Technology China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Multi-modal sarcasm detection involves determining whether a given multi-modal input conveys sarcastic intent by analyzing the underlying sentiment. Recently, vision large language models have shown remarkable success... 详细信息
来源: 评论
Risk Modeling and Traceability of Boundary Attacks on Internet of Power Systems Based on Complex networks
Risk Modeling and Traceability of Boundary Attacks on Intern...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Xin Li Zhaoyang Qu Tong Yu Ming Xie Fu Yu Wei Ding School of Electrical Engineering Northeast Electric Power University Jilin China People’s Bank of China Qinghai Provincial Branch Xining China China Southern Power Grid Guangxi Power Grid Co. Ltd. Research Institute Nanning China Bijie Power Supply Bureau China Guizhou Power Grid Co. Ltd. Bijie China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the increasing intelligence of power IoT terminal devices, the massive volume of data transmission, and the widespread adoption of shared services, traditional terminal boundary security mechanisms are unable to ... 详细信息
来源: 评论
Is AI Robust Enough for Scientific Research?
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Jun-Jie Song, Jiahao Wang, Xiu-Cheng Li, Fu-Peng Liu, Zehan Chen, Jian-Nan Dang, Haoning Wang, Shiyao Zhang, Yiyan Xu, Jianhui Shi, Chunxiang Wang, Fei Pang, Long-Gang Cheng, Nan Zhang, Weiwei Zhang, Duo Meng, Deyu Northwest Institute of Nuclear Technology No. 28 Pingyu Road Shaanxi Xi’an710024 China School of Telecommunications Engineering Xidian University No. 2 South Taibai Road Shaanxi Xi’an710071 China State Key Laboratory of ISN No. 2 South Taibai Road Shaanxi Xi’an710071 China Institute of Particle Physics Central China Normal University No. 152 Luoyu Road Hubei Wuhan30079 China School of Computer Science and Technology Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China Guangzhou Institute of Geography Academy of Sciences No. 100 Xianlie Road Guangdong Guangzhou510070 China National Meteorological Information Center Beijing100044 China MDX Research Center for Element Strategy Institute of Integrated Research Institute of Science Tokyo Midori-ku Yokohama226-8503 Japan School of Physics and Information Technology Shaanxi Normal University No. 620 West Chang’an Avenue Shaanxi Xi’an710119 China School of Aeronautics Northwestern Polytechnical University No. 127 West Youyi Road Shaanxi Xi’an710072 China AI for Science Institute Beijing100080 China DP Technology Beijing100080 China Academy for Advanced Interdisciplinary Studies Peking University Beijing100871 China School of Mathematics and Statistics Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China
We uncover a phenomenon largely overlooked by the scientific community utilizing AI: neural networks exhibit high susceptibility to minute perturbations, resulting in significant deviations in their outputs. Through a... 详细信息
来源: 评论
A Hybrid Fault Diagnosis Method for Rolling Bearing Based on Attention and CNN
A Hybrid Fault Diagnosis Method for Rolling Bearing Based on...
收藏 引用
Robotics, Intelligent Control and Artificial Intelligence (RICAI), International Conference on
作者: Songtao Wang Qianlong Liu Jun Li Kun Liang Hui Cai Hangwei Tian Shandong Hi-Speed Construction Management Group Co. Ltd. Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd. Jinan China Shandong Hi-Speed Group Linteng Highway Co. Ltd. Jinan China School of Qilu Transportation Shandong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
In the field of mechanical manufacturing, rolling bearings are important core components. To achieve stable rotational operation, improving diagnostic accuracy has become an urgent issue. In this paper, a hybrid fault...
来源: 评论