咨询与建议

限定检索结果

文献类型

  • 717 篇 会议
  • 320 篇 期刊文献

馆藏范围

  • 1,037 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 544 篇 工学
    • 413 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 148 篇 信息与通信工程
    • 121 篇 电气工程
    • 65 篇 控制科学与工程
    • 60 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 38 篇 网络空间安全
    • 37 篇 机械工程
    • 27 篇 光学工程
    • 25 篇 交通运输工程
    • 25 篇 安全科学与工程
    • 24 篇 生物医学工程(可授...
    • 22 篇 仪器科学与技术
    • 20 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 动力工程及工程热...
  • 244 篇 理学
    • 153 篇 数学
    • 52 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 43 篇 生物学
    • 21 篇 系统科学
    • 19 篇 化学
  • 127 篇 管理学
    • 76 篇 管理科学与工程(可...
    • 67 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 27 篇 医学
    • 23 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 7 篇 教育学
  • 6 篇 经济学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 102 篇 feature extracti...
  • 98 篇 accuracy
  • 69 篇 federated learni...
  • 66 篇 semantics
  • 65 篇 computational mo...
  • 53 篇 data models
  • 50 篇 training
  • 39 篇 deep learning
  • 35 篇 transformers
  • 34 篇 neural networks
  • 31 篇 robustness
  • 31 篇 adaptation model...
  • 28 篇 optimization
  • 25 篇 predictive model...
  • 25 篇 privacy
  • 24 篇 data mining
  • 24 篇 measurement
  • 24 篇 attention mechan...
  • 23 篇 object detection
  • 22 篇 real-time system...

机构

  • 274 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 60 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 40 篇 shandong provinc...
  • 39 篇 school of comput...
  • 38 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 17 篇 shaanxi key labo...
  • 16 篇 quan cheng labor...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 xi'an key labora...
  • 14 篇 key laboratory o...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 18 篇 xiangzhi liu
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 15 篇 haiyan jin
  • 15 篇 wei zhang
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 chunxiao wang
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lu wenpeng

语言

  • 831 篇 英文
  • 196 篇 其他
  • 18 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
1037 条 记 录,以下是981-990 订阅
排序:
Stability analysis of information spreading on SNS based on refined SEIR model
收藏 引用
China Communications 2014年 第11期11卷 24-33页
作者: Wang, Chao Hu, Yuanping Liu, Chengyuan Liu, Zhihong Ma, Jianfeng School of Computer Science and Technology Xidian University Xi'an 710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China
Investigating the stability of information spreading over SNS helps to understand the principles inherent in the spreading behavior. This paper explores the mechanisms of information spreading including stifling mecha... 详细信息
来源: 评论
Color image encryption using iterative phase retrieve process in quaternion Fourier transform domain
Color image encryption using iterative phase retrieve proces...
收藏 引用
2014年光子与光学工程国际会议暨西部光子学学术会议
作者: Liansheng Sui K.Duan Xi’an University of Technology &Shaanxi Key Laboratory for Network Computing and Security Technology(China) Xi’an University of Technology(China)
A single-channel color image encryption method is proposed based on iterative phase retrieve process in quaternion Fourier transform ***,three components of the plain color image is confused respectively by using cat ... 详细信息
来源: 评论
Independent component analysis based on information bottleneck
Abstract and Applied Analysis
收藏 引用
Abstract and Applied Analysis 2015年 第1期2015卷
作者: Ke, Qiao Zhang, Jiangshe Srivastava, H.M. Wei, Wei Chen, Guang-Sheng School of Mathematics and Statistics Xi'An Jiaotong University Xi'an 710049 China Department of Mathematics and Statistics University of Victoria Victoria V8W3R4 BC Canada School of Computer Science and Engineering Xi'An University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an 710048 China Department of Construction and Information Engineering Guangxi Modern Vocational Technology College Hechi Guangxi 547000 China
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
来源: 评论
ESYN: Efficient synchronization clustering algorithm based on dynamic synchronization model
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 86-93页
作者: Dong, Xue-Wen Yang, Chao Sheng, Li-Jie Ma, Jian-Feng Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China School of Computer Science and Technology Xidian University Xi'an710071 China
Clustering is an important research field in data mining. Based on dynamical synchronization model, an efficient synchronization clustering algorithm ESYN is proposed. Firstly, based on local structure information of ... 详细信息
来源: 评论
A Parking Guidance Method Based on Parallel Particle Swarm Optimization Algorithm
A Parking Guidance Method Based on Parallel Particle Swarm O...
收藏 引用
International Conference on Computational Intelligence and security
作者: Bin Wang Ying Liu Xinhong Hei Lei Wang Zhiqiang Zhang Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China
Aiming at the problem of intelligent path guidance in the parking lot, an improved Particle Swarm Optimization Algorithm(PSO) is proposed in this paper to find the optimal path. In order to overcome the shortcomings t... 详细信息
来源: 评论
Modeling for user interaction by influence transfer effect in online social networks
Modeling for user interaction by influence transfer effect i...
收藏 引用
Conference on Local Computer networks (LCN)
作者: Qindong Sun Nan Wang Yadong Zhou Hanqin Wang Liansheng Sui Shaanxi Key Laboratory of Network Computing and Security Xi'an University of Technology Xi'an China MOE KLINNS Lab Xi'an Jiaotong University Xi'an China
User interaction is one of the most important features of online social networks, and is the basis of research of user behavior analysis, information spreading model, etc. However, existing approaches focus on the int... 详细信息
来源: 评论
An adaptively secure multi-authority ciphertext-policy ABE scheme on prime order groups
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2014年 第4期42卷 696-702页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng Ma, Jun School of Computer Science and Technology Xidian University Xi'an Shaanxi 710071 China School of Telecommunication Engineering Xidian University Xi'an Shaanxi 710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an Shaanxi 710071 China
Previous adaptively secure multi-authority attribute-based encryption (ABE) schemes suffered from superfluous computation overhead on composite order groups. To tackle this problem, an adaptively secure multi-authorit... 详细信息
来源: 评论
Energy saving model and simulation test based on 6LoWPAN wireless sensor network
收藏 引用
Open Automation and Control Systems Journal 2014年 第1期6卷 1349-1358页
作者: Zhang, Yunyi Li, Yong Zhang, Ran Wei, Wei College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China
This paper designs the mathematical model of fiber line power, optimization of wireless sensor network node and multi distributed IP, and uses C language to program the model, finally get a new energy-saving mechanism... 详细信息
来源: 评论
Multi-user access control scheme based on resources hierarchies for perceptual layer of IoT
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2014年 第1期42卷 28-35页
作者: Ma, Jun Guo, Yuan-Bo Ma, Jian-Feng Liu, Xi-Meng Li, Qi School of Computer Science and Technology Xidian University Xi'an Shaanxi 710071 China PLA Information Engineering University Zhengzhou Henan 450004 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an Shaanxi 710071 China
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, ... 详细信息
来源: 评论
Parallelization using task parallel library with task-based programming model
Parallelization using task parallel library with task-based ...
收藏 引用
IEEE International Conference on Software Engineering and Service Sciences (ICSESS)
作者: Xinhong Hei Jinlong Zhang Bin Wang Haiyan Jin Nasser Giacaman School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an Shaanxi Province China Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper ... 详细信息
来源: 评论