咨询与建议

限定检索结果

文献类型

  • 207 篇 会议
  • 96 篇 期刊文献

馆藏范围

  • 303 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 181 篇 工学
    • 146 篇 计算机科学与技术...
    • 131 篇 软件工程
    • 53 篇 信息与通信工程
    • 22 篇 电气工程
    • 21 篇 生物工程
    • 15 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 控制科学与工程
    • 11 篇 仪器科学与技术
    • 11 篇 网络空间安全
    • 7 篇 土木工程
    • 7 篇 交通运输工程
    • 7 篇 安全科学与工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 生物医学工程(可授...
    • 5 篇 化学工程与技术
  • 79 篇 理学
    • 47 篇 数学
    • 19 篇 生物学
    • 12 篇 物理学
    • 9 篇 系统科学
    • 5 篇 统计学(可授理学、...
  • 46 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 法学
    • 5 篇 法学
    • 5 篇 社会学
  • 7 篇 医学
    • 6 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 5 篇 教育学
    • 4 篇 教育学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 semantics
  • 11 篇 blockchain
  • 9 篇 network security
  • 9 篇 accuracy
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 neural networks
  • 7 篇 image enhancemen...
  • 7 篇 optimization
  • 7 篇 petri nets
  • 7 篇 predictive model...
  • 7 篇 codes
  • 7 篇 protocols
  • 7 篇 federated learni...
  • 7 篇 cloud computing
  • 6 篇 transformers
  • 6 篇 servers
  • 6 篇 benchmark testin...

机构

  • 42 篇 shaanxi key labo...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 24 篇 the state key la...
  • 18 篇 institute of blo...
  • 11 篇 xi'an university...
  • 10 篇 school of comput...
  • 9 篇 state key labora...
  • 8 篇 shaanxi key labo...
  • 7 篇 department of co...
  • 7 篇 college of compu...
  • 7 篇 shaanxi key labo...
  • 7 篇 college of xi'an...
  • 6 篇 xi'an university...
  • 6 篇 school of comput...
  • 6 篇 college of infor...
  • 6 篇 shaanxi key labo...
  • 6 篇 shaanxi key labo...
  • 5 篇 shaanxi key labo...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 14 篇 jin haiyan
  • 13 篇 li wei
  • 10 篇 wang lei
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 xiaoxue liu
  • 9 篇 shen yulong
  • 9 篇 qingqi pei
  • 9 篇 wenjiang ji
  • 8 篇 zhu lei
  • 8 篇 jingwei liu
  • 8 篇 haonan su
  • 8 篇 dong xuewen
  • 7 篇 zhao minghua

语言

  • 273 篇 英文
  • 28 篇 其他
  • 4 篇 中文
检索条件"机构=Shaanxi Key Laboratory of BlockChain and Security Computing"
303 条 记 录,以下是31-40 订阅
排序:
Prediction of miRNA family based on class-incremental learning
Prediction of miRNA family based on class-incremental learni...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Liu, Yajun Qiu, Lulu Li, Aimin Fei, Rong Li, Junhuai Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Division of Biomedical Engineering Department of Mechanical Engineering Department of Computer Science Saskatoon Canada
With the development of deep sequencing, recent studies indicate that a miRNA precursor can generate multiple miRNA isoforms (isomiRs). The family prediction of canonical miRNAs and isomiRs could provide a basis for m... 详细信息
来源: 评论
Multi-Grained Feature Pruning for Video-Based Human Pose Estimation
Multi-Grained Feature Pruning for Video-Based Human Pose Est...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wang, Zhigang Fan, Shaojing Liu, Zhenguang Wu, Zheqi Wu, Sifan Jiao, Yingying College of Computer Science and Technology Zhejiang Gongshang University Hangzhou China School of Computing National University of Singapore Singapore The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Institute of Blockchain and Data Security Hangzhou China College of Computer Science and Technology Jilin University Changchun China College of Computer Science and Technology Zhejiang University of Technology Hangzhou China
Human pose estimation, with its broad applications in action recognition and motion capture, has experienced significant advancements. However, current Transformer-based methods for video pose estimation often face ch... 详细信息
来源: 评论
IMPACT: Importance-Informed Prefetching and Caching for I/O-Bound DNN Training
收藏 引用
IEEE Transactions on Computers 2025年
作者: Chen, Weijian He, Shuibing Zhang, Ruidong Zhang, Xuechen Chen, Ping Yang, Siling Qu, Haoyang Zhan, Xuan Zhejiang University State Key Laboratory of Blockchain and Data Security China Institute of Blockchain and Data Security Hangzhou China Zhejiang Key Laboratory of Big Data Intelligent Computing China Washington State University Vancouver School of Engineering and Computer Science VancouverWA98686 United States
Fetching large amounts of DNN training data from storage systems causes high I/O latency and GPU stalls. Importance sampling can reduce data processing on GPUs while maintaining model accuracy, but current frameworks ... 详细信息
来源: 评论
ZEROECG: Zero-Sensation ECG Monitoring by Exploring RFID MOSFET  24
ZEROECG: Zero-Sensation ECG Monitoring by Exploring RFID MOS...
收藏 引用
30th International Conference on Mobile computing and Networking, ACM MobiCom 2024
作者: Jiao, Wenli Wang, Ju Gao, Xinzhuo Du, Long Li, Yanlin Zhao, Lili Fang, Dingyi Chen, Xiaojiang Northwest University Shaanxi Xi'an China Shaanxi International Joint Research Centre for the Battery-Free Internet of Things China Xi'an Advanced Battery-Free Sensing and Computing Technology International Science and Technology Cooperation Base China Xi'an Key Laboratory of Advanced Computing and Software Security China
ECG monitoring during human activities is crucial since many heart attacks occur when people are exercising, driving a car, operating a machine, etc. Unfortunately, existing ECG monitoring devices fail to timely detec... 详细信息
来源: 评论
A Semi-supervised Protein Complex Identification Algorithm Based on Sparseness Constraint
A Semi-supervised Protein Complex Identification Algorithm B...
收藏 引用
2024 International Conference on Applied Mathematics, Modelling and Statistics Application, AMMSA 2024
作者: Liu, Guangming Dang, Fengqing Wang, Bin Peng, Yonghong Wang, Xiaofan Tan, Li School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'An University of Technology Shaanxi Xi'an China Faculty of Science and Engineering Computing and Information Science Cambridge United Kingdom School of Computer and Information Engineering Beijing Technology and Business University Beijing China
Recognising protein complexes in protein interaction networks is crucial, but poses a major challenge due to the frequency of noisy interactions. These networks typically involve numerous protein complexes, with each ... 详细信息
来源: 评论
Sustainability Forecasting for Deep Learning Packages  31
Sustainability Forecasting for Deep Learning Packages
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Han, Junxiao Wang, Yunkun Liu, Zhongxin Bao, Lingfeng Liu, Jiakun Lo, David Deng, Shuiguang School of Computer & Computing Science Hangzhou City University Hangzhou China College of Computer Science and Technology Zhejiang University Hangzhou China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China School of Computing and Information Systems Singapore Management University Singapore Singapore
Deep Learning (DL) technologies have been widely adopted to tackle various tasks. In this process, through software dependencies, a multi-layer DL supply chain (SC) is formed, with DL frameworks acting as the root, DL... 详细信息
来源: 评论
A Self-adaptive Single-Objective Multitasking Optimization Algorithm  1
收藏 引用
17th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2022
作者: Li, Xiaoyu Wang, Lei Jiang, Qiaoyong Li, Wei Wang, Bin The Key Laboratory of Network Computing and Security Technology of Shaanxi Province Xi’an University of Technology Xi’an710048 China The Key Laboratory of Industrial Automation of Shaanxi Province Shaanxi University of Technology Hanzhong723001 China School of Electronic and Information Engineering Ankang University Ankang725000 China
Evolutionary multitasking optimization algorithms have been presented for dealing with multiple tasks simultaneously. Many studies have proved that EMTOs often perform better than conventional single-task evolutionary... 详细信息
来源: 评论
SoK: On the Role and Future of AIGC Watermarking in the Era of Gen-AI
arXiv
收藏 引用
arXiv 2024年
作者: Ren, Kui Yang, Ziqi Lu, Li Liu, Jian Li, Yiming Wan, Jie Zhao, Xiaodi Feng, Xianheng Shao, Shuo The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China College of Computing and Data Science Nanyang Technological University Singapore
The rapid advancement of AI technology, particularly in generating AI-generated content (AIGC), has transformed numerous fields, e.g., art video generation, but also brings new risks, including the misuse of AI for mi... 详细信息
来源: 评论
LeapGNN: accelerating distributed GNN training leveraging feature-centric model migration  25
LeapGNN: accelerating distributed GNN training leveraging fe...
收藏 引用
Proceedings of the 23rd USENIX Conference on File and Storage Technologies
作者: Weijian Chen Shuibing He Haoyang Qu Xuechen Zhang The State Key Laboratory of Blockchain and Data Security Zhejiang University and Zhejiang Lab and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security and Zhejiang Key Laboratory of Big Data Intelligent Computing Washington State University Vancouver
Distributed training of graph neural networks (GNNs) has become a crucial technique for processing large graphs. Prevalent GNN frameworks are model-centric, necessitating the transfer of massive graph vertex features ...
来源: 评论
key Management and Authentication Scheme Forward Trusted Pervasive Container computing  2
Key Management and Authentication Scheme Forward Trusted Per...
收藏 引用
2nd International Conference on Big Data and Privacy computing, BDPC 2024
作者: Hei, XinHong Xue, YuZhan Wang, YiChuan Liu, YiFan Peng, Chen Sun, Xiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cloud computing technology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa... 详细信息
来源: 评论