咨询与建议

限定检索结果

文献类型

  • 207 篇 会议
  • 95 篇 期刊文献

馆藏范围

  • 302 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 181 篇 工学
    • 146 篇 计算机科学与技术...
    • 131 篇 软件工程
    • 53 篇 信息与通信工程
    • 21 篇 电气工程
    • 21 篇 生物工程
    • 15 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 控制科学与工程
    • 11 篇 仪器科学与技术
    • 11 篇 网络空间安全
    • 7 篇 土木工程
    • 7 篇 交通运输工程
    • 7 篇 安全科学与工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 生物医学工程(可授...
    • 5 篇 化学工程与技术
  • 79 篇 理学
    • 47 篇 数学
    • 19 篇 生物学
    • 12 篇 物理学
    • 9 篇 系统科学
    • 5 篇 统计学(可授理学、...
  • 46 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 法学
    • 5 篇 法学
    • 5 篇 社会学
  • 7 篇 医学
    • 6 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 5 篇 教育学
    • 4 篇 教育学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 semantics
  • 11 篇 blockchain
  • 9 篇 network security
  • 9 篇 accuracy
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 neural networks
  • 7 篇 image enhancemen...
  • 7 篇 optimization
  • 7 篇 petri nets
  • 7 篇 predictive model...
  • 7 篇 codes
  • 7 篇 protocols
  • 7 篇 federated learni...
  • 7 篇 cloud computing
  • 6 篇 transformers
  • 6 篇 servers
  • 6 篇 benchmark testin...

机构

  • 42 篇 shaanxi key labo...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 24 篇 the state key la...
  • 18 篇 institute of blo...
  • 11 篇 xi'an university...
  • 10 篇 school of comput...
  • 9 篇 state key labora...
  • 8 篇 shaanxi key labo...
  • 7 篇 department of co...
  • 7 篇 college of compu...
  • 7 篇 shaanxi key labo...
  • 7 篇 college of xi'an...
  • 6 篇 xi'an university...
  • 6 篇 school of comput...
  • 6 篇 college of infor...
  • 6 篇 shaanxi key labo...
  • 6 篇 shaanxi key labo...
  • 5 篇 shaanxi key labo...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 14 篇 jin haiyan
  • 13 篇 li wei
  • 10 篇 wang lei
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 xiaoxue liu
  • 9 篇 shen yulong
  • 9 篇 qingqi pei
  • 9 篇 wenjiang ji
  • 8 篇 zhu lei
  • 8 篇 jingwei liu
  • 8 篇 haonan su
  • 8 篇 dong xuewen
  • 7 篇 zhao minghua

语言

  • 272 篇 英文
  • 28 篇 其他
  • 4 篇 中文
检索条件"机构=Shaanxi Key Laboratory of BlockChain and Security Computing"
302 条 记 录,以下是61-70 订阅
排序:
Adaptive Compression-Encryption Scheme for Medical Image Based on Improved Compressive Sensing and Deoxyribonucleic Acid Coding-Compression
Adaptive Compression-Encryption Scheme for Medical Image Bas...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Xue, Xianglian Jin, Haiyan Zhou, Changjun Xi'an University of Technology School of Computer Science and Engineering Xi'an China Shaanxi University of Chinese Medicine Section of Computer Teaching and Research Xianyang China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Zhejiang Normal University School of Computer Science and Technology Jinhua China
Medical images often occupy large storage space and contain patient privacy or sensitive information, which makes them difficult and unsafe to be transmitted through the network. This paper proposed an adaptive compre... 详细信息
来源: 评论
DCGSD: Low-Light Image Enhancement with Dual-Conditional Guidance Sparse Diffusion Model
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Department of Computer Science and Engineering NO. 5 South Jinhua Road Shaanxi Xi'an710048 China
When restoring low-light images, most methods largely overlook the ambiguity due to dark noise and lack discrimination for region and shape representations, resulting in invalid feature enhancement. In this work, we p... 详细信息
来源: 评论
FIT-Print: Towards False-claim-resistant Model Ownership Verification via Targeted Fingerprint
arXiv
收藏 引用
arXiv 2025年
作者: Shao, Shuo Zhu, Haozhe Yao, Hongwei Li, Yiming Zhang, Tianwei Qin, Zhan Ren, Kui State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Department of Computer Science City University of Hong Kong Hong Kong College of Computing and Data Science Nanyang Technological University Singapore
Model fingerprinting is a widely adopted approach to safeguard the intellectual property rights of open-source models by preventing their unauthorized reuse. It is promising and convenient since it does not necessitat... 详细信息
来源: 评论
Multimodal Multi-objective Particle Swarm Optimization Algorithm Based on Multi-directional Guidance  4
Multimodal Multi-objective Particle Swarm Optimization Algor...
收藏 引用
4th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2022
作者: Li, Wei Gao, Yetong Wang, Lei School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
In multimodal multi-objective optimization, the key issue is to find as many Pareto optimal solutions as possible and select promising solutions in the environmental selection. This paper proposes a multimodal multi-o... 详细信息
来源: 评论
Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration
Block-Streaming Service Loading Optimization of Android Dalv...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Wang, Yichuan Feng, Yanhua Du, Yanning Hei, Xinhong Tian, Yuying Cui, Xiangjie School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In recent years, dynamic loading technologies of Android applications have emerged in an endless stream. At present, the existing Android application loading method is to load the entire Android Dalvik Executable (DEX... 详细信息
来源: 评论
Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks
Formal Modeling and Defense Methods for 5G Network Endpoint ...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Zhang, Tong Wei, Wei Wang, Yichuan Deng, Xi Zhu, Lei Ji, Wenjiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China School of Computer Science Xi'an Shiyou University Xi'an China
5G terminal access denial-of-service attack is one of the more common types of 5G signaling network attacks. It manifests itself as a large number of abnormal access requests occupying core network resources. Normal r... 详细信息
来源: 评论
Membership Data Privacy Protection and Poisoning Detection Scheme for Federated Learning  1st
Membership Data Privacy Protection and Poisoning Detection ...
收藏 引用
1st Conference on blockchain and Web3.0 Technology Innovation and Application, BWTAC 2024
作者: Li, Yafeng Sun, Zhijun Ma, Lichuan China CETC Key Laboratory of Technology on Data Link Xi’an710068 China State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China
In the era of big data, data privacy and security are highly valued, leading to the phenomenon of "data islands", which hinders the effective utilization of data. Federated learning, as a privacy-preserving ... 详细信息
来源: 评论
Precise and Efficient:A Hybrid Analysis-Based Stack Overflow Detection Model under MIPS  9
Precise and Efficient:A Hybrid Analysis-Based Stack Overflow...
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Wang, Yichuan Huang, Chenhao Zhang, Tong Zhao, Li Gu, Zhendong Li, Gangyang Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China Hanjiang.to.Weihan River Valley Water Diversion Project Construction.co.ltd Xi'an China
Although the vulnerability detection techniques under the MIPS platform can detect stack overflow vulnerabilities, the stack overflow vulnerability of the stack frame changes is complex and hard to recover. The input ... 详细信息
来源: 评论
Cross Elitist Learning Multifactorial Evolutionary Algorithm  1
收藏 引用
3rd International Conference on Neural computing for Advanced Applications, NCAA 2022
作者: Li, Wei Luo, Haonan Wang, Lei School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China
Multifactorial Evolutionary Algorithm (MFEA) is a popular optimization algorithm in recent years. It has implicit parallelism and can solve different problems at the same time in the same search space. However, premat... 详细信息
来源: 评论
Adaptive Region Sampling Network For Polarimetric SAR Image Classification
Adaptive Region Sampling Network For Polarimetric SAR Image ...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Junfei Shi Shanshan Ji Haiyan Jin Haonan Su Zhiyong Lv Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China
Deep learning models have demonstrated excellent performance for polarimetric SAR image classification. However, existing approaches generally use a fixed square window to sample image blocks as the network input, whi... 详细信息
来源: 评论