咨询与建议

限定检索结果

文献类型

  • 226 篇 会议
  • 128 篇 期刊文献

馆藏范围

  • 354 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 243 篇 工学
    • 190 篇 计算机科学与技术...
    • 167 篇 软件工程
    • 79 篇 信息与通信工程
    • 40 篇 生物工程
    • 29 篇 电气工程
    • 26 篇 控制科学与工程
    • 19 篇 生物医学工程(可授...
    • 18 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 光学工程
    • 11 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 10 篇 网络空间安全
    • 9 篇 动力工程及工程热...
    • 9 篇 安全科学与工程
    • 7 篇 仪器科学与技术
  • 130 篇 理学
    • 73 篇 数学
    • 39 篇 生物学
    • 30 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 13 篇 化学
    • 13 篇 系统科学
  • 81 篇 管理学
    • 44 篇 图书情报与档案管...
    • 40 篇 管理科学与工程(可...
    • 18 篇 工商管理
  • 21 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 11 篇 药学(可授医学、理...
  • 15 篇 法学
    • 12 篇 社会学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 24 篇 feature extracti...
  • 17 篇 semantics
  • 13 篇 training
  • 11 篇 accuracy
  • 9 篇 deep learning
  • 9 篇 predictive model...
  • 8 篇 reinforcement le...
  • 8 篇 data models
  • 7 篇 image enhancemen...
  • 7 篇 convolution
  • 7 篇 contrastive lear...
  • 7 篇 graph neural net...
  • 7 篇 visualization
  • 6 篇 task analysis
  • 6 篇 neural networks
  • 6 篇 machine learning
  • 6 篇 time series anal...
  • 6 篇 correlation
  • 6 篇 forecasting
  • 5 篇 object detection

机构

  • 57 篇 college of compu...
  • 49 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 31 篇 fujian key labor...
  • 31 篇 fujian provincia...
  • 27 篇 shaanxi key labo...
  • 25 篇 school of comput...
  • 18 篇 engineering rese...
  • 17 篇 key laboratory o...
  • 16 篇 xi'an key labora...
  • 15 篇 college of mathe...
  • 13 篇 shaanxi key labo...
  • 11 篇 shaanxi key labo...
  • 10 篇 fujian key labor...
  • 9 篇 xi'an university...
  • 9 篇 fuzhou universit...
  • 8 篇 fujian provincia...
  • 8 篇 xi’an key labora...
  • 6 篇 school of comput...
  • 6 篇 xi'an university...

作者

  • 28 篇 wang zhongmin
  • 23 篇 chen yanping
  • 19 篇 guo kun
  • 18 篇 guo wenzhong
  • 15 篇 xia hong
  • 14 篇 gao cong
  • 14 篇 zhongmin wang
  • 13 篇 yanping chen
  • 12 篇 wang shiping
  • 11 篇 ma sugang
  • 10 篇 yu zhiyong
  • 10 篇 pan xiaoying
  • 10 篇 sun jiaze
  • 9 篇 liu jun
  • 9 篇 hou zhiqiang
  • 9 篇 yang xiaobao
  • 7 篇 hong xia
  • 7 篇 huang fangwan
  • 7 篇 bai zongwen
  • 7 篇 kun guo

语言

  • 336 篇 英文
  • 12 篇 中文
  • 11 篇 其他
检索条件"机构=Shaanxi Key Laboratory of Network Data Intelligent Processing"
354 条 记 录,以下是111-120 订阅
排序:
Text Guided Road Marking Point Cloud Completion  6
Text Guided Road Marking Point Cloud Completion
收藏 引用
6th International Conference on Next Generation data-Driven networks, NGDN 2024
作者: He, Xu Xu, Qihong Luo, Huan Fuzhou University College of Computer and Data Science Fuzhou China Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China
With the continuous development of intelligent transportation technologies such as autonomous driving and navigation, accurate perception of road markings becomes crucial. However, due to limitations in sensor perspec... 详细信息
来源: 评论
A conditional-probability zone transformation coding method for categorical features  19
A conditional-probability zone transformation coding method ...
收藏 引用
2019 ACM Turing Celebration Conference - China, ACM TURC 2019
作者: He, Liang Shen, Chao Li, Yun National Key Laboratory of Science and Technology on Blind Signal Processing Chengdu Sichuan China MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'an China
It has been a key issue for solving problems efficiently by machine learning models with code categorical features. The state-of-the-art one-hot coding is a widely accepted method to convert the categorical features i... 详细信息
来源: 评论
Moving Forward Together: A Multi-User Pattern Extraction Neural Model for Sequential Recommendations  23
Moving Forward Together: A Multi-User Pattern Extraction Neu...
收藏 引用
Proceedings of the 2023 6th International Conference on Artificial Intelligence and Pattern Recognition
作者: Xiangpeng Du Xiaoge Li Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xian University of Posts and Telecommunications China
The sequential recommendation is a very important task in recommendation systems. The aim of it is to dynamic predict user's interests based on their historical behaviors. Despite recent progress, most of deep lea... 详细信息
来源: 评论
An Adaptive Model Update Object Tracking Algorithm based on DenseNet Features
An Adaptive Model Update Object Tracking Algorithm based on ...
收藏 引用
2020 International Conference on networking and network Applications, NaNA 2020
作者: Ma, Sugang Zhang, Lei Pu, Lei Yang, Xiaobao Hou, Zhiqiang Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Xi'an shaanxi710121 China School of Computer Science and Technology Xi'an University of Posts and Telecommunications Xi'an shaanxi710121 China School of Information and Navigation Air Force Engineering University Xi'an shaanxi710077 China
In order to further improve the ability to deal with complex scenes, a visual tracking algorithm based on DenseNet features and model adaptive updating is proposed. Aiming to improve the feature representation ability... 详细信息
来源: 评论
IGED:Towards intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 1851-1866页
作者: Yanhua Liu Yuting Han HuiChen Baokang Zhao XiaofengWang Ximeng Liu College of Computer and Data Science Fuzhou UniversityFuzhou350108China Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou350108China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350108China College of Computer National University of Defense TechnologyChangsha410073China
As the scale of the networks continually expands,the detection of distributed denial of service(DDoS)attacks has become increasingly *** propose an intelligent detection model named IGED by using improved generalized ... 详细信息
来源: 评论
A Multi-stage Feature Enhancement network with Second-Attention for Image Captioning  6
A Multi-stage Feature Enhancement Network with Second-Attent...
收藏 引用
6th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2023
作者: Yang, Xiaobao Yang, Yang Wu, Junsheng Ma, Sugang Hou, Zhiqiang Song, Bohui Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China School of Computer Science Northwestern Polytechnical University Xi'an710071 China
In the past few years, self-attention in Transformer has been widely used in natural language processing (NLP) and computer vision (CV) due to its excellent ability to capture global information, especially in image c... 详细信息
来源: 评论
Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining
Plagiarism Detection of Multi-threaded Programs Using Freque...
收藏 引用
作者: Tian, Zhenzhou Wang, Qing Gao, Cong Chen, Lingwei Wu, DInghao School of Computer Science and Technology Xi'An University of Posts and Telecommunications China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an Shaanxi710121 China College of Information Sciences and Technology The Pennsylvania State University University ParkPA16802 United States
Software dynamic birthmark techniques construct birthmarks using the captured execution traces from running the programs, which serve as one of the most promising methods for obfuscation-resilient software plagiarism ... 详细信息
来源: 评论
Privacy protection oriented on data stream computing
Privacy protection oriented on data stream computing
收藏 引用
2022 International Conference on Computer Application and Information Security, ICCAIS 2022
作者: He, Renjie Zheng, Xianghan Wang, Gong School of Computer and Big Data Fuzhou University Fujian Fuzhou China The Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fujian Fuzhou China
data security has always been one of the public concerns, and homomorphic encryption technology, as one of the effective means to ensure data security, has always been a hot topic of academic research. Traditional mac... 详细信息
来源: 评论
Real-Time Semantic Segmentation Algorithm Based on Tversky Loss Function and Mixed Pooling
Real-Time Semantic Segmentation Algorithm Based on Tversky L...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Xu, Peng Zhao, Ziyi Ma, Sugang Xi'an Science and Technology Museum Shaanxi Xi'an710002 China School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Shaanxi Xi'an710121 China
In recent years, semantic segmentation methods based on deep learning have made remarkable developments. Despite achieving high segmentation accuracy, the performance of real-time segmentation methods cannot satisfy r... 详细信息
来源: 评论
Plagiarism detection of multi-threaded programs using frequent behavioral pattern mining  32
Plagiarism detection of multi-threaded programs using freque...
收藏 引用
32nd International Conference on Software Engineering and Knowledge Engineering, SEKE 2020
作者: Wang, Qing Tian, Zhenzhou Gao, Cong Chen, Lingwei School of Computer Science and Technology Xi'an University of Posts and Telecommunications Xi'an China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an China College of Information Sciences and Technology Pennsylvania State University PA United States
Software dynamic birthmark techniques construct birthmarks using the captured execution traces from running the programs, which serve as one of the most promising methods for obfuscation-resilient software plagiarism ... 详细信息
来源: 评论