咨询与建议

限定检索结果

文献类型

  • 445 篇 会议
  • 96 篇 期刊文献

馆藏范围

  • 541 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 218 篇 工学
    • 170 篇 计算机科学与技术...
    • 148 篇 软件工程
    • 61 篇 信息与通信工程
    • 58 篇 电气工程
    • 32 篇 控制科学与工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 生物工程
    • 17 篇 机械工程
    • 16 篇 交通运输工程
    • 16 篇 网络空间安全
    • 13 篇 光学工程
    • 12 篇 安全科学与工程
    • 10 篇 仪器科学与技术
    • 10 篇 土木工程
    • 9 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 4 篇 化学工程与技术
  • 94 篇 理学
    • 61 篇 数学
    • 20 篇 物理学
    • 16 篇 生物学
    • 12 篇 统计学(可授理学、...
    • 7 篇 系统科学
  • 58 篇 管理学
    • 35 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 15 篇 法学
    • 9 篇 法学
    • 8 篇 社会学
  • 12 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 4 篇 教育学
  • 3 篇 军事学
  • 2 篇 经济学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 74 篇 feature extracti...
  • 62 篇 accuracy
  • 47 篇 semantics
  • 41 篇 computational mo...
  • 38 篇 data models
  • 31 篇 federated learni...
  • 29 篇 training
  • 27 篇 neural networks
  • 26 篇 transformers
  • 21 篇 predictive model...
  • 19 篇 deep learning
  • 18 篇 data mining
  • 17 篇 noise
  • 17 篇 adaptation model...
  • 16 篇 visualization
  • 16 篇 attention mechan...
  • 15 篇 measurement
  • 14 篇 object detection
  • 14 篇 image segmentati...
  • 14 篇 analytical model...

机构

  • 201 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 44 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 37 篇 shandong fundame...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 22 篇 shandong provinc...
  • 15 篇 quan cheng labor...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 12 篇 xi'an university...
  • 12 篇 key laboratory o...
  • 12 篇 shandong fundame...
  • 11 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 10 篇 faculty of data ...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 18 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 aimin li
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wenpeng lu
  • 10 篇 wang lei
  • 10 篇 xiaohui han
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 guixin zhao

语言

  • 512 篇 英文
  • 28 篇 其他
  • 3 篇 中文
检索条件"机构=Shaanxi Provincial Key Laboratory of Network Computing and Security Technology"
541 条 记 录,以下是1-10 订阅
排序:
Diffusion Model with Multi-layer Wavelet Transform for Low-Light Image Enhancement
Diffusion Model with Multi-layer Wavelet Transform for Low-L...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology 710048 China Shaanxi Key Laboratory for Network Computing and Security Technology 710048 China
Low-light image enhancement methods based on diffusion models, though effective in improving image quality, often overrely on noise sensitivity and neglect the reconstruction deviations due to the naive up- and down-s... 详细信息
来源: 评论
Textual Data De-Privatization Scheme Based on Generative Adversarial networks  24th
Textual Data De-Privatization Scheme Based on Generative Adv...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Du, Yanning Xu, Jinnan Zhang, Yaling Wang, Yichuan Wang, Zhoukai School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr... 详细信息
来源: 评论
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
Hedonic Coalition Formation Game and Contract-Based Federated Learning in AAV-Assisted Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 11258-11272页
作者: Liu, Jia Li, Xiaoxu Xu, Yang Lyu, Chen Wang, Yichuan Liu, Xiaoying Xidian University School of Computer Science and Technology Xi’an710071 China Shanghai University of Finance and Economics School of Computing and Artificial Intelligence MoE Key Laboratory of Interdisciplinary Research of Computation and Economics Shanghai200433 China Xi’an University of Technology Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an710071 China Zhejiang University of Technology School of Computer Science and Technology Hangzhou310023 China
Coupled with the rise of Deep Learning, the wealth of data and enhanced computation capabilities of Internet of Things (IoT) components enable effective artificial intelligence (AI)-based models to be built. Beyond gr... 详细信息
来源: 评论
1+1>2: A Dual-Function Defense Framework for Adversarial Example Mitigation
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4121-4136页
作者: Yang, Rui Sun, Qindong Cao, Han Shen, Chao Cai, Jiaming Rong, Dongzhu Xi’an Jiaotong University School of Cyber Science and Engineering Xi’an710049 China Xi’an University of Technology Shaanxi Key Laboratory of Network Computing and Security Xi’an710049 China Xi’an Jiaotong University School of Software Engineering Xi’an710049 China
Current state-of-the-art plug-and-play countermeasures for mitigating adversarial examples (i.e., purification and detection) exhibit several fatal limitations, impeding their deployment in safety-critical real-world ... 详细信息
来源: 评论
Multiple Edge Data Integrity Verification With Multi-Vendors and Multi-Servers in Mobile Edge computing
收藏 引用
IEEE Transactions on Mobile computing 2025年 第6期24卷 4668-4683页
作者: Islam, Md Rashedul Xiang, Yong Uddin, Md Palash Zhao, Yao Kua, Jonathan Gao, Longxiang Deakin University School of Information Technology GeelongVIC3220 Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250316 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
Ensuring Edge Data Integrity (EDI) is imperative in providing reliable and low-latency services in mobile edge computing. Existing EDI schemes typically address single-vendor (App Vendor, AV) single-server (Edge Serve... 详细信息
来源: 评论
Edge-Cloud Cooperation-Driven Intelligent Sustainability Evaluation Strategy Based on IoT and CPS for Energy-Intensive Manufacturing Industries
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12287-12297页
作者: Ma, Shuaiyin Huang, Yuming Chen, Yanping Xiao, Qinge Xu, Jun Leng, Jiewu Xi’an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an Key Laboratory of Big Data and Intelligent Computing School of Computer Science and Technology Xi’an710121 China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China Xidian University Advanced Manufacturing Technology Innovation Center Guangzhou Institute of Technology Guangzhou510555 China Guangdong University of Technology Guangdong Provincial Key Laboratory of Computer Integrated Manufacturing System State Key Laboratory of Precision Electronic Manufacturing Technology and Equipment Guangzhou510006 China
The advancement of the Industry 5.0 in information technology has led to increased interest in integrating edge-cloud cooperation with Internet of Things (IoT) and cyber-physical system (CPS) designs. This integration... 详细信息
来源: 评论
k-TEVS: A k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 2326-2337页
作者: Liu, Yang He, Debiao Luo, Min Wang, Lianhai Peng, Cong Wuhan University School of Cyber Science and Engineering Wuhan430072 China Shenzhen Institute of Information Technology Institute of Information Technology Shenzhen518172 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Matrix Elements Technologies Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Shanghai200232 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Thee-vote is regarded as a waytoexpress the opinion that the voters ask for. Actually, the e-vote could be applied wildly likequestionnaire,***,thecoexistences of efficiency and security as well as transparency and pr... 详细信息
来源: 评论
A Method for Removing Reflections from Water Surface Images Based on Pre-trained Image Restoration
A Method for Removing Reflections from Water Surface Images ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Minghua Zhao Rui Zhi Shuangli Du Jing Hu Cheng Shi Lin Wang Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi’an China
Reflections on the water surface hinder the extraction of valuable information from water surface images. To remove reflections from water surface images, we construct a synthetic dataset and propose a multi-task netw... 详细信息
来源: 评论
Diffusion Model with Multi-layer Wavelet Transform for Low-Light Image Enhancement
Diffusion Model with Multi-layer Wavelet Transform for Low-L...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haiyan Jin Jing Wang Fengyuan Zuo Haonan Su Zhaolin Xiao Bin Wang Yuanlin Zhang Xi’an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
Low-light image enhancement methods based on diffusion models, though effective in improving image quality, often overrely on noise sensitivity and neglect the reconstruction deviations due to the naive up- and down-s... 详细信息
来源: 评论