咨询与建议

限定检索结果

文献类型

  • 444 篇 会议
  • 85 篇 期刊文献

馆藏范围

  • 529 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 206 篇 工学
    • 162 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 47 篇 电气工程
    • 29 篇 控制科学与工程
    • 18 篇 生物工程
    • 15 篇 机械工程
    • 15 篇 电子科学与技术(可...
    • 15 篇 交通运输工程
    • 14 篇 网络空间安全
    • 13 篇 光学工程
    • 11 篇 安全科学与工程
    • 10 篇 仪器科学与技术
    • 10 篇 土木工程
    • 9 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 4 篇 化学工程与技术
  • 91 篇 理学
    • 58 篇 数学
    • 20 篇 物理学
    • 16 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 7 篇 系统科学
  • 53 篇 管理学
    • 32 篇 图书情报与档案管...
    • 31 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 14 篇 法学
    • 8 篇 法学
    • 8 篇 社会学
  • 10 篇 医学
    • 9 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 公共卫生与预防医...
  • 3 篇 军事学
  • 2 篇 教育学
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 文学

主题

  • 74 篇 feature extracti...
  • 62 篇 accuracy
  • 47 篇 semantics
  • 41 篇 computational mo...
  • 38 篇 data models
  • 30 篇 federated learni...
  • 29 篇 training
  • 27 篇 neural networks
  • 26 篇 transformers
  • 21 篇 predictive model...
  • 19 篇 deep learning
  • 18 篇 data mining
  • 17 篇 noise
  • 17 篇 adaptation model...
  • 16 篇 visualization
  • 16 篇 attention mechan...
  • 15 篇 measurement
  • 14 篇 object detection
  • 14 篇 image segmentati...
  • 14 篇 analytical model...

机构

  • 199 篇 key laboratory o...
  • 197 篇 shandong provinc...
  • 44 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 36 篇 shandong fundame...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 21 篇 shandong provinc...
  • 15 篇 quan cheng labor...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...
  • 12 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 shandong fundame...
  • 11 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 10 篇 faculty of data ...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 18 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 aimin li
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wenpeng lu
  • 10 篇 wang lei
  • 10 篇 xiaohui han
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 guixin zhao

语言

  • 504 篇 英文
  • 24 篇 其他
  • 3 篇 中文
检索条件"机构=Shaanxi Provincial Key Laboratory of Network Computing and Security Technology"
529 条 记 录,以下是141-150 订阅
排序:
A fine-grained petri model for SQL time-blind injection
A fine-grained petri model for SQL time-blind injection
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Zhang, Guiling Zhang, Yaling Wang, Yichuan Zhu, Lei Ji, Wenjiang Xi'an University of technology School of computer science and engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
With the background of severe SQL injection attacks, the existing SQL injection modeling methods cannot reflect the process of SQL injection attacks in a fine-grained manner. Based on the discussion of attack technolo... 详细信息
来源: 评论
A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs
A Trusted Privacy-Preserving Model for Cross-Chain Transacti...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yichuan Wang Jianhuan Tie Xinhong Hei Li Zhao Xiaohui Zhang School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China
Currently, the privacy protection technology of blockchain is not mature enough, such as user data leakage and lack of anonymity exist, and these problems are especially serious when conducting cross-chain transaction...
来源: 评论
Text Information Mining in Cyberspace: An Information Extraction Method Based on T5 and keyBERT  9
Text Information Mining in Cyberspace: An Information Extrac...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Liu, Kuan Li, Yumei Qi, Yuanhua Qi, Ning Zhai, Mengran Qilu University of Technology Shandong Academy of Sciences Information Research Institute Shandong Academy of Sciences Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Institute of Economy and Informatization Development Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China Shandong Institute of Economy and Informatization Development Jinan China
With the development of the digital economy and the advent of the big data era, the rapid growth of textual information in cyberspace has placed higher demands on information processing technology. This paper proposes... 详细信息
来源: 评论
Outsourced Secure Cross-Modal Retrieval based on Secret Sharing for Lightweight Clients
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Niu, Ziyu Wang, Hao Li, Zhi Su, Ye Xu, Lijuan Zhang, Yudi Susilo, Willy Shandong Normal University School of Information Science and Engineering Jinan China University of Wollongong School of Computing and Information Technology Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education National Supercomputer Center in Jinan Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Cross-modal retrieval is a technique that uses one modality to query another modality in multimedia data (e.g., retrieving images based on text, or retrieving text based on images). It can break down the barriers betw... 详细信息
来源: 评论
LDVNet: Lightweight and Detail-Aware Vision network for Image Recognition Tasks in Resource-Constrained Environments  29
LDVNet: Lightweight and Detail-Aware Vision Network for Imag...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Liu, Yuchen Liang, Hu Qiu, Ran Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In many underwater application scenarios, recognition tasks need to be executed promptly on computationally limited platforms. However, models designed for this field often exhibit spatial locality, and existing works... 详细信息
来源: 评论
GAF-GAN: Gated Attention Feature Fusion Image Inpainting network Based on Generative Adversarial network  29
GAF-GAN: Gated Attention Feature Fusion Image Inpainting Net...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Qiu, Ran Liang, Hu Liu, Yuchen Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Image inpainting, which aims to reconstruct reasonably clear and realistic images from known pixel information, is one of the core problems in computer vision. However, due to the complexity and variability of the und... 详细信息
来源: 评论
Time Series Anomaly Detection Based on Normalized Flow and Bayesian networks  9
Time Series Anomaly Detection Based on Normalized Flow and B...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yao, Honglei Liu, Donglan Chang, Yingxian Liu, Xin Tang, Chaofan State Grid Shandong Electric Power Research Institute Jinan China State Grid Shandong Electric Power Company Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
Time series anomaly detection often faces significant challenges due to the high dimensionality, interdependence, and label sparsity of the data. Traditional methods struggle to model the intricate relationships betwe... 详细信息
来源: 评论
Apple Leaf Disease Detection Based on Yolov7 with Parameter-Free Attention Mechanism
SSRN
收藏 引用
SSRN 2023年
作者: Zhao, Minghua Han, Siqi Du, Shuangli Hu, Jing Lv, Zhiyong Wang, Lin Li, Peng School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an710048 China
China is an argicultural country, and apples are one of the most prominentfruits with high production volume. Apple leaf diseases are the major factors that affect both the quantity and quality of apple production. Usu... 详细信息
来源: 评论
Petri Net Model of MITM Attack Based on NDP Protocol
Petri Net Model of MITM Attack Based on NDP Protocol
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhang, Liumei Han, Yu Wang, Yichuan Quan, Ruiqin School of Computer Science Xi’an Shiyou University Xi’an China School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China Xinjiang Institute of Engineering China
Neighbor Discovery Protocol (NDP) is one of the core protocols of IPv6 networks. Since NDP messages are an unauthenticated stateless protocol, they are vulnerable to various types of attacks, and Man-In-The-Middle (MI... 详细信息
来源: 评论
Malicious Client Detection with Differential Privacy Constraints Based on Model Update Slicing and K-Means Clustering
Malicious Client Detection with Differential Privacy Constra...
收藏 引用
Frontiers technology of Information and Computer (ICFTIC), IEEE International Conference on
作者: Mengshi Qi Xin Wang Yunpeng He Ming Yang Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Federated learning (FL) is a decentralized machine learning technique that protects data privacy by trainng models locally on devices and sharing only model updates instead of raw data. However, FL also faces multiple... 详细信息
来源: 评论