咨询与建议

限定检索结果

文献类型

  • 444 篇 会议
  • 85 篇 期刊文献

馆藏范围

  • 529 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 206 篇 工学
    • 162 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 47 篇 电气工程
    • 29 篇 控制科学与工程
    • 18 篇 生物工程
    • 15 篇 机械工程
    • 15 篇 电子科学与技术(可...
    • 15 篇 交通运输工程
    • 14 篇 网络空间安全
    • 13 篇 光学工程
    • 11 篇 安全科学与工程
    • 10 篇 仪器科学与技术
    • 10 篇 土木工程
    • 9 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 4 篇 化学工程与技术
  • 91 篇 理学
    • 58 篇 数学
    • 20 篇 物理学
    • 16 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 7 篇 系统科学
  • 53 篇 管理学
    • 32 篇 图书情报与档案管...
    • 31 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 14 篇 法学
    • 8 篇 法学
    • 8 篇 社会学
  • 10 篇 医学
    • 9 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 公共卫生与预防医...
  • 3 篇 军事学
  • 2 篇 教育学
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 文学

主题

  • 74 篇 feature extracti...
  • 62 篇 accuracy
  • 47 篇 semantics
  • 41 篇 computational mo...
  • 38 篇 data models
  • 30 篇 federated learni...
  • 29 篇 training
  • 27 篇 neural networks
  • 26 篇 transformers
  • 21 篇 predictive model...
  • 19 篇 deep learning
  • 18 篇 data mining
  • 17 篇 noise
  • 17 篇 adaptation model...
  • 16 篇 visualization
  • 16 篇 attention mechan...
  • 15 篇 measurement
  • 14 篇 object detection
  • 14 篇 image segmentati...
  • 14 篇 analytical model...

机构

  • 199 篇 key laboratory o...
  • 197 篇 shandong provinc...
  • 44 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 36 篇 shandong fundame...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 21 篇 shandong provinc...
  • 15 篇 quan cheng labor...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...
  • 12 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 shandong fundame...
  • 11 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 10 篇 faculty of data ...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 18 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 aimin li
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wenpeng lu
  • 10 篇 wang lei
  • 10 篇 xiaohui han
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 guixin zhao

语言

  • 504 篇 英文
  • 24 篇 其他
  • 3 篇 中文
检索条件"机构=Shaanxi Provincial Key Laboratory of Network Computing and Security Technology"
529 条 记 录,以下是391-400 订阅
排序:
Joint Extraction of Entities and Relationships from Cyber Threat Intelligence based on Task-specific Fourier network
Joint Extraction of Entities and Relationships from Cyber Th...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Haiqing Lv Xiaohui Han Hui Cui Peipei Wang Wenbo Zuo Yang Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
The increasing complexity of cyber threats and the emergence of new attack technologies have brought huge challenges to attack incident analysis and source tracing. Using cyber threat intelligence to build a Cyber sec... 详细信息
来源: 评论
A High-Dimensional Temporal Data Publishing Method Based on Dynamic Bayesian networks and Differential Privacy
A High-Dimensional Temporal Data Publishing Method Based on ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yaxin Wang Zhen Zhang Heng Qian Yongchao Gao Qiuyue Wang Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Massive high-dimensional data generated by the Internet typically contains sensitive privacy information. Protecting data privacy while maintaining utility has become a pressing challenge. We propose a novel high-dime... 详细信息
来源: 评论
Motion compensation and object detection for neuromorphic camera
Motion compensation and object detection for neuromorphic ca...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yuxin Wan Rong Fei Yu Tang Xueru Bai Guo Xie Aimin Li School of Computer science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi’an University of Technology Xi’an China Guangzhou Institute Xidian University Guangzhou China School of Automation and Information Engineering Xi’an University of Technology Xi’an China
Compared to conventional cameras, the new type of vision camera-neuromorphic cameras, which can avoid motion blur and have the advantages of high spatiotemporal resolution, high dynamic range, low latency, etc. In thi... 详细信息
来源: 评论
Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE
Trusted Auditing of Data Operation Behaviors in Cloud based ...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Shujiang Xu Fansheng Wang Lianhai Wang Miodrag J. Mihaljević Shuhui Zhang Wei Shao Qihao Huang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Mathematical Institute the Serbian Academy of Sciences and Arts Belgrade Serbia Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid development of the new generation of information technologies, including cloud computing, 5G, and the Internet of Things, data outsourcing storage in the cloud has brought great convenience to data stor...
来源: 评论
A SUPERVISED INFORMATION ENHANCED MULTI-GRANULARITY CONTRASTIVE LEARNING FRAMEWORK FOR EEG BASED EMOTION RECOGNITION
arXiv
收藏 引用
arXiv 2024年
作者: Li, Xiang Song, Jian Zhao, Zhigang Wang, Chunxiao Song, Dawei Hu, Bin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Institute of Engineering Medicine Beijing Institute of Technology Beijing China
This study introduces a novel Supervised Info-enhanced Contrastive Learning framework for EEG based Emotion Recognition (SI-CLEER). SI-CLEER employs multi-granularity contrastive learning to create robust EEG contextu... 详细信息
来源: 评论
Filter-Enhanced Hypergraph Transformer for Multi-Behavior Sequential Recommendation
Filter-Enhanced Hypergraph Transformer for Multi-Behavior Se...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhufeng Shao Shoujin Wang Wenpeng Lu Weiyu Zhang Hongjiao Guan Long Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Data Science Institute University of Technology Sydney Sydney Australia
Sequential recommendation has been developed to predict the next item in which users are most interested by capturing user behavior patterns embedded in their historical interaction sequences. However, most existing m...
来源: 评论
From Data Integrity to Global ModeI Integrity for Decentralized Federated Learning: A Blockchain-based Approach
From Data Integrity to Global ModeI Integrity for Decentrali...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Na Wang Yao Zhao Youyang Qu Lei Cui Bai Li Longxiang Gao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of IT Deakin University VIC Australia Zhejiang Tianheng Information Technology Company China
Decentralized Federated Learning (DFL) is extensively applied in various areas, e.g., healthcare, finance, and Internet of Things (loT), offering practical solutions for distributed intelligent applications and data c... 详细信息
来源: 评论
Grouped Federated Meta-Learning for Privacy-Preserving Rare Disease Diagnosis
Grouped Federated Meta-Learning for Privacy-Preserving Rare ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xinru Song Feng Wu Zongchao Xie Longxiang Gao Lei Cui Youyang Qu Shujun Gu Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Computer Science University of Technology Sydney Australia Faculty of Science University of Melbourne Australia
Federated learning (FL) has been widely applied in medical field, which allows clients to collaboratively train global models without sharing local data. Nevertheless, the diversity and scarcity of samples from rare d... 详细信息
来源: 评论
Risk Modeling and Traceability of Boundary Attacks on Internet of Power Systems Based on Complex networks  9
Risk Modeling and Traceability of Boundary Attacks on Intern...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Xin Qu, Zhaoyang Yu, Tong Xie, Ming Yu, Fu Ding, Wei Northeast Electric Power University School of Electrical Engineering Jilin132012 China People's Bank of China Qinghai Provincial Branch Xining810000 China China Southern Power Grid Guangxi Power Grid Co. Ltd. Research Institute Nanning530023 China China Guizhou Power Grid Co. Ltd. Bijie Power Supply Bureau Bijie551700 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
With the increasing intelligence of power IoT terminal devices, the massive volume of data transmission, and the widespread adoption of shared services, traditional terminal boundary security mechanisms are unable to ... 详细信息
来源: 评论
Feature Aggregation network for Memory-Based Industrial Anomaly Detection
Feature Aggregation Network for Memory-Based Industrial Anom...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Min Li Delong Han Rui Shao Jinghui He Faculty of Data Science City University of Macau China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the process of large-scale industrial production, complex defects of different shapes and sizes can occur in industrial products and their components, and these defects seriously affect the performance of industria... 详细信息
来源: 评论