咨询与建议

限定检索结果

文献类型

  • 444 篇 会议
  • 84 篇 期刊文献

馆藏范围

  • 528 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 205 篇 工学
    • 161 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 47 篇 电气工程
    • 29 篇 控制科学与工程
    • 18 篇 生物工程
    • 15 篇 机械工程
    • 15 篇 电子科学与技术(可...
    • 15 篇 交通运输工程
    • 14 篇 网络空间安全
    • 13 篇 光学工程
    • 11 篇 安全科学与工程
    • 10 篇 仪器科学与技术
    • 10 篇 土木工程
    • 9 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 4 篇 化学工程与技术
  • 91 篇 理学
    • 58 篇 数学
    • 20 篇 物理学
    • 16 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 7 篇 系统科学
  • 53 篇 管理学
    • 32 篇 图书情报与档案管...
    • 31 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 14 篇 法学
    • 8 篇 法学
    • 8 篇 社会学
  • 10 篇 医学
    • 9 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 公共卫生与预防医...
  • 3 篇 军事学
  • 2 篇 教育学
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 文学

主题

  • 74 篇 feature extracti...
  • 62 篇 accuracy
  • 47 篇 semantics
  • 41 篇 computational mo...
  • 38 篇 data models
  • 29 篇 federated learni...
  • 29 篇 training
  • 27 篇 neural networks
  • 26 篇 transformers
  • 21 篇 predictive model...
  • 19 篇 deep learning
  • 18 篇 data mining
  • 17 篇 noise
  • 17 篇 adaptation model...
  • 16 篇 visualization
  • 16 篇 attention mechan...
  • 15 篇 measurement
  • 14 篇 object detection
  • 14 篇 image segmentati...
  • 14 篇 analytical model...

机构

  • 199 篇 key laboratory o...
  • 197 篇 shandong provinc...
  • 44 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 36 篇 shandong fundame...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 20 篇 shandong provinc...
  • 15 篇 quan cheng labor...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...
  • 12 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 shandong fundame...
  • 11 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 10 篇 faculty of data ...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 18 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 aimin li
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wenpeng lu
  • 10 篇 wang lei
  • 10 篇 xiaohui han
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 guixin zhao

语言

  • 503 篇 英文
  • 24 篇 其他
  • 3 篇 中文
检索条件"机构=Shaanxi Provincial Key Laboratory of Network Computing and Security Technology"
528 条 记 录,以下是491-500 订阅
排序:
Revisiting Recent and Current Anomaly Detection based on Machine Learning in Ad-Hoc networks  5
Revisiting Recent and Current Anomaly Detection based on Mac...
收藏 引用
5th Annual International Conference on network and Information Systems for Computers, ICNISC 2019
作者: Wang, Zhixiao Chen, Mingyu Yan, Wenyao Wang, Wendong Gao, Ang Nie, Gaoyang Wang, Feng Yang, Shaobo Xi'An University of Technology Xi'an710048 China Goettingen University Goettingen37077 Germany Xi'An Jiaotong University Xi'an710049 China Shaanxi Provincial Key Laboratory of Network Computing and Security Technology Xi'an710048 China College of xi'An Innovation Yan'An University Xi'an710100 China Yan'An University Yan'an716000 China National Satellite Meteorological Center China Meteorological Administration Beijing100081 China
Ad-Hoc network which is one kind of self-organized networks is much more vulnerable than the infrastructural network with the properties of highly changeable linkage, dynamic structure, and wireless connections so tha... 详细信息
来源: 评论
Intelligent recommendation of related items based on naive bayes and collaborative filtering combination model
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1682卷
作者: Wei Wei Zhuo Wang Changlong Fu Robertas Damaševičius Rafal Scherer Marcin Wožniak School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 Shaanxi Key Laboratory for Network Computing and Security Technology China.
Nowadays, data plays a unique role in various fields. Based on the background of the era of big data, this paper collects user evaluations of certain commodities and labels the evaluations into positive emotions and n...
来源: 评论
A Hole Repairing Method Based on Edge-Preserving Projection  12th
A Hole Repairing Method Based on Edge-Preserving Projection
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Wang, Yinghui Zhao, Yanni Wang, Ningna Ning, Xiaojuan Shi, Zhenghao Zhao, Minghua Lv, Ke Huang, Liangyi Institute of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an China Department of Computer Science Shannxi Vocational and Technical College Xi’an China Booking B.V. Herengracht 597 Amsterdam1017 CE Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington D.C. United States
A point cloud hole repairing method based on edge-preserving projection is proposed in order to maintain sharp features of holes. First, the hole boundary points are acquired by quadrants and angles, then connections ... 详细信息
来源: 评论
A Hole Repairing Method Based on Slicing  12th
A Hole Repairing Method Based on Slicing
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Zhao, Yanni Wang, Yinghui Wang, Ningna Ning, Xiaojuan Shi, Zhenghao Zhao, Minghua Lv, Ke Huang, Liangyi Institute of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an China Department of Computer Science Shannxi Vocational and Technical College Xi’an China Booking B.V. Herengracht 597 Amsterdam1017 CE Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington D.C. United States
The repairing of 3D point cloud holes has an important meaning to ensure the integrity of cloud data. We present a slice-based repairing method for 3D point cloud in this paper. Firstly, the model is horizontal sliced... 详细信息
来源: 评论
A Slice-Guided Method of Indoor Scene Structure Retrieving  12th
A Slice-Guided Method of Indoor Scene Structure Retrieving
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Wang, Lijuan Wang, Yinghui Wang, Ningna Ning, Xiaojuan Lv, Ke Huang, Liangyi Xi’an University of Technology South Jinhua Road no. 5 Xi’an710032 China Xi’an Technology University Mid Xuefu Road no. 2 Xi’an710021 China Shaanxi Key Laboratory of Network Computing and Security Technology South Jinhua Road no. 5 Xi’an710032 China *** B.V. Vijzelstraat 66-80 Amsterdam1017HL Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington DC20052 United States
The structure information of indoor scene is necessary for a robot who works in a room. In order to achieve structure of an indoor scene, a slice-guided method of indoor scene structure retrieving is proposed in this ... 详细信息
来源: 评论
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs  3
Exploiting Meta-Path with Attention Mechanism for Fine-Grain...
收藏 引用
2019 3rd International Conference on Data Mining, Communications and Information technology, DMCIT 2019
作者: Wang, Zhixiao Yan, Wenyao Wang, Wendong Gao, Ang Yu, Lei Yang, Shaobo Nie, GaoYang School of Computer Science and Engineering Xi'an University of Technology Xi'an710048 China Telematics Group University of Goettingen Goettingen37077 Germany Shaanxi Key Laboratory of Network Computing and Security Xi'an710048 China School of Electronic and Information Engineering Xi'an Jiaotong University Xi'an710048 China College of Xi'an Innovation Yan'an University Xi'an710100 China Yan'an University Yan'an716000 China National Satellite Meteorological Center China Meteorological Administration Beijing100081 China
Based on the huge volumes of user check-in data in LBSNs, users' intrinsic mobility patterns can be well explored, which is fundamental for predicting where a user will visit next given his/her historical check-in... 详细信息
来源: 评论
Slice-Based Window Detection from Scene Point Clouds
Slice-Based Window Detection from Scene Point Clouds
收藏 引用
International Conference on Virtual Reality and Visualization (ICVRV)
作者: Wen Hao Yinghui Wang Wei Liang Xiaojuan Ning Ye Li Institute of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
In this paper, we propose a comprehensive strategy to detect the windows from scene point clouds. First, the planar points are extracted after computing the dimensionality structure of each point. The planar points ar... 详细信息
来源: 评论
An attribute-based encryption scheme with LSSS key-policy from lattices
Advances in Intelligent Systems and Computing
收藏 引用
Advances in Intelligent Systems and computing 2018年 613卷 217-230页
作者: Liu, Lihua Wang, Shangping Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an710054 China School of Mathematics and Computer Science Shaanxi University of Technology HanzhongShaanxi723001 China
A new attribute-based encryption scheme (ABE) from lattices with Linear Secret Sharing Scheme (LSSS) key-policy is presented. In the new scheme, the key of an attribute under an access policy represented by LSSS is ge... 详细信息
来源: 评论
Code Authority Control Method Based on File security Level and ACL in WebIDE
Code Authority Control Method Based on File Security Level a...
收藏 引用
IEEE International Conference of Intelligent Robotic and Control Engineering (IRCE)
作者: Junhuai Li Wenchao Ji Jubo Tian Huaijun Wang Kan Wang School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
The following topics are dealt with: mobile robots; learning (artificial intelligence); control system synthesis; permanent magnet motors; motion control; optimisation; power engineering computing; machine control; sy... 详细信息
来源: 评论
A Universal Designated Multi-Verifier Transitive Signature Scheme  13th
A Universal Designated Multi-Verifier Transitive Signature S...
收藏 引用
13th International Conference on Information securityand Cryptology, Inscrypt 2017
作者: Zhu, Fei Zhang, Yuexin Lin, Chao Wu, Wei Meng, Ru Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Informatics Fujian Normal University Fuzhou China School of Software and Electrical Engineering Swinburne University of Technology HawthornVIC3122 Australia School of Computer Science Shaanxi Normal University Xi’an China
A Universal Designated Verifier Transitive Signature (UDVTS) scheme is designed for the graph-based big data system. Specifically, it allows a transitive signature holder to convince the designated verifier with a tra... 详细信息
来源: 评论