咨询与建议

限定检索结果

文献类型

  • 444 篇 会议
  • 84 篇 期刊文献

馆藏范围

  • 528 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 205 篇 工学
    • 161 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 47 篇 电气工程
    • 29 篇 控制科学与工程
    • 18 篇 生物工程
    • 15 篇 机械工程
    • 15 篇 电子科学与技术(可...
    • 15 篇 交通运输工程
    • 14 篇 网络空间安全
    • 13 篇 光学工程
    • 11 篇 安全科学与工程
    • 10 篇 仪器科学与技术
    • 10 篇 土木工程
    • 9 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 4 篇 化学工程与技术
  • 91 篇 理学
    • 58 篇 数学
    • 20 篇 物理学
    • 16 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 7 篇 系统科学
  • 53 篇 管理学
    • 32 篇 图书情报与档案管...
    • 31 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 14 篇 法学
    • 8 篇 法学
    • 8 篇 社会学
  • 10 篇 医学
    • 9 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 公共卫生与预防医...
  • 3 篇 军事学
  • 2 篇 教育学
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 文学

主题

  • 74 篇 feature extracti...
  • 62 篇 accuracy
  • 47 篇 semantics
  • 41 篇 computational mo...
  • 38 篇 data models
  • 29 篇 federated learni...
  • 29 篇 training
  • 27 篇 neural networks
  • 26 篇 transformers
  • 21 篇 predictive model...
  • 19 篇 deep learning
  • 18 篇 data mining
  • 17 篇 noise
  • 17 篇 adaptation model...
  • 16 篇 visualization
  • 16 篇 attention mechan...
  • 15 篇 measurement
  • 14 篇 object detection
  • 14 篇 image segmentati...
  • 14 篇 analytical model...

机构

  • 199 篇 key laboratory o...
  • 197 篇 shandong provinc...
  • 44 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 36 篇 shandong fundame...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 20 篇 shandong provinc...
  • 15 篇 quan cheng labor...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...
  • 12 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 shandong fundame...
  • 11 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 10 篇 faculty of data ...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 18 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 aimin li
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wenpeng lu
  • 10 篇 wang lei
  • 10 篇 xiaohui han
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 guixin zhao

语言

  • 503 篇 英文
  • 24 篇 其他
  • 3 篇 中文
检索条件"机构=Shaanxi Provincial Key Laboratory of Network Computing and Security Technology"
528 条 记 录,以下是511-520 订阅
排序:
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity
Strongly average-case secure obfuscation: achieving input pr...
收藏 引用
作者: Zhang, Mingwu Mu, Yi Shen, Jian Huang, Xinyi School of Computer Science Hubei University of Technology Wuhan430068 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University China School of Computing and Information Technology University of Wollongong NSW2522 Australia
A program obfuscator is a compiling algorithm that takes a program/circuit as input and generates a new garbled circuit to implement the same functionality as before while obtaining hard-to-understand in some sense, t... 详细信息
来源: 评论
Paralleled Extraction Method for Content of Invoice Image Based on TPL
Paralleled Extraction Method for Content of Invoice Image Ba...
收藏 引用
2015 International Conference on Advanced Management Science and Information Engineering(AMSIE 2015)
作者: H.Y.Jin B.Xing X.H.Hei School of Computer Science & Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
The paper mainly uses a mixed strategy of data and task parallelism to realize parallel extraction date information of *** at the deficiency of ordinary pipeline mode for parallel extraction date information from invo... 详细信息
来源: 评论
A method of oversized image generation based on stitching JPEG file streams
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2015年 第8期8卷 159-168页
作者: Sun, Qindong Hua, Wu Tian, Minying Wang, Yan School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Xi’an University of Technology Xi’an China
Due to memory limitation, the displaying and processing of the oversized images have been a bottleneck for various applications, which is a hot research spot in the image processing field. The traditional methods are ... 详细信息
来源: 评论
Research on Storage and Retrieval Method of Mass Data for High-Speed Train
Research on Storage and Retrieval Method of Mass Data for Hi...
收藏 引用
International Conference on Computational Intelligence and security
作者: Bin Wang Fan Li Xinhong Hei Weigang Ma Lei Yu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China
In order to ensure the safeties of high-speed train, a lot of sensors are installed in the train to real-time monitor its operation status. These sensors collect amounts of data which may be several GBs for one time o... 详细信息
来源: 评论
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Sch...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Xu Yang Joseph K. Liu Wei Wu Man Ho Au Willy Susilo Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University China and State Key Laboratory of Cryptology Beijing China Faculty of Information Technology Monash University Australia Department of Computing Hong Kong Polytechnic University Hong Kong School of Computer Science and Software Engineering University of Wollongong Australia
Electric Vehicle (EV) infrastructure is relatively new in many countries. Due to the recency of an EV infrastructure, it is important to carry out a series of testing programs. Furthermore, authenticity for collection... 详细信息
来源: 评论
Color image encryption using iterative phase retrieve process in quaternion Fourier transform domain
Color image encryption using iterative phase retrieve proces...
收藏 引用
2014年光子与光学工程国际会议暨西部光子学学术会议
作者: Liansheng Sui K.Duan Xi’an University of Technology &Shaanxi Key Laboratory for Network Computing and Security Technology(China) Xi’an University of Technology(China)
A single-channel color image encryption method is proposed based on iterative phase retrieve process in quaternion Fourier transform ***,three components of the plain color image is confused respectively by using cat ... 详细信息
来源: 评论
Independent component analysis based on information bottleneck
Abstract and Applied Analysis
收藏 引用
Abstract and Applied Analysis 2015年 第1期2015卷
作者: Ke, Qiao Zhang, Jiangshe Srivastava, H.M. Wei, Wei Chen, Guang-Sheng School of Mathematics and Statistics Xi'An Jiaotong University Xi'an 710049 China Department of Mathematics and Statistics University of Victoria Victoria V8W3R4 BC Canada School of Computer Science and Engineering Xi'An University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an 710048 China Department of Construction and Information Engineering Guangxi Modern Vocational Technology College Hechi Guangxi 547000 China
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
来源: 评论
A Parking Guidance Method Based on Parallel Particle Swarm Optimization Algorithm
A Parking Guidance Method Based on Parallel Particle Swarm O...
收藏 引用
International Conference on Computational Intelligence and security
作者: Bin Wang Ying Liu Xinhong Hei Lei Wang Zhiqiang Zhang Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China
Aiming at the problem of intelligent path guidance in the parking lot, an improved Particle Swarm Optimization Algorithm(PSO) is proposed in this paper to find the optimal path. In order to overcome the shortcomings t... 详细信息
来源: 评论
Modeling for user interaction by influence transfer effect in online social networks
Modeling for user interaction by influence transfer effect i...
收藏 引用
Conference on Local Computer networks (LCN)
作者: Qindong Sun Nan Wang Yadong Zhou Hanqin Wang Liansheng Sui Shaanxi Key Laboratory of Network Computing and Security Xi'an University of Technology Xi'an China MOE KLINNS Lab Xi'an Jiaotong University Xi'an China
User interaction is one of the most important features of online social networks, and is the basis of research of user behavior analysis, information spreading model, etc. However, existing approaches focus on the int... 详细信息
来源: 评论
Energy saving model and simulation test based on 6LoWPAN wireless sensor network
收藏 引用
Open Automation and Control Systems Journal 2014年 第1期6卷 1349-1358页
作者: Zhang, Yunyi Li, Yong Zhang, Ran Wei, Wei College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China
This paper designs the mathematical model of fiber line power, optimization of wireless sensor network node and multi distributed IP, and uses C language to program the model, finally get a new energy-saving mechanism... 详细信息
来源: 评论