咨询与建议

限定检索结果

文献类型

  • 444 篇 会议
  • 85 篇 期刊文献

馆藏范围

  • 529 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 206 篇 工学
    • 162 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 47 篇 电气工程
    • 29 篇 控制科学与工程
    • 18 篇 生物工程
    • 15 篇 机械工程
    • 15 篇 电子科学与技术(可...
    • 15 篇 交通运输工程
    • 14 篇 网络空间安全
    • 13 篇 光学工程
    • 11 篇 安全科学与工程
    • 10 篇 仪器科学与技术
    • 10 篇 土木工程
    • 9 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 4 篇 化学工程与技术
  • 91 篇 理学
    • 58 篇 数学
    • 20 篇 物理学
    • 16 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 7 篇 系统科学
  • 53 篇 管理学
    • 32 篇 图书情报与档案管...
    • 31 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 14 篇 法学
    • 8 篇 法学
    • 8 篇 社会学
  • 10 篇 医学
    • 9 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 公共卫生与预防医...
  • 3 篇 军事学
  • 2 篇 教育学
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 文学

主题

  • 74 篇 feature extracti...
  • 62 篇 accuracy
  • 47 篇 semantics
  • 41 篇 computational mo...
  • 38 篇 data models
  • 30 篇 federated learni...
  • 29 篇 training
  • 27 篇 neural networks
  • 26 篇 transformers
  • 21 篇 predictive model...
  • 19 篇 deep learning
  • 18 篇 data mining
  • 17 篇 noise
  • 17 篇 adaptation model...
  • 16 篇 visualization
  • 16 篇 attention mechan...
  • 15 篇 measurement
  • 14 篇 object detection
  • 14 篇 image segmentati...
  • 14 篇 analytical model...

机构

  • 199 篇 key laboratory o...
  • 197 篇 shandong provinc...
  • 44 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 36 篇 shandong fundame...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 21 篇 shandong provinc...
  • 15 篇 quan cheng labor...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...
  • 12 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 shandong fundame...
  • 11 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 10 篇 faculty of data ...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 18 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 aimin li
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wenpeng lu
  • 10 篇 wang lei
  • 10 篇 xiaohui han
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 guixin zhao

语言

  • 504 篇 英文
  • 24 篇 其他
  • 3 篇 中文
检索条件"机构=Shaanxi Provincial Key Laboratory of Network Computing and Security Technology"
529 条 记 录,以下是61-70 订阅
排序:
A Driving Risk Prediction Approach Based on Generative Adversarial networks and VANET for Autonomous Trams
A Driving Risk Prediction Approach Based on Generative Adver...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Ji, Wenjiang Yang, Jiangcheng Wang, Yichuan Zhu, Lei Qiu, Yuan Hei, Xinhong College of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Shaanxi Key Laboratory for Net work Computing and Security T echnology Xi'an China
Driving safety is an essential prerequisite to the rapid development of autonomous trams. However, the relationship of driving risk factors is nonlinear, which makes modeling difficult. To improve the accuracy of driv... 详细信息
来源: 评论
Numerical Calculation of Partial Differential Equation Deduction in Adaptive Total Variation Image Denoising  12
Numerical Calculation of Partial Differential Equation Deduc...
收藏 引用
12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2019
作者: Zhao, Minghua Wang, Qin Muniru, Abdul Nasir Ning, Jiawei Li, Peng Li, Bing School of computer science and engineering Xi'an University of Technology Xi'an Shaanxi China Shaanxi Key Laboratory of Network Computing and Security Technology Xi'an Shaanxi China
Total variation model of image denoising is easy to influence the gradient and lose the details of image. Due to these weaknesses, many adaptive total variation (ATV) models of image denoising have been proposed to el... 详细信息
来源: 评论
Petri net modeling and vulnerability analysis of the Heartbleed
Petri net modeling and vulnerability analysis of the Heartbl...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Wang, Yichuan Wang, He Hei, Xinhong Ji, Wenjiang Zhu, Lei Xi'an University of technology School of computer science and engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
In recent years, a variety of network attacks emerge in an endless stream, and network attacks gradually show the characteristics of higher secrecy and greater harm. At present, the analysis of system vulnerabilities ... 详细信息
来源: 评论
A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV
A Pseudonym Exchange-Based Traceable Location Privacy Protec...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Ma, Weigang Yu, Yaping Wang, Yichuan Liu, Xiaoxue Wang, Zhoukai School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
Internet of Vehicles (IoV) is a network built by communicating entities such as vehicles and roadside infrastructure, etc. The entities can communicate with each other, sharing data and providing services. However, th... 详细信息
来源: 评论
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined networks
DDoS Attack Detection Based on Information Entropy Feature E...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Ji, Wenjiang Yang, Yixin Zhang, Yaling Wang, Yichuan Tian, Mengjie Qiu, Yuan Xi'an University of Technology School of Computer Science and Engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
Distributed Denial of Service(DDoS) attacks target the forwarding-control separation feature of Software-Defined networking(SDN) to launch attacks, causing network disruptions. Therefore security against DDoS attack d... 详细信息
来源: 评论
WebIDE cloud server resource allocation with task pre-scheduling in IOT application development  2
WebIDE cloud server resource allocation with task pre-schedu...
收藏 引用
2nd IEEE International Conference on Industrial Internet Cloud, ICII 2019
作者: Wang, Huaijun Li, Junhuai Tian, Jubo Wang, Kan Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xian University of Technology Xian710048 China
WebIDE is leveraged for IOT applications development, which could adapt to the rapid growth of IOT applications and meanwhile facilitate the rapid development. Resource allocation is of vital significance in the WebID... 详细信息
来源: 评论
TCS security Analysis in Intel SGX Enclave MultiThreading
TCS Security Analysis in Intel SGX Enclave MultiThreading
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhang, Tong Cui, Xiangjie Wang, Yichuan Du, Yanning Gao, Wen School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
With the rapid development of Internet technology in recent years, the demand for security support for complex applications is becoming stronger and stronger. Intel Software Guard Extensions (Intel SGX) is created as ... 详细信息
来源: 评论
A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration
A Novel On-Demand Service Architecture for Efficient Cloud-E...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Yaling Chen, Jingjing Wang, Yichuan Xiao, Yeqiu Liu, Xiaoxue School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
With the advent of 5G era, the model of cloud-edge collaboration is used to handle massive data computing tasks with significant superiority. However, this architecture still uses the traditional web service model, wh... 详细信息
来源: 评论
Deep Reinforcement-Learning-Based Adaptive Traffic Signal Control with Real-Time Queue Lengths
Deep Reinforcement-Learning-Based Adaptive Traffic Signal Co...
收藏 引用
2022 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022
作者: Sun, Qi-Wei Han, Shi-Yuan Zhou, Jin Chen, Yue-Hui Yao, Kang University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan250022 China Shandong Provincial Network Security and Infomationization Technology Center Jinan250002 China
The reinforcement learning (RL) with deep neural network, as a data-driven approach, is promising for adaptive traffic signal control (ATSC) in traffic scenarios. The majority of the existing studies focus on designin... 详细信息
来源: 评论
A Technique for Ensured Cross Chain IBC Transactions Using TPM  2
A Technique for Ensured Cross Chain IBC Transactions Using T...
收藏 引用
2nd International Conference on Big Data and Privacy computing, BDPC 2024
作者: Wang, YiChuan Yan, YiLiang Liu, XiaoXue Gao, Wen Wang, ZiYan School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cross chain contact across several blockchains becomes increasingly significant in importance with the increased use of blockchain technology. However, security cannot be assured when producing equivalent outputs thro... 详细信息
来源: 评论