咨询与建议

限定检索结果

文献类型

  • 561 篇 会议
  • 181 篇 期刊文献

馆藏范围

  • 742 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 347 篇 工学
    • 272 篇 计算机科学与技术...
    • 233 篇 软件工程
    • 83 篇 信息与通信工程
    • 75 篇 电气工程
    • 41 篇 控制科学与工程
    • 30 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 24 篇 机械工程
    • 21 篇 光学工程
    • 20 篇 交通运输工程
    • 20 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 11 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 154 篇 理学
    • 96 篇 数学
    • 36 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 系统科学
    • 9 篇 化学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 14 篇 社会学
    • 13 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 88 篇 feature extracti...
  • 69 篇 accuracy
  • 54 篇 semantics
  • 47 篇 computational mo...
  • 44 篇 data models
  • 38 篇 federated learni...
  • 37 篇 training
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 19 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 speech processin...

机构

  • 228 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 37 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 24 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 19 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei zhang

语言

  • 677 篇 英文
  • 64 篇 其他
  • 4 篇 中文
检索条件"机构=Shannxi Key Laboratory for Network Computing and Security Technology"
742 条 记 录,以下是1-10 订阅
排序:
Method and Practice of Trusted Embedded computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
Research on Low-Light Image Enhancement method based on UNet  5
Research on Low-Light Image Enhancement method based on UNet
收藏 引用
5th International Conference on Telecommunications, Optics, and Computer Science, TOCS 2024
作者: Zhu, Fuyu Fei, Rong Ji, Chengjie School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shannxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China
As technology develops continuously, digital images are being applied more and more extensively in daily life. Digital images are mainly divided into two categories: one is the images obtained by photosensitive device... 详细信息
来源: 评论
Design and implementation of cooperative multi-agent based on MAPPO  5
Design and implementation of cooperative multi-agent based o...
收藏 引用
5th International Conference on Telecommunications, Optics, and Computer Science, TOCS 2024
作者: Wang, Haolong Fei, Rong Chen, Ruizhu School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shannxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China
In the past few years, with the continuous development of deep reinforcement learning, the application of deep reinforcement has been set off within the realms of self-driving vehicle technology, game games, and natur... 详细信息
来源: 评论
Diffusion Model with Multi-layer Wavelet Transform for Low-Light Image Enhancement
Diffusion Model with Multi-layer Wavelet Transform for Low-L...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology 710048 China Shaanxi Key Laboratory for Network Computing and Security Technology 710048 China
Low-light image enhancement methods based on diffusion models, though effective in improving image quality, often overrely on noise sensitivity and neglect the reconstruction deviations due to the naive up- and down-s... 详细信息
来源: 评论
High-precision end-to-end adaptive optics aided orbital angular momentum wireless communication with XFTC-Net
收藏 引用
Optics Letters 2025年 第10期50卷 3265-3268页
作者: Xu, Panpan Chang, Huan Wang, Fei Gao, Ran Guo, Dong Zhu, Lei Li, Zhipei Zhou, Sitong Xu, Qi Chen, Jing Xin, Xiangjun Beijing100081 China National Key Laboratory of Science and Technology on Space-Born Intelligent Information Processing Beijing China Beijing100876 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology 250353 China
In this Letter, we demonstrate high-precision end-to-end adaptive optics (AO) technique based on the X-Shape Fusion Transformer-convolutional neural network (XFTC-Net) without an additional probe path to compensate fo... 详细信息
来源: 评论
PPEC: A Privacy-Preserving, Cost-Effective Incremental Density Peak Clustering Analysis on Encrypted Outsourced Data
收藏 引用
IEEE Transactions on Cloud computing 2025年 第2期13卷 485-497页
作者: Yang, Haomiao Ding, Zikang Lu, Ruiheng Xiang, Kunlan Li, Hongwei Wu, Dakui University of Electronic Science and Technology of China Chengdu611731 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250353 China Shanghai University Shanghai200444 China
Call detail records (CDRs) provide valuable insights into user behavior, which are instrumental for telecom companies in optimizing network coverage and service quality. However, while cloud computing facilitates clus... 详细信息
来源: 评论
Textual Data De-Privatization Scheme Based on Generative Adversarial networks  24th
Textual Data De-Privatization Scheme Based on Generative Adv...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Du, Yanning Xu, Jinnan Zhang, Yaling Wang, Yichuan Wang, Zhoukai School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr... 详细信息
来源: 评论
PosFuzz:augmenting greybox fuzzing with effective position distribution
收藏 引用
Cybersecurity 2023年 第4期6卷 123-143页
作者: Yanyan Zou Wei Zou JiaCheng Zhao Nanyu Zhong Yu Zhang Ji Shi Wei Huo Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina State Key Lab of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Zhongguancun Laboratory BeijingChina
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and ***-based greybo... 详细信息
来源: 评论
A Technique for Ensured Cross Chain IBC Transactions Using TPM  2
A Technique for Ensured Cross Chain IBC Transactions Using T...
收藏 引用
2nd International Conference on Big Data and Privacy computing, BDPC 2024
作者: Wang, YiChuan Yan, YiLiang Liu, XiaoXue Gao, Wen Wang, ZiYan School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cross chain contact across several blockchains becomes increasingly significant in importance with the increased use of blockchain technology. However, security cannot be assured when producing equivalent outputs thro... 详细信息
来源: 评论