咨询与建议

限定检索结果

文献类型

  • 601 篇 会议
  • 182 篇 期刊文献

馆藏范围

  • 783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 271 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 40 篇 控制科学与工程
    • 30 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 25 篇 网络空间安全
    • 24 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 155 篇 理学
    • 96 篇 数学
    • 36 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 80 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 14 篇 社会学
    • 13 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 adaptation model...
  • 28 篇 deep learning
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 267 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 33 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 677 篇 英文
  • 105 篇 其他
  • 7 篇 中文
检索条件"机构=Shannxi Key Laboratory for Network Computing and Security Technology"
783 条 记 录,以下是141-150 订阅
排序:
Multi-Classification Segmentation Method of Gastric Cancer Pathological Images Based on Deep Learning
Multi-Classification Segmentation Method of Gastric Cancer P...
收藏 引用
2024 lEEE International Conference on Advanced Information, Mechanical Engineering, Robotics and Automation, AIMERA 2024
作者: Zhou, Hehu Pan, Jingshan Na, Li Ding, Qingyan Zhou, Chengjun Du, Wantong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China The Second Hospital of Shandong University Department of Pathology Jinan China
Gastric cancer is a serious health threat, and pathological imaging is important in detecting it. These images can assist doctors in accurately determining the location of the cancer, thereby providing an important re... 详细信息
来源: 评论
A Short-Term Electric Load Forecasting Method Based on the Fusion of Global and Local Features  9
A Short-Term Electric Load Forecasting Method Based on the F...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Gu, Haozhan Tian, Hangwei Wang, Jingchun Li, Yumei Shandong University Of Arts Academy of Fine Arts China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Accurate short-term electric load forecasting is crucial for ensuring the stability and efficiency of the power grid. This study proposes an innovative dual-branch electric load forecasting model that enhances the acc... 详细信息
来源: 评论
Sequence-to-Sequence Knowledge Graph Completion Based on Gated Attention Unit  29
Sequence-to-Sequence Knowledge Graph Completion Based on Gat...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Yi, Fengge Wei, Xiumei Liu, Xiaojing Jiang, Xuesong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China State Key Laboratory of High-end Server & Storage Technology Jinan China
We present GauKGT5, a sequence-to-sequence model proposed for knowledge graph completion (KGC). Our research extends the KGT5 model, a recent sequence-to-sequence link prediction (LP) model. GauKGT5 takes advantage of... 详细信息
来源: 评论
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined networks
DDoS Attack Detection Based on Information Entropy Feature E...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Wenjiang Ji Yixin Yang Yaling Zhang Yichuan Wang Mengjie Tian Yuan Qiu School of computer science and engineering Xi'an University of technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology
Distributed Denial of Service(DDoS) attacks target the forwarding-control separation feature of Software-Defined networking(SDN) to launch attacks, causing network disruptions. Therefore security against DDoS attack d...
来源: 评论
A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV
A Pseudonym Exchange-Based Traceable Location Privacy Protec...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Weigang Ma Yaping Yu Yichuan Wang Xiaoxue Liu Zhoukai Wang School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology
Internet of Vehicles (IoV) is a network built by communicating entities such as vehicles and roadside infrastructure, etc. The entities can communicate with each other, sharing data and providing services. However, th...
来源: 评论
Self-Paced Self-Training Based on K-Nearest Neighbors  4
Self-Paced Self-Training Based on K-Nearest Neighbors
收藏 引用
4th International Conference on Machine Learning and Computer Application, ICMLCA 2023
作者: Ma, Yongzheng Sun, Zhengkai Zhang, Yintong Guan, Hongjiao Qiao, Xinxiao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Self-training is a classical semi-supervised classification method, which iteratively trains labeled samples that are enhanced using unlabeled samples. However, traditional self-training selects pseudo-labeled example... 详细信息
来源: 评论
Method and system of power load classification and decomposition based on deep learning  4
Method and system of power load classification and decomposi...
收藏 引用
4th International Conference on Smart Grid and Energy Engineering, SGEE 2023
作者: Sun, Hao Yuan, Hongtai Geng, Yudong Chen, Jing Zhang, Chuanfu Li, Wen Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
This paper introduces a system for the classification and decomposition of electrical loads, addressing the shortcomings of current non-intrusive load decomposition methods that are prone to errors. We propose a metho... 详细信息
来源: 评论
A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration
A Novel On-Demand Service Architecture for Efficient Cloud-E...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yaling Zhang Jingjing Chen Yichuan Wang Yeqiu Xiao Xiaoxue Liu School of computer science and engineering Xi'an University of technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology
With the advent of 5G era, the model of cloud-edge collaboration is used to handle massive data computing tasks with significant superiority. However, this architecture still uses the traditional web service model, wh...
来源: 评论
A Global Task Scheduling Method Based on network Measurement and Prediction in computing Power networks  29
A Global Task Scheduling Method Based on Network Measurement...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zhang, Chuanfu Li, Wen Chen, Jing Ge, Jing Wang, Di Li, Na Sun, Hao Geng, Yudong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
To improve the task scheduling efficiency in computing power networks, this paper proposes a global task scheduling method based on network measurement and prediction in computing power networks (GTS-MP), which select... 详细信息
来源: 评论
A survey on cryptographic techniques for protecting big data security: present and forthcoming
收藏 引用
Science China(Information Sciences) 2022年 第10期65卷 73-106页
作者: Siqi LU Jianhua ZHENG Zhenfu CAO Yongjuan WANG Chunxiang GU School of Cyberspace Security Information Engineering University Henan Key Laboratory of Network Cryptography Technology Institute of Security Technology Shanghai Key Laboratory of Trustworthy Computing East China Normal University Cyberspace Security Research Center Peng Cheng Laboratory Shanghai Institute of Intelligent Science and Technology Tongji University
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they significantly create economic and social value, big data meaningfully impact... 详细信息
来源: 评论