咨询与建议

限定检索结果

文献类型

  • 601 篇 会议
  • 182 篇 期刊文献

馆藏范围

  • 783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 271 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 40 篇 控制科学与工程
    • 30 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 25 篇 网络空间安全
    • 24 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 155 篇 理学
    • 96 篇 数学
    • 36 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 80 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 14 篇 社会学
    • 13 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 adaptation model...
  • 28 篇 deep learning
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 267 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 33 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 677 篇 英文
  • 105 篇 其他
  • 7 篇 中文
检索条件"机构=Shannxi Key Laboratory for Network Computing and Security Technology"
783 条 记 录,以下是211-220 订阅
排序:
Gat-Ti: Extracting Entities From Cyber Threat Intelligence Texts
Gat-Ti: Extracting Entities From Cyber Threat Intelligence T...
收藏 引用
Artificial Intelligence, networking and Information technology (AINIT), International Seminar on
作者: Dawei Zhao Wenhao Sun Yang Zhou Lijuan Xu Xin Li Xiaohui Han Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
In Cyber Threat Intelligence (CTI) analysis, existing named entity recognition (NER) models often suffered a decline in performance due to their inability to adapt to the specialized terminology and complex contexts o... 详细信息
来源: 评论
Interactive Medical Image Segmentation in Various Imaging Modalities: Current Status and Challenges
Interactive Medical Image Segmentation in Various Imaging Mo...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Huijuan Hao Wenpeng Wang Yu Chen Qingyan Dingl Fengqi Hao Hu Zhang Jinqiang Bai Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Interactive medical image segmentation plays a crucial role in medical diagnosis, treatment planning, and in-terventional procedures. With the rapid advancement of artificial intelligence and deep learning technologie... 详细信息
来源: 评论
Multi-Level Privacy Preserving Scheme for Visual IoT Data Based on Compressive Sensing
Multi-Level Privacy Preserving Scheme for Visual IoT Data Ba...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Dawei Zhao Le Ju Fenghua Tong Fuqiang Yu Xin Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
With the rapid growth of IoT technology, Visual IoT (VIoT) plays a key role in areas like security surveillance and intelligent transportation, where large volumes of sensitive data are collected and transmitted. Many... 详细信息
来源: 评论
Apple Leaf Disease Detection Based on Yolov7 with Parameter-Free Attention Mechanism
SSRN
收藏 引用
SSRN 2023年
作者: Zhao, Minghua Han, Siqi Du, Shuangli Hu, Jing Lv, Zhiyong Wang, Lin Li, Peng School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an710048 China
China is an argicultural country, and apples are one of the most prominentfruits with high production volume. Apple leaf diseases are the major factors that affect both the quantity and quality of apple production. Usu... 详细信息
来源: 评论
Time Series Anomaly Detection Based on Normalized Flow and Bayesian networks  9
Time Series Anomaly Detection Based on Normalized Flow and B...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yao, Honglei Liu, Donglan Chang, Yingxian Liu, Xin Tang, Chaofan State Grid Shandong Electric Power Research Institute Jinan China State Grid Shandong Electric Power Company Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
Time series anomaly detection often faces significant challenges due to the high dimensionality, interdependence, and label sparsity of the data. Traditional methods struggle to model the intricate relationships betwe... 详细信息
来源: 评论
OpenViewer: Openness-Aware Multi-View Learning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Shide Fang, Zihan Tan, Yanchao Wang, Changwei Wang, Shiping Guo, Wenzhong College of Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
Multi-view learning methods leverage multiple data sources to enhance perception by mining correlations across views, typically relying on predefined categories. However, deploying these models in real-world scenarios... 详细信息
来源: 评论
Self-Evaluation of Large Language Model based on Glass-box Features
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Hui Qu, Yingqi Liu, Jing Yang, Muyun Xu, Bing Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Baidu Inc. Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
The proliferation of open-source Large Language Models (LLMs) underscores the pressing need for evaluation methods. Existing works primarily rely on external evaluators, focusing on training and prompting strategies. ... 详细信息
来源: 评论
Cross-chain Transaction Tracking Protocol based on Multi-dimensional Digital Watermarking Fingerprints
Cross-chain Transaction Tracking Protocol based on Multi-dim...
收藏 引用
Frontiers technology of Information and Computer (ICFTIC), IEEE International Conference on
作者: Duanzhen Li Shujiang Xu Haochen He Hongrui Xue Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan PR China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan PR China
Cross-chain technology plays a critical role in the process of interconnecting blockchains. However, all attention has been focused on how to achieve efficient cross-chain interoperability protocols, thus neglecting t... 详细信息
来源: 评论
DetecVFuzz: Enhancing security in Consumer Electronic Devices Through Scalable Vulnerability Testing of Virtual Devices
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Xiao, Xi Guo, Yongjian Jolfaei, Alireza Chen, Chuan Haghighi, Mohammad Sayad Wen, Sheng Lin, Yuanyi Tsinghua University Shenzhen International Graduate School Shenzhen China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education China Peng Cheng Laboratory Guangdong Shenzhen China Flinders University College of Science and Engineering SA5042 Australia Shandong Computer Science Center Key Laboratory of Computing Power Network and Information Security Ministry of Education China Qilu University of Technology Shandong Academy of Sciences National Supercomputer Center in Jinan Jinan China Swinburne University of Technology School of Science Computing and Engineering Technologies MelbourneVIC3122 Australia
The interconnection facilitated by consumer electronics has led to the creation of a complex network of devices. Testing efficiency of such consumer electronic devices can be improved through hardware emulation. QEMU ... 详细信息
来源: 评论
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive Learning Framework for Drug-Target Binding Affinity Prediction
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive L...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Huiting Li Weiyu Zhang Yong Shang Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Drug-target binding affinity prediction is critical to drug design. Some existing computational methods rely on single-scale data and cannot fully integrate the rich information of multi-scale data, such as molecular ... 详细信息
来源: 评论