咨询与建议

限定检索结果

文献类型

  • 617 篇 会议
  • 190 篇 期刊文献

馆藏范围

  • 807 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 362 篇 工学
    • 286 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 88 篇 信息与通信工程
    • 84 篇 电气工程
    • 47 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 28 篇 网络空间安全
    • 26 篇 机械工程
    • 26 篇 生物工程
    • 20 篇 光学工程
    • 20 篇 交通运输工程
    • 20 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
  • 159 篇 理学
    • 100 篇 数学
    • 40 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 11 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 25 篇 法学
    • 14 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 100 篇 feature extracti...
  • 95 篇 accuracy
  • 65 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 52 篇 data models
  • 45 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 robustness
  • 30 篇 adaptation model...
  • 25 篇 privacy
  • 24 篇 optimization
  • 24 篇 attention mechan...
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 22 篇 measurement
  • 21 篇 real-time system...
  • 21 篇 visualization

机构

  • 274 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 60 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 40 篇 shandong provinc...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 16 篇 quan cheng labor...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 15 篇 wei zhang
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 chunxiao wang
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han

语言

  • 658 篇 英文
  • 148 篇 其他
  • 9 篇 中文
检索条件"机构=Shannxi Key Laboratory for Network Computing and Security Technology"
807 条 记 录,以下是331-340 订阅
排序:
FSD-YOLO: An Improved Method for Steel Surface Defect Detection Based on YOLOv5
FSD-YOLO: An Improved Method for Steel Surface Defect Detect...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yuechen Zhang Aimin Li Xiaotong Kong Wenqiang Li Zhiyao Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Steel surface defect detection is very important in industrial quality inspection, and there have been many studies on Steel surface defect detection in recent years. Existing steel surface defect detection algorithms... 详细信息
来源: 评论
RTS-DETR: Efficient Real-Time DETR for Small Object Detection
RTS-DETR: Efficient Real-Time DETR for Small Object Detectio...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Wenqiang Li Aimin Li Zhiyao Li Xiaotong Kong Yuechen Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In recent years, object detection models DEtection TRansformer (DETR) series based on Transformer architecture have played a huge role in various fields. However, the DETR series models are not satisfactory in small o... 详细信息
来源: 评论
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Prohibited Items
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Proh...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Xiaotong Kong Aimin Li Wenqiang Li Zhiyao Li Yuechen Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m... 详细信息
来源: 评论
HSD-YOLO: A Lightweight and Accurate Method for PCB Defect Detection
HSD-YOLO: A Lightweight and Accurate Method for PCB Defect D...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Zhiyao Li Aimin Li Wenqiang Li Xiaotong Kong Yuechen Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
PCB defect detection is a typical small objects detection task, as with other objects, there is a small object size, the detection process is susceptible to the problem of background interference. In practical industr... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
arXiv
收藏 引用
arXiv 2024年
作者: Qin, Libo Wei, Fuxuan Chen, Qiguang Zhou, Jingxuan Huang, Shijue Si, Jiasheng Lu, Wenpeng Che, Wanxiang School of Computer Science and Engineering Central South University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th... 详细信息
来源: 评论
LDD-YOLO: An Improved Lightweight Detection Method for Steel Surface Defects Based on YOLOv8
LDD-YOLO: An Improved Lightweight Detection Method for Steel...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Yuechen Zhang Aimin Li Zhiyao Li Xiaotong Kong Wenqiang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Steel is an indispensable raw material in the industrial field, steel surface defects seriously affect the quality of steel, in recent years a lot of research has been carried out on the detection of steel surface def... 详细信息
来源: 评论
FedDE: A Data Augmentation Strategy to Combat the Non-IID Issue in Federated Learning
FedDE: A Data Augmentation Strategy to Combat the Non-IID Is...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Guopeng Hao Liting Geng Feng Li Chunxiao Wang Zhigang Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China School of Computer Science and Technology Shandong University Qingdao China
Federated Learning (FL) is a distributed machine learning framework that protects data privacy by allowing multiple end devices to train machine learning models collaboratively without sharing raw data. However, data ... 详细信息
来源: 评论
MF-YOLO: Multimodal Fusion for Remote Sensing Object Detection Based on YOLOv5s
MF-YOLO: Multimodal Fusion for Remote Sensing Object Detecti...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Wenqiang Li Aimin Li Xiaotong Kong Yuechen Zhang Zhiyao Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Remote sensing object detection has flourished at a rapid rate of development. In remote sensing images (RSI), most algorithms perform well in detecting medium and large objects but perform poorly on small objects. Th... 详细信息
来源: 评论
A Non-Intrusive Speech Quality Assessment Method for Low-Rate Communication
A Non-Intrusive Speech Quality Assessment Method for Low-Rat...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Lingxia Lin Ye Li Peng Zhang Xingye Yu Tianyu Cai Hongyuan Zou Min Zheng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Muding Information Technology Co. Ltd China Electric Power Research Institute Co. Ltd Beifing China
Although PESQ (Perceptual Evaluation of Speech Quality) serves as an important benchmark for assessing narrow-band speech quality, its effectiveness depends on the availability of reference signals, which is not alway... 详细信息
来源: 评论
PWPH:Proactive Deepfake Detection Method Based on Watermarking and Perceptual Hashing
PWPH:Proactive Deepfake Detection Method Based on Watermarki...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Jian Li Shuanshuan Li Bin Ma Chunpeng Wang Linna Zhou Fei Wang Yule Wang Miaomiao Yang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
The popularity of Deepfake technology has raised the challenge of recognizing real and fake faces. While detection methods already exist, most of them are passive forensics and face challenges of generalizability and ... 详细信息
来源: 评论