咨询与建议

限定检索结果

文献类型

  • 617 篇 会议
  • 190 篇 期刊文献

馆藏范围

  • 807 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 362 篇 工学
    • 286 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 88 篇 信息与通信工程
    • 84 篇 电气工程
    • 47 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 28 篇 网络空间安全
    • 26 篇 机械工程
    • 26 篇 生物工程
    • 20 篇 光学工程
    • 20 篇 交通运输工程
    • 20 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
  • 159 篇 理学
    • 100 篇 数学
    • 40 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 11 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 25 篇 法学
    • 14 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 100 篇 feature extracti...
  • 95 篇 accuracy
  • 65 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 52 篇 data models
  • 45 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 robustness
  • 30 篇 adaptation model...
  • 25 篇 privacy
  • 24 篇 optimization
  • 24 篇 attention mechan...
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 22 篇 measurement
  • 21 篇 real-time system...
  • 21 篇 visualization

机构

  • 274 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 60 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 40 篇 shandong provinc...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 16 篇 quan cheng labor...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 15 篇 wei zhang
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 chunxiao wang
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han

语言

  • 658 篇 英文
  • 148 篇 其他
  • 9 篇 中文
检索条件"机构=Shannxi Key Laboratory for Network Computing and Security Technology"
807 条 记 录,以下是341-350 订阅
排序:
Generating Personalized Imputations for Patient Health Status Prediction in Electronic Health Records
Generating Personalized Imputations for Patient Health Statu...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yang Liu Weiyu Zhang Jiasheng Si Zhao Li Xueping Peng Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Evay Info Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia
Electronic health records (EHRs) play a crucial role in the development of personalized treatment plans for patients. However, EHRs are often highly incomplete, posing significant challenges for predictive modeling. W... 详细信息
来源: 评论
StarMFND: Star Topology Multi-Domain Fake News Detection
StarMFND: Star Topology Multi-Domain Fake News Detection
收藏 引用
Data Science and Information technology (DSIT), International Conference on
作者: Pengfei Gu Yibing Chen Wanlong Bing Yahui Liu Hongliang Ma Wei Wang School of Information Science and Technology Shihezi University Shihezi China Xinjiang Production and Construction Corps Key Laboratory of Computing Intelligence and Network Information Security Shihezi China School of Computer Science and Information Technology Beijing Jiaotong University Beijing China
The proliferation of the Internet and the emergence of social media platforms have greatly accelerated the speed and scope of information dissemination, while also introducing the peril of fake news propagation, parti... 详细信息
来源: 评论
MMSFD: Multi-grained and Multi-modal Fusion for Short Video Fake News Detection
MMSFD: Multi-grained and Multi-modal Fusion for Short Video ...
收藏 引用
Data Science and Information technology (DSIT), International Conference on
作者: Shuai Ren Yahui Liu Yaping Zhu Wanlong Bing Hongliang Ma Wei Wang School of Information Science and Technology Shihezi University Shihezi China Key Laboratory of Computing Intelligence and Network Information Security Xinjiang Production and Construction Corps Shihezi China School of Computer Science and Information Technology Beijing Jiaotong University Beijing China
Short video platforms have become an essential part of people’s daily lives, while also facing the challenge of the rapid spread of fake news. Therefore, the detection of fake news in short videos has attracted incre... 详细信息
来源: 评论
Wishart Deeplab network for Polarimetric SAR Image Classification  3rd
Wishart Deeplab Network for Polarimetric SAR Image Classific...
收藏 引用
3rd China Intelligent Robotics Annual Conference, CCF CIRAC 2022
作者: Shi, Junfei He, Tiansheng Jin, Haiyan Wang, Hua Xu, Weinan State Key Laboratory of Geo-Information Engineering Shaanxi Xi’an710048 China School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi’an710048 China
Polarimetric Synthetic Aperture Radar (PolSAR) images have attracted much attention with abundant polarimetric scattering information. In recent years, many deep learning models have been proposed and highly expanded ... 详细信息
来源: 评论
The Initial Screening of Laryngeal Tumors via Voice Acoustic Analysis Based on Siamese network Under Small Samples
收藏 引用
Journal of Voice 2025年
作者: You, Zhenzhen Sun, Delong Shi, Zhenghao Du, Shuangli Hei, Xinhong Kong, Demin Du, Xiaoying Yan, Jing Ren, Xiaoyong Hou, Jin Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China Department of Otolaryngology Second Affiliated Hospital of Medical College Xi'an Jiaotong University Xi'an China
Objective: The initial screening of laryngeal tumors via voice acoustic analysis is based on the clinician's experience that is subjective. This article introduces a Siamese network with an auxiliary gender classi... 详细信息
来源: 评论
Adaptive ELM-Based Time-Constrained Control of Uncertain Robotic Manipulators With Minimum Learning Computation
收藏 引用
IEEE Transactions on Emerging Topics in computing 2025年
作者: Jin, Xiaozheng Hou, Yuhan Wu, Xiaoming Chi, Jing Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Jinan250013 China Qilu Institute of Technology School of Intelligent Manufacturing and Control Engineering Shandong Jinan250200 China Shandong University of Finance and Economics School of Computing and Artificial Intelligence Shandong Jinan250014 China
This paper studies the extreme learning machine (ELM)-based time-constrained trajectory tracking control of a class of robotic manipulator systems with model/input uncertainties, matched and mismatched disturbances. A... 详细信息
来源: 评论
Enhanced YOLOv7 for Lightweight Drone Object Detection
Enhanced YOLOv7 for Lightweight Drone Object Detection
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Chenchen Sui Jiancheng Zhang Liuhui Jin Quanli Lu Jiyang Chen Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Zhengzhong Information Technology Co. LTD. Jinan Shandong China Institute of Marine Science and Technology Shandong University Qingdao China
A lightweight object detection algorithm based on YOLOv7 is proposed, optimized for deployment on resource-constrained drone platforms. key improvements include optimizing the network structure, adjusting depth and ch... 详细信息
来源: 评论
An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge computing  3rd
An Multi-feature Fusion Object Detection System for Mobile I...
收藏 引用
3rd International Conference on security and Privacy in New computing Environments, SPNCE 2020
作者: Feng, Xingyu Cao, Han Sun, Qindong School of Computer Science and Engineering Xi’an University of Technology Xi’an Shaanxi710048 China Shaanxi Key Laboratory of Network Computing and Security Xi’an University of Technology Xi’an Shaanxi710048 China
With the increase of data scale and computing power, deep learning algorithm has made a prominent breakthrough in computer vision and other complex problems. However, its high complexity and large memory requirements ... 详细信息
来源: 评论
Feature Selection Method Based on FSA-Choquet Fuzzy Integral
Feature Selection Method Based on FSA-Choquet Fuzzy Integral
收藏 引用
Industrial IoT, Big Data and Supply Chain (IIoTBDSC), International Conference on
作者: Zhangyu Xu Huaijun Wang Ruijie Wang Junhuai Li Xunchao Shang School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
With the instant development and wide application of sensor technology, human behavior recognition based on wearable sensors has attracted wide attention and become a hot research topic. The typical Choquet fuzzy inte... 详细信息
来源: 评论
Precise and Efficient:A Hybrid Analysis-Based Stack Overflow Detection Model under MIPS
Precise and Efficient:A Hybrid Analysis-Based Stack Overflow...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Yichuan Wang Chenhao Huang Tong Zhang Li Zhao Zhendong Gu Gangyang Li Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Hanjiang.to.Weihan River Valley Water Diversion Project Construction.co.ltd Xi’an China
Although the vulnerability detection techniques under the MIPS platform can detect stack overflow vulnerabilities, the stack overflow vulnerability of the stack frame changes is complex and hard to recover. The input ...
来源: 评论