咨询与建议

限定检索结果

文献类型

  • 617 篇 会议
  • 190 篇 期刊文献

馆藏范围

  • 807 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 362 篇 工学
    • 286 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 88 篇 信息与通信工程
    • 84 篇 电气工程
    • 47 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 28 篇 网络空间安全
    • 26 篇 机械工程
    • 26 篇 生物工程
    • 20 篇 光学工程
    • 20 篇 交通运输工程
    • 20 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
  • 159 篇 理学
    • 100 篇 数学
    • 40 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 11 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 25 篇 法学
    • 14 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 100 篇 feature extracti...
  • 95 篇 accuracy
  • 65 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 52 篇 data models
  • 45 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 robustness
  • 30 篇 adaptation model...
  • 25 篇 privacy
  • 24 篇 optimization
  • 24 篇 attention mechan...
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 22 篇 measurement
  • 21 篇 real-time system...
  • 21 篇 visualization

机构

  • 274 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 60 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 40 篇 shandong provinc...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 16 篇 quan cheng labor...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 15 篇 wei zhang
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 chunxiao wang
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han

语言

  • 658 篇 英文
  • 148 篇 其他
  • 9 篇 中文
检索条件"机构=Shannxi Key Laboratory for Network Computing and Security Technology"
807 条 记 录,以下是391-400 订阅
排序:
Feature Selection Method Based on the Intra-Class Redundant Information Ratio
SSRN
收藏 引用
SSRN 2022年
作者: Zhou, Hongfang Zhu, Rourou Wang, Xiqian An, Lei Li, Aimin School of Computer Science and Engineering Xi'an University of Technology Xi’an710048 China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an710048 China
Feature selection is a key step of the classification problem. In this paper, we propose the concept of intra-class redundant information ratio, and use it to measure the importance of redundant items. Based on this, ... 详细信息
来源: 评论
GNN-ASG: A Double Feature Selection-based Adversarial Sample Generation Method in Industrial Control System
GNN-ASG: A Double Feature Selection-based Adversarial Sample...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Lijuan Xu Zhiang Yao Dawei Zhao Xin Li Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Due to the unique constraints of industrial control data, industrial control adversarial sample attacks are particularly challenging. Existing methods strive to conduct adversarial sample attacks under the conditions ... 详细信息
来源: 评论
A Triangular Stable Node network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qing Liu Qian Gao Jun Fan Zhiqiang Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China China Telecom Digital Intelligence Techonology Co Ltd Jinan China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
A Novel Collaborative Edge Caching via User Preference Awareness and Adaptive Clustering in MENs
A Novel Collaborative Edge Caching via User Preference Aware...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Pengfei Gu Huiling Shi Hao Hao Mingfa Li Wei Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In this paper, we propose a collaborative caching placement scheme leveraging user preference awareness and adaptive clustering (UPAAC), which jointly considers the heterogeneity of user preferences and user activity ... 详细信息
来源: 评论
Patent Recommendation Methods Based on Transformer Encoders and Regularization Strategies
Patent Recommendation Methods Based on Transformer Encoders ...
收藏 引用
Advanced Information, Mechanical Engineering, Robotics and Automation (AIMERA), IEEE International Conference on
作者: Wan Zheng Qingyan Ding Na Li Yu Pan Xuecheng Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Patent recommendation service has become a major demand of all walks of life in the society. Patent data collection and analysis can not only help enterprises grasp the development status of the industry, but also pro... 详细信息
来源: 评论
An Efficient Token Mixer Model for Sheet Metal Defect Detection
An Efficient Token Mixer Model for Sheet Metal Defect Detect...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Huijuan Hao Sijian Zhu Changle Yi Yu Chen Hongge Zhao Yue Feng Rong Yang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Defects such as scratches, patches, and cracks frequently occur during sheet metal production. However, the low detection accuracy and slow processing speed of industrial defect detection models significantly impede e... 详细信息
来源: 评论
A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection
A Blockchain-based PHR Sharing Scheme with Attribute Privacy...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Chaohe Lu Zhongyuan Yu Guijuan Wang Anming Dong Xiang Tian School of Computer Science Qufu Normal University Rizhao China School of Information Science and Engineering Lanzhou University Lanzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid advancement and application of the Internet of Medical Things (IoMT), personal health records (PHRs) are now increasingly comprised of data collected by Internet of Things (IoT) devices and medical reco... 详细信息
来源: 评论
Improvement in the Transferability of Target Adversarial Examples Based on Data Augmentation
Improvement in the Transferability of Target Adversarial Exa...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Kun Wang Xing Jin Fuqiang Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Despite the high performance of deep neural networks in image classification, they are very sensitive to those adversarial examples with small perturbations, which is likely to cause classification errors. Currently, ... 详细信息
来源: 评论
Bidding Management Platform for Cloud-Chain Convergence
Bidding Management Platform for Cloud-Chain Convergence
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yanzhi Zhang Xiaoming Wu Xiangzhi Liu Huomin Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Strengthening the supervision of bidding business is an important measure to optimise the business environment of bidding and ensure fair competition among enterprises. The existing blockchain-based bidding platform h... 详细信息
来源: 评论
Context-Aware Enhancement and Transformer network for Image-Text Retrieval
Context-Aware Enhancement and Transformer Network for Image-...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Zheng Dong Ruijia Zhang Jianqiang Zhang Gongpeng Song Qin Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Computer Science and Technology Shandong Engineering Research Center of Big Data Applied Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Image-text matching is an important and challenging task in the field of multimedia analysis, aimed at bridging the semantic gap between visual content and language descriptions. Although this field has significant im... 详细信息
来源: 评论