咨询与建议

限定检索结果

文献类型

  • 617 篇 会议
  • 190 篇 期刊文献

馆藏范围

  • 807 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 362 篇 工学
    • 286 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 88 篇 信息与通信工程
    • 84 篇 电气工程
    • 47 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 28 篇 网络空间安全
    • 26 篇 机械工程
    • 26 篇 生物工程
    • 20 篇 光学工程
    • 20 篇 交通运输工程
    • 20 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
  • 159 篇 理学
    • 100 篇 数学
    • 40 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 11 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 25 篇 法学
    • 14 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 100 篇 feature extracti...
  • 95 篇 accuracy
  • 65 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 52 篇 data models
  • 45 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 robustness
  • 30 篇 adaptation model...
  • 25 篇 privacy
  • 24 篇 optimization
  • 24 篇 attention mechan...
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 22 篇 measurement
  • 21 篇 real-time system...
  • 21 篇 visualization

机构

  • 274 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 60 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 40 篇 shandong provinc...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 16 篇 quan cheng labor...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 15 篇 wei zhang
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 chunxiao wang
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han

语言

  • 658 篇 英文
  • 148 篇 其他
  • 9 篇 中文
检索条件"机构=Shannxi Key Laboratory for Network Computing and Security Technology"
807 条 记 录,以下是401-410 订阅
排序:
Optimization for Task Offloading and Downloading in UAV-Assisted MEC Systems with Aerial to Aerial Collaboration
Optimization for Task Offloading and Downloading in UAV-Assi...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Jiawei Jiang Xiang Tian Yubing Han Chunyu Hu Bin Feng Jiguo Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Information Science and Technology Taishan University Taian China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Big Data Institute Qilu University of Technology Jinan China
Owing to the easy deployment and mobile flexibility, Unmanned Aerial Vehicle (UAV) assisted Mobile Edge computing (MEC) has been deemed as one potential technology for handling the computation-intensive tasks at termi... 详细信息
来源: 评论
A Patent Fast Recommendation Algorithm Based on User Requirements Combined with an Inverted Table
A Patent Fast Recommendation Algorithm Based on User Require...
收藏 引用
Advanced Information, Mechanical Engineering, Robotics and Automation (AIMERA), IEEE International Conference on
作者: Wan Zheng Qingyan Ding Na Li Yu Pan Xuecheng Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Patent recommendation has always been an essential service for the innovation and development of all walks of life. The matching of demand and patent information can enable enterprises to quickly obtain the innovation... 详细信息
来源: 评论
OCF-HP: An Offline Compaction Framework Based on Hotspot Prediction for Data Lakehouse
OCF-HP: An Offline Compaction Framework Based on Hotspot Pre...
收藏 引用
Electronic technology and Information Science (ICETIS), International Conference on
作者: Bowen Sun Xiaohan Yang Ying Guo Zhihao Zhao Jing Chen Hu Zhang Jibin Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid advancement of information technologies, the global data volume is increasing at an unprecedented speed. Data Lakehouse has become an effective solution for real-time aggregation of multimodal heterogen... 详细信息
来源: 评论
Android Malware Detection Method Based on Graph Convolutional networks
Android Malware Detection Method Based on Graph Convolutiona...
收藏 引用
Artificial Intelligence and Power Systems (AIPS), International Conference on
作者: Qingling Xu Shumian Yang Lijuan Xu Dawei Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) (Shandong Academy of Sciences) Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Facing the serious security threats posed by Android malware amidst the rapid development of mobile internet, there is an urgent need to develop more accurate and efficient detection technologies. This paper introduce... 详细信息
来源: 评论
SOD-YOLO: A New Small Object Traffic Sign Recognition network
SOD-YOLO: A New Small Object Traffic Sign Recognition Networ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xunjia Yin Xiaoming Wu Xiangzhi Liu Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Traffic sign recognition is a challenging task for unmanned systems, especially the problem of detecting small targets. During traffic sign recognition (TSR), traffic sign targets are small, represented by a small num... 详细信息
来源: 评论
Multimodal Knowledge Graph Completion Method Based on Integrated Modality Adversarial Training and Relation-Enhanced Attention Mechanism
Multimodal Knowledge Graph Completion Method Based on Integr...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Ruijia Zhang Zheng Dong Jianqiang Zhang Gongpeng Song Qin Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Negative sampling (NS) is widely used in knowledge graph completion (KGC) to generate negative triples for contrastive learning during training. However, existing NS methods are not suitable when multimodal informatio... 详细信息
来源: 评论
Cross Auto-Encoder for Inscription Character Inpainting
Cross Auto-Encoder for Inscription Character Inpainting
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Long Zhao Zonglong Yuan Yuhao Lou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Character inpainting, a challenging task, has seen slow development. Existing networks focus on either enhancing the encoding process, involving feature extraction or improving the decoding process, which revolves aro... 详细信息
来源: 评论
A Multi-Scale Infrared and Visible Image Fusion network Based on Context Perception
A Multi-Scale Infrared and Visible Image Fusion Network Base...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Huixuan Zhao Jinyong Cheng Rundong Du Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Existing image fusion methods often fail to fully utilize the contextual information of the images, resulting in blurry and distorted fusion results. In addition, although the existing multi-scale feature extraction m... 详细信息
来源: 评论
Revisiting the Application of Twin Connected Parallel networksand Regression Loss Functions in Industrial Defect Detection
SSRN
收藏 引用
SSRN 2023年
作者: Su, Zhanzhi Zhou, Mingle Li, Min Zhang, Zekai Zhang, Cheng Xing, Rui Li, Gang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250353 China
Industrial product surface defects can affect the reliability and lifetime of products. However, industrial scenes are complex, with a wide variety of products, and product surface defects often have characteristics s... 详细信息
来源: 评论
Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression
Lightweight Malicious Encrypted Traffic Detection Method Bas...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yuecheng Wen Xiaotong Li Haiqing Lv Menglu Wang Wenbo Zuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Timely and accurate detection of and response to potentially malicious encrypted traffic is crucial in cybersecurity strategies. Convolutional neural network-based approaches that convert traffic loads into images for... 详细信息
来源: 评论