咨询与建议

限定检索结果

文献类型

  • 601 篇 会议
  • 182 篇 期刊文献

馆藏范围

  • 783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 271 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 40 篇 控制科学与工程
    • 30 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 25 篇 网络空间安全
    • 24 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 155 篇 理学
    • 96 篇 数学
    • 36 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 80 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 14 篇 社会学
    • 13 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 adaptation model...
  • 28 篇 deep learning
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 267 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 33 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 677 篇 英文
  • 105 篇 其他
  • 7 篇 中文
检索条件"机构=Shannxi Key Laboratory for Network Computing and Security Technology"
783 条 记 录,以下是441-450 订阅
排序:
CHECKWHY: Causal Fact Verification via Argument Structure
arXiv
收藏 引用
arXiv 2024年
作者: Si, Jiasheng Zhao, Yibo Zhu, Yingjie Zhu, Haiyang Lu, Wenpeng Zhou, Deyu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China School of Computer Science and Engineering Southeast University China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Southeast University Ministry of Education China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science China
With the growing complexity of fact verification tasks, the concern with "thoughtful" reasoning capabilities is increasing. However, recent fact verification benchmarks mainly focus on checking a narrow scop... 详细信息
来源: 评论
NextSeg: Automatic COVID-19 Lung Infection Segmentation from CT Images Based on Next-ViT
NextSeg: Automatic COVID-19 Lung Infection Segmentation from...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Aimei Dong Ruixin Wang Xuening Zhang Jian Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The spread of COVID-19 has brought great disaster to the world, and automatic segmentation of the infected region can help doctors make a quick diagnosis and reduce workload. However, automatic segmentation of infecte... 详细信息
来源: 评论
Burst Sequence Based Graph Neural network for Video Traffic Identification
Burst Sequence Based Graph Neural Network for Video Traffic...
收藏 引用
15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024
作者: Xiong, Jian Bao, YingShuo Li, ShengBao Zhao, Kun Peng, LiZhi Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China Quancheng Laboratory Jinan China School of Cyber Security University of Chinese Academy of Sciences Beijing China Shandong Branch of National Computer Network Emergency Response Technical Team/Coordination Center of China Jinan China Inspur Computer Technology Co. Ltd. Jinan China
With the vigorous development of video applications and the comprehensive upgrade of encryption protocols, video content review is becoming increasingly difficult. As a practical solution, video traffic identific... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong School of Computer Science and Technology Xidian University Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China School of Computer Science and Technology Xidian University Shaanxi Key Laboratory of Network and System Security Xi’an710071 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing210016 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论
Research on the Path of Industrial Intelligence Promoting the Upgrading of Manufacturing Industry
Research on the Path of Industrial Intelligence Promoting th...
收藏 引用
作者: Wenhao Liu Delong Han Mengmeng Sun Qianlong Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Qilu University of Technology (Shandong Academy of Sciences)
With the deepening development of a new round of global technological revolution and industrial transformation, the new generation of information technology is constantly breaking through. At the same time, the intern... 详细信息
来源: 评论
Proceedings Research on the Path of High-Quality Development of Big Data Industry in Shandong Province
Proceedings Research on the Path of High-Quality Development...
收藏 引用
作者: Yu Wang Mingle Zhou Chunjing Wang Xingheng Mei Yumei Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Qilu University of Technology (Shandong Academy of Sciences)
The big data industry is a major opportunity to promote the development of the digital economy. This paper analyzes the status quo and problems of the big data industry in Shandong Province, combines the connotation o... 详细信息
来源: 评论
Speed Master: Quick or Slow Play to Attack Speaker Recognition  39
Speed Master: Quick or Slow Play to Attack Speaker Recogniti...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Ye, Zhe Zhang, Wenjie Ren, Ying Kang, Xiangui Yan, Diqun Ma, Bin Wang, Shiqi Guangdong Key Lab of Information Security School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China Department of Computer Science City University of Hong Kong Hong Kong
Backdoor attacks pose a significant threat during the model’s training phase. Attackers craft pre-defined triggers to break deep neural networks, ensuring the model accurately classifies clean samples during inferenc... 详细信息
来源: 评论
Ultra-high definition video quality assessment method based on deep learning
Ultra-high definition video quality assessment method based ...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Wei Li Can He MingLe Zhou HengYu Zhang WenLong Liu Hisense Video Technology Co. Ltd Qing Dao China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the development of display technology, people’s demand for high-definition video is increasing, and the requirements for video quality are also increasing. Nowadays, a large number of videos have emerged, and ho... 详细信息
来源: 评论
Topic-based Multi-layer Knowledge Filtering for Emotion Recognition in Conversation
Topic-based Multi-layer Knowledge Filtering for Emotion Reco...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xiaoyang Li Zhenyu Yang Yiwen Li Zhijun Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Emotion recognition in conversation (ERC) is a prominent research topic in natural language processing, widely applicable in various scenarios. However, accessing external commonsense knowledge and related dialogue to... 详细信息
来源: 评论
Intelligent Contract Vulnerability Detection Method Based on Bic-RL
Intelligent Contract Vulnerability Detection Method Based on...
收藏 引用
Data security and Privacy Protection (DSPP), International Conference on
作者: Shuhui Zhang Changdong Hu Tian Lan LianHai Wang Shujiang Xu Wei Shao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Blockchain technology is praised for its decentralization, anonymity, and tamper-proof nature, but its complex architecture has led to numerous attacks, particularly against smart contracts. These attacks have caused ...
来源: 评论