咨询与建议

限定检索结果

文献类型

  • 601 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 780 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 271 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 40 篇 控制科学与工程
    • 30 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 25 篇 网络空间安全
    • 24 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 155 篇 理学
    • 96 篇 数学
    • 36 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 80 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 14 篇 社会学
    • 13 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 adaptation model...
  • 28 篇 deep learning
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 265 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 674 篇 英文
  • 105 篇 其他
  • 7 篇 中文
检索条件"机构=Shannxi Key Laboratory for Network Computing and Security Technology"
780 条 记 录,以下是641-650 订阅
排序:
YOLO-TP: A process detection model of tunnel real scene based on gradient information interaction
YOLO-TP: A process detection model of tunnel real scene base...
收藏 引用
Computer, Big Data and Artificial Intelligence (ICCBD+AI), International Conference on
作者: Jiaying Fan Shuping Pan Xinbo Jiang Shengtao Zhang Hongliang Liu Chuan Wang Jianghua Li Chenglin Ke Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Technological Innovation Department Shandong Hi-Speed Group Co Ltd JiNan China School of Qilu Transportation Shandong University JiNan China China Railway 14th Bureau Group First Engineering Development Co. Ltd RiZhao China
Target detection technology is an effective method to detect tunnel operation safety. Although the field has made some progress in detection models, the lack of datasets and detection models has hindered its developme... 详细信息
来源: 评论
Sentiment Analysis of Web Text Based on Deep Learning with a Attention Mechanism  12
Sentiment Analysis of Web Text Based on Deep Learning with a...
收藏 引用
12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2019
作者: Yu, Qing Zhao, Hui Jiang, Kaiwen Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
The sentiment analysis of online commentary is a hot research topic in the field of network information mining. Traditional text sentiment analysis methods are mainly based on emotional dictionaries or machine learnin... 详细信息
来源: 评论
The Initial Screening of Laryngeal Tumors via Voice Acoustic Analysis Based on Siamese network Under Small Samples
收藏 引用
Journal of Voice 2025年
作者: You, Zhenzhen Sun, Delong Shi, Zhenghao Du, Shuangli Hei, Xinhong Kong, Demin Du, Xiaoying Yan, Jing Ren, Xiaoyong Hou, Jin Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China Department of Otolaryngology Second Affiliated Hospital of Medical College Xi'an Jiaotong University Xi'an China
Objective: The initial screening of laryngeal tumors via voice acoustic analysis is based on the clinician's experience that is subjective. This article introduces a Siamese network with an auxiliary gender classi... 详细信息
来源: 评论
Outsourced Secure Cross-Modal Retrieval based on Secret Sharing for Lightweight Clients
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Niu, Ziyu Wang, Hao Li, Zhi Su, Ye Xu, Lijuan Zhang, Yudi Susilo, Willy Shandong Normal University School of Information Science and Engineering Jinan China University of Wollongong School of Computing and Information Technology Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education National Supercomputer Center in Jinan Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Cross-modal retrieval is a technique that uses one modality to query another modality in multimedia data (e.g., retrieving images based on text, or retrieving text based on images). It can break down the barriers betw... 详细信息
来源: 评论
Deepfake Detection: A Comprehensive Survey from the Reliability Perspective
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Tianyi Liao, Xin Chow, Kam Pui Lin, Xiaodong Wang, Yinglong Department of Computer Science The University of Hong Kong Hong Kong College of Computer Science and Electronic Engineering Hunan University China School of Computer Science University of Guelph Canada Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
The mushroomed Deepfake synthetic materials circulated on the internet have raised a profound social impact on politicians, celebrities, and individuals worldwide. In this survey, we provide a thorough review of the e... 详细信息
来源: 评论
Image Electronic Evidence Screening Based on Improved SSD
Image Electronic Evidence Screening Based on Improved SSD
收藏 引用
6th International Conference on Intelligent computing and Signal Processing (ICSP)
作者: Yafei Liu Liehui Jiang Tieming Liu Youwei Zhang Zhongyuan Network Security Research institute Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Zhengzhou Xinda Institute of Advanced Technology Zhengzhou China
With the development of information technology, electronic evidence plays an increasingly important role in the judicial trial. In Judicial Forensics, it is difficult to extract effective electronic evidence accuratel... 详细信息
来源: 评论
Integrated Multi-featured Android Malicious Code Detection  5th
Integrated Multi-featured Android Malicious Code Detection
收藏 引用
5th International Conference of Pioneer Computer Scientists, Engineers and Educators, ICPCSEE 2019
作者: Yu, Qing Zhao, Hui Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin300384 China
To solve the problem that using a single feature cannot play the role of multiple features of Android application in malicious code detection, an Android malicious code detection mechanism is proposed based on integra... 详细信息
来源: 评论
computing Power in the Sky: Digital Twin-assisted Collaborative computing with Multi-UAV networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论
Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net
Shellshock Bash Vulnerability Modeling Analysis Based on Pet...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Liumei Zhang Xi Deng Yichuan Wang School of Computer Science Xi’an Shiyou University Xi’an China School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi’an China
The enhancement of Internet connectivity and the increase of information transmission speed yield the increasing frequency of network attacks. The Shellshock attackers often exploit bash vulnerability to read the cont... 详细信息
来源: 评论
Auction Theory and Game Theory Based Pricing of Edge computing Resources: A Survey
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Jiguo Liu, Shun Zou, Yifei Wang, Guijuan Hu, Chunqiang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Qufu Normal University School of Computer Science Shandong Rizhao China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250353 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol... 详细信息
来源: 评论