咨询与建议

限定检索结果

文献类型

  • 601 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 780 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 271 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 40 篇 控制科学与工程
    • 30 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 25 篇 网络空间安全
    • 24 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 155 篇 理学
    • 96 篇 数学
    • 36 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 80 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 14 篇 社会学
    • 13 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 adaptation model...
  • 28 篇 deep learning
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 265 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 674 篇 英文
  • 105 篇 其他
  • 7 篇 中文
检索条件"机构=Shannxi Key Laboratory for Network Computing and Security Technology"
780 条 记 录,以下是681-690 订阅
排序:
Research on Text Classification Based on BERT-BiGRU Model
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1746卷
作者: Qing Yu Ziyin Wang Kaiwen Jiang Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
Text classification is a typical application of natural language processing. At present, the most commonly used text classification method is deep learning. Meanwhile there are many difficulties in natural language pr...
来源: 评论
AirDIV: Over-the-Air Cloud-Fog Data Integrity Verification Scheme for Industrial Cyber-Physical Systems
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年
作者: Zhao, Yao Xiang, Yong Uddin, Md Palash Zhang, Yushu Liu, Lu Liu, Yansong Gao, Longxiang Deakin University School of Information Technology VIC Australia Jiangxi University of Finance and Economics School of Computing and Artificial Intelligence Nanchang330013 China University of Exeter Department of Computer Science Exeter United Kingdom RWTH Aachen University Department of Computer Science Aachen Germany Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China
Industrial Cyber-Physical Systems (ICPSs) have been motivating various Industry 4.0 endeavours, particularly with the integration of fog computing. Cloud-fog data caching paradigms, as supportive elements of ICPSs, ha... 详细信息
来源: 评论
A Hybrid Fault Diagnosis Method for Rolling Bearing Based on Attention and CNN
A Hybrid Fault Diagnosis Method for Rolling Bearing Based on...
收藏 引用
Robotics, Intelligent Control and Artificial Intelligence (RICAI), International Conference on
作者: Songtao Wang Qianlong Liu Jun Li Kun Liang Hui Cai Hangwei Tian Shandong Hi-Speed Construction Management Group Co. Ltd. Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd. Jinan China Shandong Hi-Speed Group Linteng Highway Co. Ltd. Jinan China School of Qilu Transportation Shandong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
In the field of mechanical manufacturing, rolling bearings are important core components. To achieve stable rotational operation, improving diagnostic accuracy has become an urgent issue. In this paper, a hybrid fault...
来源: 评论
Federated Semantic Learning for Privacy-preserving Cross-domain Recommendation
arXiv
收藏 引用
arXiv 2025年
作者: Lu, Ziang Guo, Lei Yu, Xu Cheng, Zhiyong Han, Xiaohui Zhu, Lei Shandong Normal University Shandong Jinan250358 China Shandong Qingdao266580 China Hefei University of Technology Anhui Hefei230009 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Shandong Jinan250014 China Tongji University Shanghai Jinan200092 China
In the evolving landscape of recommender systems, the challenge of effectively conducting privacy-preserving Cross-Domain Recommendation (CDR), especially under strict non-overlapping constraints, has emerged as a key... 详细信息
来源: 评论
A Hybrid Routing Algorithm based on Destruction Resistance Cost and Reliability in Flying Ad-Hoc networks
A Hybrid Routing Algorithm based on Destruction Resistance C...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Kun Guo Dongbin Wang Hui Zhi Yibo Gao Tao Zhang Tiejun Lv Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Beijing University of Posts and Telecommunications Beijing China TravelSky Technology Limited Beijing China Cyberspace Security Research Center Peng Cheng Laboratory Beijing University of Posts and Telecommunications Beijing China China Academy of Launch Vehicle Technology Beijing China
Existing routing algorithms in Flying Ad-Hoc Net- works (FANETs) lack the optimization consideration of destruction resistance cost caused by routing recovery when some nodes fail suddenly. In this paper, we propose a... 详细信息
来源: 评论
Focus on Local: Finding Reliable Discriminative Regions for Visual Place Recognition
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Changwei Chen, Shunpeng Song, Yukun Xu, Rongtao Zhang, Zherui Zhang, Jiguang Yang, Haoran Zhang, Yu Fu, Kexue Du, Shide Xu, Zhiwei Gao, Longxiang Guo, Li Xu, Shibiao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China School of Artificial Intelligence Beijing University of Posts and Telecommunications China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science China MAIS Institute of Automation Chinese Academy of Sciences China Tongji University China College of Computer and Data Science Fuzhou University China Shandong University China
Visual Place Recognition (VPR) is aimed at predicting the location of a query image by referencing a database of geotagged images. For VPR task, often fewer discriminative local regions in an image produce important e... 详细信息
来源: 评论
Uncertainty-Aware Deep Co-training for Semi-supervised Medical Image Segmentation
arXiv
收藏 引用
arXiv 2021年
作者: Zheng, Xu Fu, Chong Xie, Haoyu Chen, Jialei Wang, Xingwei Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Computer Science The University of Auckland New Zealand
Semi-supervised learning has made significant strides in the medical domain since it alleviates the heavy burden of collecting abundant pixel-wise annotated data for semantic segmentation tasks. Existing semi-supervis... 详细信息
来源: 评论
TraCemop: Towards Federated Learning with Traceable Contribution Evaluation and Model Ownership Protection
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Liu, Jingwei Zhou, Zihan Sun, Rong Liu, Lei Lu, Rongxing Dustdar, Schahram Niyato, Dusit Ministry of Education Engineering Research Center of Blockchain Technology Application and Evaluation China Xidian University Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an710071 China Xidian University State Key Laboratory of Integrated Services Networks Xi'an710071 China Xidian University Guangzhou Institute of Technology Guangzhou510555 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Queen's University School of Computing KingstonONK7L 2N8 Canada TU Wien Distributed Systems Group Austria UPF ICREA Barcelona Spain Nanyang Technological University School of Computer Science and Engineering Singapore
Federated Learning (FL) allows multiple clients to collaboratively train machine learning models without the need to share their local private data. As a result, it can effectively address the issue of data fragmentat... 详细信息
来源: 评论
Integrated Multi-featured Android Malicious Code Detection
Integrated Multi-featured Android Malicious Code Detection
收藏 引用
2019国际计算机前沿大会
作者: Qing Yu Hui Zhao Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology
To solve the problem that using a single feature cannot play the role of multiple features of Android application in malicious code detection,an Android malicious code detection mechanism is proposed based on integrat...
来源: 评论
Numerical Calculation of Partial Differential Equation Deduction in Adaptive Total Variation Image Denoising
Numerical Calculation of Partial Differential Equation Deduc...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics
作者: Minghua Zhao Qin Wang Abdul Nasir Muniru Jiawei Ning Peng Li Bing Li Shaanxi Key Laboratory of Network Computing and Security Technology Xi'an Shaanxi China
Total variation model of image denoising is easy to influence the gradient and lose the details of image. Due to these weaknesses, many adaptive total variation (ATV) models of image denoising have been proposed to el... 详细信息
来源: 评论