咨询与建议

限定检索结果

文献类型

  • 617 篇 会议
  • 190 篇 期刊文献

馆藏范围

  • 807 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 362 篇 工学
    • 286 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 88 篇 信息与通信工程
    • 84 篇 电气工程
    • 47 篇 控制科学与工程
    • 36 篇 电子科学与技术(可...
    • 28 篇 网络空间安全
    • 26 篇 机械工程
    • 26 篇 生物工程
    • 20 篇 光学工程
    • 20 篇 交通运输工程
    • 20 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
  • 159 篇 理学
    • 100 篇 数学
    • 40 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 11 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 25 篇 法学
    • 14 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 100 篇 feature extracti...
  • 95 篇 accuracy
  • 65 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 52 篇 data models
  • 45 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 robustness
  • 30 篇 adaptation model...
  • 25 篇 privacy
  • 24 篇 optimization
  • 24 篇 attention mechan...
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 22 篇 measurement
  • 21 篇 real-time system...
  • 21 篇 visualization

机构

  • 274 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 60 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 40 篇 shandong provinc...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 16 篇 quan cheng labor...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 15 篇 wei zhang
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 chunxiao wang
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han

语言

  • 658 篇 英文
  • 148 篇 其他
  • 9 篇 中文
检索条件"机构=Shannxi Key Laboratory for Network Computing and Security Technology"
807 条 记 录,以下是751-760 订阅
排序:
Exploiting Gabor Feature Extraction Method for Chinese Character Writing Quality Evaluation
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1575卷
作者: Zhixiao Wang Wenyao Yan Mingtao Guo Jiulong Zhang School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Shaanxi Key Laboratory Xi'an of Network Computing and Security Technology China School of Data Science and Computer Xi'an innovation college of Yan'an University Xi'an 710100 China
The automatic evaluation of Chinese character writing quality has a wide application prospect. Most of the existing evaluation methods of Chinese character writing quality are based on radical segmentation and feature...
来源: 评论
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs
Exploiting Meta-Path with Attention Mechanism for Fine-Grain...
收藏 引用
2019 3rd International Conference on Data Mining, Communications and Information technology (DMCIT 2019)
作者: Zhixiao Wang Wenyao Yan Wendong Wang Ang Gao Lei Yu Shaobo Yang GaoYang Nie School of Computer Science and Engineering Xi'an University of Technology Telematics Group the University of Goettingen Shaanxi Key Laboratory of Network Computing and Security School of Electronic and Information Engineering Xi'an Jiaotong University College of Xi'an Innovation Yan'an University Yan'an University National Satellite Meteorological Center China Meteorological Administration
Based on the huge volumes of user check-in data in LBSNs,users’ intrinsic mobility patterns can be well explored,which is fundamental for predicting where a user will visit next given his/her historical check-in *** ...
来源: 评论
An attribute-based encryption scheme with LSSS key-policy from lattices
Advances in Intelligent Systems and Computing
收藏 引用
Advances in Intelligent Systems and computing 2018年 613卷 217-230页
作者: Liu, Lihua Wang, Shangping Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an710054 China School of Mathematics and Computer Science Shaanxi University of Technology HanzhongShaanxi723001 China
A new attribute-based encryption scheme (ABE) from lattices with Linear Secret Sharing Scheme (LSSS) key-policy is presented. In the new scheme, the key of an attribute under an access policy represented by LSSS is ge... 详细信息
来源: 评论
A rich ranking model based on the matthew effect optimization  7th
A rich ranking model based on the matthew effect optimizatio...
收藏 引用
7th International Conference on Computational Data and Social networks, CSoNet 2018
作者: Li, Jinzhong Liu, Guanjun Department of Computer Science and Technology College of Electronic and Information Engineering Jinggangshan University Ji’an343009 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu610054 China Department of Computer Science and Technology College of Electronic and Information Engineering Tongji University Shanghai201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China
Most existing approaches of learning to rank treat the effectiveness of each query equally which results in a relatively lower ratio of queries with high effectiveness (i.e. rich queries) in the produced ranking model... 详细信息
来源: 评论
Revisiting Cloud Migration: Strategies and Methods
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1575卷
作者: Zhixiao Wang Wenyao Yan Wendong Wang School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Shaanxi Key Laboratory Xi'an of Network Computing and Security Technology China School of Data Science and Computer Xi'an innovation college of Yan'an University Xi'an 710100 China Yan'an University Xi'an 716000 China
Cloud computing attracts users with its advantage of unlimited resource supply where resources can be elastically expanded on demand and balanced-load at the same time. This means that the application in the cloud env...
来源: 评论
Efficient attribute-based encryption with blackbox traceability  12th
Efficient attribute-based encryption with blackbox traceabil...
收藏 引用
12th International Conference on Provable security, ProvSec 2018
作者: Xu, Shengmin Yang, Guomin Mu, Yi Liu, Ximeng Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong Wollongong Australia School of Information Systems Singapore Management University Singapore Singapore College of Mathematics and Computer Science Fuzhou University FuzhouFujian China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceability w... 详细信息
来源: 评论
A Multi-label Classifier for Human Protein Subcellular Localization Based on LSTM networks
A Multi-label Classifier for Human Protein Subcellular Local...
收藏 引用
2018 International Conference on Advanced Control, Automation and Artificial Intelligence (ACAAI2018)
作者: Zhiying Gao Lijun Sun Zhihua Wei Department of Computer Science and Technology Tongji University Research Center of Big Data and Network Security Tongji University Key Laboratory of Embedded System and Service Computing Tongji University
Nowadays, with the increasing number of protein sequences all over the world, more and more people are paying their attention to predicting protein subcellular location. Since wet experiment is costly and time-consumi... 详细信息
来源: 评论
A Study on Influential User Identification in Online Social networks
收藏 引用
Chinese Journal of Electronics 2016年 第3期25卷 467-473页
作者: WANG Nan SUN Qindong ZHOU Yadong SHEN Si Shaanxi Key Laboratory of Network Computing and Security Xi'an University of Technology Ministry of Education Key Laboratory For Intelligent Network and Network Security Xi'an Jiaotong University
Influential user evaluation is great importance in many application areas of online social *** order to identify influential users in a more adequate and practical way, we propose a Dynamic regional interaction model(... 详细信息
来源: 评论
An Improved Convolutional Neural network Algorithm for Multi-Label Classification
An Improved Convolutional Neural Network Algorithm for Multi...
收藏 引用
International Conference on Audio, Language and Image Processing, ICALIP
作者: Xinsheng Wang Lijun Sun Zhihua Wei Department of Computer Science and Technology Tongji University Shanghai China Research Center of Big Data and Network Security Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China
Recent years conventional neural network(CNN) has been applied to different natural language processing(NLP) tasks such as sentence classification, sentence modeling, etc. Some researchers use CNN to do multi-label cl... 详细信息
来源: 评论
Analysis of SVEIR worm attack model with saturated incidence and partial immunization
收藏 引用
Journal of Communications and Information networks 2017年 第4期1卷 105-115页
作者: Wang, Fangwei Huang, Wenyan Shen, Yulong Wang, Changguang College of Information Technology Hebei Normal University Shijiazhuang China Shannxi Key Laboratory of Network and System Security Xidian University Xi’an China College of Computers Xidian University Xi’an China
Internet worms can propagate across networks at terrifying speeds, reduce network security to a remarkable extent, and cause heavy economic losses. Thus, the rapid elimination of Internet worms using partial immunizat...
来源: 评论