咨询与建议

限定检索结果

文献类型

  • 601 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 780 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 271 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 40 篇 控制科学与工程
    • 30 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 25 篇 网络空间安全
    • 24 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 155 篇 理学
    • 96 篇 数学
    • 36 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 80 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 14 篇 社会学
    • 13 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 adaptation model...
  • 28 篇 deep learning
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 265 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 674 篇 英文
  • 105 篇 其他
  • 7 篇 中文
检索条件"机构=Shannxi Key Laboratory for Network Computing and Security Technology"
780 条 记 录,以下是71-80 订阅
排序:
StarMFND: Star Topology Multi-Domain Fake News Detection  7
StarMFND: Star Topology Multi-Domain Fake News Detection
收藏 引用
7th International Conference on Data Science and Information technology, DSIT 2024
作者: Gu, Pengfei Chen, Yibing Bing, Wanlong Liu, Yahui Ma, Hongliang Wang, Wei Shihezi University School of Information Science and Technology Shihezi China Xinjiang Production and Construction Corps Key Laboratory of Computing Intelligence and Network Information Security Shihezi China Beijing Jiaotong University School of Computer Science and Information Technology Beijing China
The proliferation of the Internet and the emergence of social media platforms have greatly accelerated the speed and scope of information dissemination, while also introducing the peril of fake news propagation, parti... 详细信息
来源: 评论
A Multi-Exposure Generation and Fusion Method for Low-Light Image Enhancement
A Multi-Exposure Generation and Fusion Method for Low-Light ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Haiyan Jin Long Li Haonan Su YuanLin Zhang ZhaoLin Xiao Bin Wang Faculty of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In the low light image enhancement, single exposure images contains a limited dynamic range, which hinders the restoration of contrast and texture. To address these problems, we propose a multi exposure generation and... 详细信息
来源: 评论
Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration
Block-Streaming Service Loading Optimization of Android Dalv...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Wang, Yichuan Feng, Yanhua Du, Yanning Hei, Xinhong Tian, Yuying Cui, Xiangjie School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In recent years, dynamic loading technologies of Android applications have emerged in an endless stream. At present, the existing Android application loading method is to load the entire Android Dalvik Executable (DEX... 详细信息
来源: 评论
Multimodal Multi-objective Particle Swarm Optimization Algorithm Based on Multi-directional Guidance  4
Multimodal Multi-objective Particle Swarm Optimization Algor...
收藏 引用
4th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2022
作者: Li, Wei Gao, Yetong Wang, Lei School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
In multimodal multi-objective optimization, the key issue is to find as many Pareto optimal solutions as possible and select promising solutions in the environmental selection. This paper proposes a multimodal multi-o... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qin, Libo Wei, Fuxuan Chen, Qiguang Zhou, Jingxuan Huang, Shijue Si, Jiasheng Lu, Wenpeng Che, Wanxiang School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th...
来源: 评论
Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection  7th
Block-gram: Mining Knowledgeable Features for Smart Contrac...
收藏 引用
7th International Conference on Smart computing and Communication, SmartCom 2022
作者: Li, Tao Wang, Haolong Fang, Yaozheng Jian, Zhaolong Wang, Zichun Xie, Xueshuo Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Effective vulnerability detection of large-scale smart contracts is critical because smart contract attacks frequently bring about tremendous economic loss. However, code analysis requiring traversal paths and learnin... 详细信息
来源: 评论
Precise and Efficient:A Hybrid Analysis-Based Stack Overflow Detection Model under MIPS  9
Precise and Efficient:A Hybrid Analysis-Based Stack Overflow...
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Wang, Yichuan Huang, Chenhao Zhang, Tong Zhao, Li Gu, Zhendong Li, Gangyang Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China Hanjiang.to.Weihan River Valley Water Diversion Project Construction.co.ltd Xi'an China
Although the vulnerability detection techniques under the MIPS platform can detect stack overflow vulnerabilities, the stack overflow vulnerability of the stack frame changes is complex and hard to recover. The input ... 详细信息
来源: 评论
Robust Voice Activity Detection using Locality-Sensitive Hashing and Residual Frequency-Temporal Attention  25
Robust Voice Activity Detection using Locality-Sensitive Has...
收藏 引用
25th Interspeech Conferece 2024
作者: Li, Shu Zhang, Peng Li, Ye Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science China
For voice activity detection (VAD), recent works focus on learning the attention distribution on contextual information of speech to reduce the impact of irrelevant noise. However, contextual frames selected with spec... 详细信息
来源: 评论
CurMIM: Curriculum Masked Image Modeling
CurMIM: Curriculum Masked Image Modeling
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Hao Wang, Kun Han, Yudong Wang, Haocong Hu, Yupeng Wang, Chunxiao Nie, Liqiang School of Software Shandong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
Masked Image Modeling (MIM), following "mask-and-reconstruct" scheme, is a promising self-supervised method to learn scalable visual representation. Studies indicate that selecting an effective mask strategy... 详细信息
来源: 评论
HiRes: Hierarchical Feature Optimization and Rescorer for Automatic ICD Coding
HiRes: Hierarchical Feature Optimization and Rescorer for Au...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liang, Zhenpeng Guan, Hongjiao Lu, Wenpeng Peng, Xueping Xu, Bing Yang, Muyun Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia Faculty of Computing Harbin Institute of Technology Harbin China
The International Classification of Diseases (ICD) coding assigns standardized codes to diseases. Automating this process enhances the efficiency and accuracy of clinical records processing. However, current methods s... 详细信息
来源: 评论