咨询与建议

限定检索结果

文献类型

  • 579 篇 会议
  • 184 篇 期刊文献

馆藏范围

  • 763 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 357 篇 工学
    • 281 篇 计算机科学与技术...
    • 237 篇 软件工程
    • 89 篇 信息与通信工程
    • 77 篇 电气工程
    • 48 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 28 篇 网络空间安全
    • 23 篇 机械工程
    • 22 篇 光学工程
    • 20 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 99 篇 数学
    • 37 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 10 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 3 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 87 篇 feature extracti...
  • 70 篇 accuracy
  • 54 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 data models
  • 39 篇 federated learni...
  • 39 篇 training
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 20 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 codes
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 38 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 zhu lei
  • 11 篇 fu chong

语言

  • 692 篇 英文
  • 70 篇 其他
  • 4 篇 中文
检索条件"机构=Shanxi Key Laboratory for Network Computing and Security Technology"
763 条 记 录,以下是121-130 订阅
排序:
LampMark: Proactive Deepfake Detection via Training-Free Landmark Perceptual Watermarks  24
LampMark: Proactive Deepfake Detection via Training-Free Lan...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wang, Tianyi Huang, Mengxiao Cheng, Harry Zhang, Xiao Shen, Zhiqi Nanyang Technological University Singapore Singapore Qilu University of Technology Jinan China Shandong University Qingdao China NTU-WeBank Research Centre on Fintech Nanyang Technological University Singapore Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology China College of Computing and Data Science Nanyang Technological University Singapore
Deepfake facial manipulation has garnered significant public attention due to its impacts on enhancing human experiences and posing privacy threats. Despite numerous passive algorithms that have been attempted to thwa... 详细信息
来源: 评论
False Correspondence Removal via Revisiting Semantic Context with Position-Attentive Learning
False Correspondence Removal via Revisiting Semantic Context...
收藏 引用
IEEE International Conference on Image Processing
作者: Ruiyuan Li Zhaolin Xiao Meng Zhang Haonan Su Haiyan Jin Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
False correspondence removal remains a challenge for many feature-matching-based applications. This paper proposes a solution that revisits the local semantic context via position-attentive learning. First, a cross-di...
来源: 评论
A Technique for Ensured Cross Chain IBC Transactions Using TPM
A Technique for Ensured Cross Chain IBC Transactions Using T...
收藏 引用
Big Data and Privacy computing (BDPC), International Conference on
作者: YiChuan Wang YiLiang Yan XiaoXue Liu Wen Gao ZiYan Wang School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cross chain contact across several blockchains becomes increasingly significant in importance with the increased use of blockchain technology. However, security cannot be assured when producing equivalent outputs thro... 详细信息
来源: 评论
Code obfuscation protection strategies for program running states
Code obfuscation protection strategies for program running s...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xin Song Haonan Wang Yichuan Wang Xinhong Hei Wenjiang Ji School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
To enhance the security, complexity, and applicability of cloud node programs, effectively hinder attackers from reverse engineering, and reduce the ability of detailed analysis and vulnerability discovery of applicat... 详细信息
来源: 评论
Low Light RGB and IR Image Fusion with Selective CNN-Transformer network
Low Light RGB and IR Image Fusion with Selective CNN-Transfo...
收藏 引用
IEEE International Conference on Image Processing
作者: Haiyan Jin Yue Yang Haonan Su Zhaolin Xiao Bin Wang School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In low-light images, contrast and brightness are corrupted, making it difficult to accurately percept detail and edge information with the naked eye. Because of the development of multi sensor imaging, RGB-IR image fu...
来源: 评论
Riemannian Complex Hermit Positive Definite Convolution network for Polarimetric SAR Image Classification
arXiv
收藏 引用
arXiv 2025年
作者: Shi, Junfei Nie, Mengmeng Li, Yuke Jin, Haiyan Lin, Weisi Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China College of Computing and Data Science Nanyang Technological University 639798 Singapore
Deep learning can learn high-level semantic features in Euclidean space effectively for PolSAR images, while they need to covert the complex covariance matrix into a feature vector or complex-valued vector as the netw... 详细信息
来源: 评论
Research on Text Classification Based on BERT-BiGRU Model  3
Research on Text Classification Based on BERT-BiGRU Model
收藏 引用
2020 3rd International Conference on Modeling, Simulation and Optimization Technologies and Applications, MSOTA 2020
作者: Yu, Qing Wang, Ziyin Jiang, Kaiwen Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
Text classification is a typical application of natural language processing. At present, the most commonly used text classification method is deep learning. Meanwhile there are many difficulties in natural language pr... 详细信息
来源: 评论
Ultra-high definition video quality assessment method based on deep learning  9
Ultra-high definition video quality assessment method based ...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Wei He, Can Zhou, MingLe Zhang, HengYu Liu, WenLong Hisense Video Technology Co. Ltd. Qing Dao China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
With the development of display technology, people's demand for high-definition video is increasing, and the requirements for video quality are also increasing. Nowadays, a large number of videos have emerged, and... 详细信息
来源: 评论
PNRITR:Research on Positive and Negative Entity Region Perception Methods for Image-Text Retrieval  36
PNRITR:Research on Positive and Negative Entity Region Perce...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Zhang, Zhiping Sun, Tao Zheng, Hongyan Liu, Hao Liu, Gengchen Yang, Zhi Wang, Xiaoyu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The aim of cross-modal image-text retrieval is to heighten comprehension and to create robust associations between visual and textual content. This process entails a mutual querying and synchronization across various ... 详细信息
来源: 评论
Channel Capacity Analysis for Diffusive Molecular Communication with a Partly Covered Comprehensive Reactive Receiver
Channel Capacity Analysis for Diffusive Molecular Communicat...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhu, Junning Liao, Xuening Wu, Zhenqiang Key Laboratory of Modern Teaching Technology Ministry of Education Xi’an China School of Computer Science Shaanxi Normal University Xi’an China Shaanxi Key Laboratory for Network Computing and Security Shaanxi Xi’an710048 China
Molecular communication (MC) is a technology that utilizes microscopic particles such as molecules to communicate at the microscopic scale in living organisms. The nanomachine receiver as a critical part of MC has bee... 详细信息
来源: 评论