咨询与建议

限定检索结果

文献类型

  • 579 篇 会议
  • 184 篇 期刊文献

馆藏范围

  • 763 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 357 篇 工学
    • 281 篇 计算机科学与技术...
    • 237 篇 软件工程
    • 89 篇 信息与通信工程
    • 77 篇 电气工程
    • 48 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 28 篇 网络空间安全
    • 23 篇 机械工程
    • 22 篇 光学工程
    • 20 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 99 篇 数学
    • 37 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 10 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 3 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 87 篇 feature extracti...
  • 70 篇 accuracy
  • 54 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 data models
  • 39 篇 federated learni...
  • 39 篇 training
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 20 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 codes
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 38 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 zhu lei
  • 11 篇 fu chong

语言

  • 692 篇 英文
  • 70 篇 其他
  • 4 篇 中文
检索条件"机构=Shanxi Key Laboratory for Network Computing and Security Technology"
763 条 记 录,以下是211-220 订阅
排序:
On the -differential spectra of two classes of power functions over finite fields
收藏 引用
Applicable Algebra in Engineering, Communication and computing 2025年 1-30页
作者: Liu, Qian Huang, Zhiwei Chen, Zhixiong Jiang, Rong Zhang, Liupiao Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Fujian Key Laboratory of Financial Information Processing Putian University Putian China School of Computer Science and Technology Dongguan University of Technology Dongguan China
Recently, a new concept called multiplicative differential was introduced by Ellingsen et al. [7]. As an extension of the differential uniformity, it is theoretically appealing to determine the properties of c-differe...
来源: 评论
Parallel Optimization of Computational Fluid Dynamics Application code_saturne Based on Next Generation Sunway Supercomputer  14
Parallel Optimization of Computational Fluid Dynamics Applic...
收藏 引用
14th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2023
作者: Liu, Anjun Liao, Yin Xu, Xihao Chen, YanYan Zhong, Hongjun Wu, Jianming Kong, Bo Raikov, Alexander Guo, Meng Jinan Institute of Supercomputing Technology Jinan Key Laboratory of High Performance Industrial Software Jinan China Zhejiang Yuansuan Technology Co. Ltd Jinan Supercomputing-Zhejiang Yuansuan Industrial Simulation System Joint Laboratory Hangzhou China Qilu University of Technology Shandong Academy of Sciences Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security China Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Shandong Jinan China
code_saturne is an open-source general large-scale computational fluid dynamics software independently developed by Electricite de France since 1997. Due to its high computing performance, code_saturne has been widely... 详细信息
来源: 评论
A Modified CSO Based on Complementary Learning
A Modified CSO Based on Complementary Learning
收藏 引用
第34届中国控制与决策会议
作者: Wei Li Zhou Lei Lei Wang School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
Competitive swarm optimization algorithm(CSO) is an effective optimization ***,the population is easy to converge to the local optimal area in dealing with complex *** improve the performance of the CSO algorithm,this... 详细信息
来源: 评论
Memory-guided two-stream spatio-temporal coding network based for video anomaly detection  23
Memory-guided two-stream spatio-temporal coding network base...
收藏 引用
Proceedings of the 2023 International Conference on Information Education and Artificial Intelligence
作者: Bonan Li Hong Zhang Xingang Wang Rui Cao Jinyan Zhou China Radio and Television Shandong Network Co Ltd China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) China
In the paper, we propose a memory-guided dual-stream spatio-temporal encoder network (MSTAE) based on the U-Net network as the backbone, the spatial stream uses the time displacement module to obtain the spatial featu...
来源: 评论
HEN:a novel hybrid explainable neural network based framework for robust network intrusion detection
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 72-90页
作者: Wei WEI Sijin CHEN Cen CHEN Heshi WANG Jing LIU Zhongyao CHENG Xiaofeng ZOU School of Computer Science and Engineering Xi'an University of TechnologyShaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Technology Wuhan University of Science and Technology School of Future Technology South China University of Technology Shenzhen Research Institute of Hunan University School of Computer Science Hunan University of Technology and Business Institute for Infocomm Research (I2R) Agency for Science Technology and Reseach (A*STAR)
With the rapid development of network technology and the automation process for 5G, cyberattacks have become increasingly complex and threatening. In response to these threats, researchers have developed various netwo... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Libo Qin Fuxuan Wei Qiguang Chen Jingxuan Zhou Shijue Huang Jiasheng Si Wenpeng Lu Wanxiang Che School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences)
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th... 详细信息
来源: 评论
Reputation based Adaptive Federated Learning in Medical Scenarios
Reputation based Adaptive Federated Learning in Medical Scen...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Lianhai Wang Tianrui Liu Yingxiaochun Wang Xinlei Wang Qi Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Federated Learning (FL) is a distributed machine learning paradigm designed to address data silos and protect data privacy. However, in medical scenarios, the heterogeneity in data quality and the non-independent and ... 详细信息
来源: 评论
ID-YOLOv7: A Method for Steel Surface Defect Detection Combining Residual Attention and Dynamic Upsampling
ID-YOLOv7: A Method for Steel Surface Defect Detection Combi...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Shanshan Liu Xiangzhi Liu Jiazheng Man Bingyang Cao Yunfeng Dong Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Industrial defect detection is a crucial challenge in computer vision. The accuracy of detecting defects on steel surfaces is hindered by spatially varying noise. To address this challenge, we propose an efficient met... 详细信息
来源: 评论
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing for Blockchain Sharding
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing f...
收藏 引用
Robotics, Intelligent Control and Artificial Intelligence (RICAI), International Conference on
作者: Yu Wang Xiaoming Wu Qile Yuan Yunfeng Dong Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
As blockchain technology becomes widely applied, handling high volumes of transactions has become a critical challenge. Sharding has emerged as an effective solution to enhance the throughput of blockchain systems. Ye... 详细信息
来源: 评论
Signature Scheme Based on The SM2 Algorithm in Fabric
Signature Scheme Based on The SM2 Algorithm in Fabric
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Zhang, Yaling Wang, Hongyun Wang, Yichuan Ji, Wenjiang Zhu, Lei Xi'an University of technology School of computer science and engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of technology Xi'an China
Based on the analysis and research of the widely used Hyperledger Fabric alliance chain structure, this paper proposes a digital signature scheme based on the national cryptographic algorithm SM2 which can be applied ... 详细信息
来源: 评论