咨询与建议

限定检索结果

文献类型

  • 579 篇 会议
  • 184 篇 期刊文献

馆藏范围

  • 763 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 357 篇 工学
    • 281 篇 计算机科学与技术...
    • 237 篇 软件工程
    • 89 篇 信息与通信工程
    • 77 篇 电气工程
    • 48 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 28 篇 网络空间安全
    • 23 篇 机械工程
    • 22 篇 光学工程
    • 20 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 99 篇 数学
    • 37 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 10 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 3 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 87 篇 feature extracti...
  • 70 篇 accuracy
  • 54 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 data models
  • 39 篇 federated learni...
  • 39 篇 training
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 20 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 codes
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 38 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 zhu lei
  • 11 篇 fu chong

语言

  • 692 篇 英文
  • 70 篇 其他
  • 4 篇 中文
检索条件"机构=Shanxi Key Laboratory for Network Computing and Security Technology"
763 条 记 录,以下是221-230 订阅
排序:
Research and Application of Speech Transmission Index in Acoustic Leakage Detection
Research and Application of Speech Transmission Index in Aco...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)
作者: Qiuyun Hao FuQiang Wang Peng Zhang XiaoFeng Ma Jianqiang Zhang Wei Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Acoustic information in confidential premise can be leaked through channels such as walls, pipes, doors and windows. Acoustic leakage level needs to be measured through specific indicators. Acoustic leakage evaluation... 详细信息
来源: 评论
A Blockchain-Based Hierarchical Dynamic Collaborative Storage Model
A Blockchain-Based Hierarchical Dynamic Collaborative Storag...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qile Yuan Xiangzhi Liu Yu Wang Yunfeng Dong Haoyu Jia Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The pervasive application of blockchain technology has led to a significant increase in data volume, presenting significant challenges to existing storage architectures in environments characterized by large volumes o... 详细信息
来源: 评论
SGNet: A Multi-Scale Method for Steel Surface Defect Detection
SGNet: A Multi-Scale Method for Steel Surface Defect Detecti...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Shanshan Liu Xiangzhi Liu Jiazheng Man Bingyang Cao Yunfeng Dong Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The large variation in target scales within steel surface defect images often results in low detection accuracy. To address this issue, we have developed a multi-scale defect detection method named SGNet. Initially, w... 详细信息
来源: 评论
Research on the Design of Government Data Governance Evaluation System under the Perspective of Digital Government  9
Research on the Design of Government Data Governance Evaluat...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Xu, Zirui Sun, Jinyang Lu, Zhe Han, Delong Qilu University of Technology Shandong Academy of Sciences Information Research Institute Shandong Academy of Sciences Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd. Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
In the context of the digital era, government data governance is a key factor in promoting the modernization of government governance, but there is a lack of a complete set of evaluation index system to standardize th... 详细信息
来源: 评论
RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes  22
RDGFuzz: A directed greybox fuzzing optimization method base...
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic Information technology and Computer Engineering
作者: Zejun Wu Li Lu Qiong Jia Zhihao Chen State Key Laboratory of Mathematical Engineering and advanced Computing China National Local Joint Engineering Laboratory of Network Space Security Technology China Beijing Institute of Computer Technology and Application China
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s... 详细信息
来源: 评论
Covariance Matrix Adaptation Evolutionary Algorithm for Multi-task Optimization  15th
Covariance Matrix Adaptation Evolutionary Algorithm for Mult...
收藏 引用
15th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2020
作者: Li, Wei Lei, Zhou Yuan, Junqing Luo, Haonan Jiang, Qiaoyong Li, Jinbo School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China
Multifactorial evolution is a relatively new evolutionary multitasking paradigm which aims to solve multiple optimization problems simultaneously. In order to make a further contribution to multifactorial optimization... 详细信息
来源: 评论
A Federated Learning network Intrusion Detection System for Multiple Imbalances
A Federated Learning Network Intrusion Detection System for ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yifan Zeng Peijia Zheng Jian Li School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Centralized training of deep learning-based network intrusion detection systems (DLNIDS) raises privacy concerns and incurs huge overhead. Federated learning (FL), while preserving privacy, confronts challenges includ... 详细信息
来源: 评论
Infringement Detection and Traceability Scheme Based on Ciphertext Feature Extraction
Infringement Detection and Traceability Scheme Based on Ciph...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Lianhai Wang Xinlei Wang Tianrui Liu Yingxiaochun Wang Qi Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The rapid growth of healthcare data transactions has fostered win-win developments in healthcare technology innovation and economic benefits. However, the issue of secondary transactions makes data ownership vulnerabl... 详细信息
来源: 评论
An Improved Cloud Particles Optimizer for Function Optimization  1
收藏 引用
2nd International Conference on Neural computing for Advanced Applications, NCAA 2021
作者: Li, Wei Luo, Haonan Yuan, Junqing Lei, Zhou Wang, Lei School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China
Evolutionary algorithm is a popular and effective method in optimization field. As one of the optimization algorithms, cloud particles optimizer (CPEA) has shown to be effective in solving problems with different char... 详细信息
来源: 评论
Enhanced Velocity-Driven Particle Swarm Optimization for Evolving Artificial Neural network  2021
Enhanced Velocity-Driven Particle Swarm Optimization for Evo...
收藏 引用
7th International Conference on computing and Artificial Intelligence, ICCAI 2021
作者: Li, Wei Luo, Haonan Lei, Zhou Yuan, Junqing Dong, Wangshun Wang, Lei School of Computer Science and Engineering Xi'an University of Technology Xi'an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an710048 China
Neural network has been considered as an effective tool for predicting chaotic time series and approximating functions. However, traditional methods for training neural networks have some shortcomings, such as slow co... 详细信息
来源: 评论