咨询与建议

限定检索结果

文献类型

  • 579 篇 会议
  • 184 篇 期刊文献

馆藏范围

  • 763 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 357 篇 工学
    • 281 篇 计算机科学与技术...
    • 237 篇 软件工程
    • 89 篇 信息与通信工程
    • 77 篇 电气工程
    • 48 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 28 篇 网络空间安全
    • 23 篇 机械工程
    • 22 篇 光学工程
    • 20 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 99 篇 数学
    • 37 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 10 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 3 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 87 篇 feature extracti...
  • 70 篇 accuracy
  • 54 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 data models
  • 39 篇 federated learni...
  • 39 篇 training
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 20 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 codes
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 38 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 zhu lei
  • 11 篇 fu chong

语言

  • 692 篇 英文
  • 70 篇 其他
  • 4 篇 中文
检索条件"机构=Shanxi Key Laboratory for Network Computing and Security Technology"
763 条 记 录,以下是231-240 订阅
排序:
Automatic recognition of depression based on audio and video:A review
收藏 引用
World Journal of Psychiatry 2024年 第2期14卷 225-233页
作者: Meng-Meng Han Xing-Yun Li Xin-Yu Yi Yun-Shao Zheng Wei-Li Xia Ya-Fei Liu Qing-Xiang Wang Shandong Mental Health Center Shandong UniversityJinan 250014Shandong ProvinceChina Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and TechnologyQilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250353Shandong ProvinceChina Department of Ward Two Shandong Mental Health CenterShandong UniversityJinan 250014Shandong ProvinceChina
Depression is a common mental health *** current depression detection methods,specialized physicians often engage in conversations and physiological examinations based on standardized scales as auxiliary measures for ... 详细信息
来源: 评论
Mirror contrastive loss based sliding window transformer for subject-independent motor imagery based EEG signal recognition
arXiv
收藏 引用
arXiv 2024年
作者: Luo, Jing Mao, Qi Shi, Weiwei Shi, Zhenghao Wang, Xiaofan Lu, Xiaofeng Hei, Xinhong Shaanxi Key Laboratory for Network Computing and Security Technology and Human–Machine Integration Intelligent Robot Shaanxi University Engineering Research Center School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an China
While deep learning models have been extensively utilized in motor imagery based EEG signal recognition, they often operate as black boxes. Motivated by neurological findings indicating that the mental imagery of left... 详细信息
来源: 评论
LMS Channel Estimation Algorithm for IM/DD-OFDM/OQAM-PON Systems in 5G-Enabled Industrial Internet
LMS Channel Estimation Algorithm for IM/DD-OFDM/OQAM-PON Sys...
收藏 引用
2021 IEEE Globecom Workshops, GC Wkshps 2021
作者: Liang, Siyuan Wang, Xuefen Du, Jianbo Zhao, Feng Cao, Haotong Xi'An University of Posts and Telecommunications Shanxi Key Laboratory of Information Communication Network and Security Xi'an China The Hong Kong Polytechnic University Department of Computing Hong Kong Hong Kong
Orthogonal frequency division multiplexing/offset quadrature amplitude modulation (OFDM/OQAM) passive optical network (PON) is an attractive technique for 5G-enabled Industrial Internet due to the large bandwidth and ... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin
Dynamic detection technology of encryption algorithm based o...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Junpeng Qu Gaolei Du Yunge Sun Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
An Encryption Algorithm Cycle Identification Method Based on Bit Execution
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yunge Sun Gaolei Du Junpeng Qu Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology(Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论
CGNet: Classification-Guided Multi-Task Interactive network for Hyperspectral and Multispectral Image Fusion
CGNet: Classification-Guided Multi-Task Interactive Network ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Yanlong Xu Yongbiao Gao Guixin Zhao Guotao Wang Xiangcheng Sun Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science China Shandong Key Laboratory of Ubiquitous Intelligent Computing China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application (Southeast University) Ministry of Education China Beihang University Beijing China
The goal of fusing hyperspectral images (HSI) and multispectral images (MSI) is to generate high-resolution hyperspectral images for downstream tasks. However, most existing methods overlook the specific requirements ... 详细信息
来源: 评论
An automated construction method for symmetric encryption round function models based on dynamic analysis
An automated construction method for symmetric encryption ro...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Gaolei Du Yunge Sun Junpeng Qu Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
With the deepening of informatization, the incidence of cybercrimes utilizing malicious software for attacks is on the rise. This paper addresses the detection issue of symmetric encryption in malicious software from ... 详细信息
来源: 评论
Riemannian Nearest-Regularized Subspace Classification for Polarimetric SAR images
arXiv
收藏 引用
arXiv 2022年
作者: Shi, Junfei Jin, Haiyan The Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China
As a representation learning method, nearest regularized subspace (NRS) algorithm is an effective tool to obtain both accuracy and speed for PolSAR image classification. However, existing NRS methods use the polarimet... 详细信息
来源: 评论
Robust Video Watermarking network Based on Channel Spatial Attention
Robust Video Watermarking Network Based on Channel Spatial A...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Jian Li Tao Zuo Bin Ma Chunpeng Wang Peng Zhang Huanhuan Zhao Zhengzhong Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Robust video watermarking refers to the ability to extract the originally embedded watermark information from a video even after malicious modifications and attacks. Currently, traditional watermarking methods have th... 详细信息
来源: 评论
Cross-Chain Asset Transaction Method Based on Decentralized Digital Identity
Cross-Chain Asset Transaction Method Based on Decentralized ...
收藏 引用
Blockchain technology and Information security (ICBCTIS), International Conference on
作者: Ruiyao Zhou Shuhui Zhang Lianhai Wang Shujiang Xu Wei Shao Ting Gao Ruixue Kuang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
The swift advancement of blockchain technology has improved the transfer of value and assets between various blockchain systems. Nonetheless, the differing underlying architectures of these platforms have impeded effe... 详细信息
来源: 评论