咨询与建议

限定检索结果

文献类型

  • 579 篇 会议
  • 184 篇 期刊文献

馆藏范围

  • 763 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 357 篇 工学
    • 281 篇 计算机科学与技术...
    • 237 篇 软件工程
    • 89 篇 信息与通信工程
    • 77 篇 电气工程
    • 48 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 28 篇 网络空间安全
    • 23 篇 机械工程
    • 22 篇 光学工程
    • 20 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 99 篇 数学
    • 37 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 10 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 3 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 87 篇 feature extracti...
  • 70 篇 accuracy
  • 54 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 data models
  • 39 篇 federated learni...
  • 39 篇 training
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 20 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 codes
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 38 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 zhu lei
  • 11 篇 fu chong

语言

  • 692 篇 英文
  • 70 篇 其他
  • 4 篇 中文
检索条件"机构=Shanxi Key Laboratory for Network Computing and Security Technology"
763 条 记 录,以下是271-280 订阅
排序:
TSF-Net:Abnormal Video Behavior Detection Framework Based on Two-Stream Appearance Motion Semantic Fusion  23
TSF-Net:Abnormal Video Behavior Detection Framework Based on...
收藏 引用
Proceedings of the 2023 International Conference on Information Education and Artificial Intelligence
作者: Bonan Li Rui Cao Xingang Wang Hong Zhang Jinyan Zhou China Radio and Television Shandong Network Co Ltd China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China
Video anomalous behavior detection aims to detect rare and random anomalous events, which usually deviate from expectations. Existing detection methods do not consider the appearance semantics and motion semantics of ...
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qiliang Gu Qin Lu Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
A Hybrid Loss network for Localization of Image Manipulation  19th
A Hybrid Loss Network for Localization of Image Manipulation
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Yin, Qilin Wang, Jinwei Luo, Xiangyang Nanjing University of Information Science and Technology and Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China Shanxi Key Laboratory of Network and System Security Xidian University Xi’an710071 China
With the development of information security, localization of image manipulations havs become a hot topic. In this paper, a hybrid loss network is proposed for the manipulated image forensics. First, the patch predict... 详细信息
来源: 评论
Research on the Distribution Characteristics of Standardized Big Data Resources Based on Data Visualization - - Taking Standardization Practice in Shandong Province as an Example  9
Research on the Distribution Characteristics of Standardized...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Sun, Jinyang Peng, Dongdong Lu, Zhe Zhai, Mengran Qi, Ning Qi, Yuanhua SHANDONG SCICOM Information and Economy Research Institute Co. Ltd. Jinan China Jinan Municipal Bureau of Big Data Jinan China Shandong Institute of Economy and Informatization Development Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
Standardized big data, as a product of the combination of big data and standardization work, objectively reflects the status quo and trends of standardization work. An in-depth study of the distribution characteristic... 详细信息
来源: 评论
An Efficient Energy Consumption Prediction Framework for High Performance computing Cluster Jobs
An Efficient Energy Consumption Prediction Framework for Hig...
收藏 引用
International Conference on Computer Engineering and Applications (ICCEA)
作者: Yantao Lou Jibin Wang Shoupeng Feng Xian Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Public Security of Shandong Province Shandong Intelligent Public Security Technology Innovation Center Jinan China
Energy consumption prediction is a crucial approach to enhance the operational efficiency of HPC (High Performance computing) clusters. Existing predicting methods for the energy consumption mainly rely on time series... 详细信息
来源: 评论
Rail Transit Event Extraction based on the Fusion of Semantic and Local Dependency Features
Rail Transit Event Extraction based on the Fusion of Semanti...
收藏 引用
IEEE International Conference on Big Knowledge (ICBK)
作者: Qiang Chen Haining Meng Yihao Bao Mingsong Yang Xinyu Tong Qin Zhao Muhammad Bilal Khan Xinhong Hei School of Computer Science and Engineering Xi’an University of Technology Xi’an China School of Computer Science and Engineering Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an University of Technology Xi’an China School of Civil Engineering and Architecture Xi’an University of Technology Xi’an China
Event extraction in rail transit plays a vital role in all stages of design, construction, and final acceptance. Event extraction is a key part of building event logic graph (ELG). However, the difficulty in obtaining... 详细信息
来源: 评论
DM-YOLOv5:An Improved Safety Helmet Detection Algorithm at Complex Construction Scenes
DM-YOLOv5:An Improved Safety Helmet Detection Algorithm at C...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Dexu Yao Aimin Li Deqi Liu Mengfan Cheng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
At complex construction sites, detecting whether workers are wearing safety helmets is often affected by occlusion and sunlight change. In addition, the helmets are relatively small, which can easily lead to missed de... 详细信息
来源: 评论
Joint Entity and Relation Extraction Based on Prompt Learning and Multi-channel Heterogeneous Graph Enhancement
Joint Entity and Relation Extraction Based on Prompt Learnin...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Haiqing Lv Xiaohui Han Peipei Wang Wenbo Zuo Jing Guo Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China Information Research Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Joint extraction of entity and relation is crucial in information extraction, aiming to extract all relation triples from unstructured text. However, current joint extraction methods face two main issues. Firstly, the... 详细信息
来源: 评论
FSD-YOLO: An Improved Method for Steel Surface Defect Detection Based on YOLOv5
FSD-YOLO: An Improved Method for Steel Surface Defect Detect...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yuechen Zhang Aimin Li Xiaotong Kong Wenqiang Li Zhiyao Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Steel surface defect detection is very important in industrial quality inspection, and there have been many studies on Steel surface defect detection in recent years. Existing steel surface defect detection algorithms... 详细信息
来源: 评论
RTS-DETR: Efficient Real-Time DETR for Small Object Detection
RTS-DETR: Efficient Real-Time DETR for Small Object Detectio...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Wenqiang Li Aimin Li Zhiyao Li Xiaotong Kong Yuechen Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In recent years, object detection models DEtection TRansformer (DETR) series based on Transformer architecture have played a huge role in various fields. However, the DETR series models are not satisfactory in small o... 详细信息
来源: 评论