咨询与建议

限定检索结果

文献类型

  • 579 篇 会议
  • 184 篇 期刊文献

馆藏范围

  • 763 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 357 篇 工学
    • 281 篇 计算机科学与技术...
    • 237 篇 软件工程
    • 89 篇 信息与通信工程
    • 77 篇 电气工程
    • 48 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 28 篇 网络空间安全
    • 23 篇 机械工程
    • 22 篇 光学工程
    • 20 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 99 篇 数学
    • 37 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 10 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 3 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 87 篇 feature extracti...
  • 70 篇 accuracy
  • 54 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 data models
  • 39 篇 federated learni...
  • 39 篇 training
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 20 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 codes
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 38 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 zhu lei
  • 11 篇 fu chong

语言

  • 692 篇 英文
  • 70 篇 其他
  • 4 篇 中文
检索条件"机构=Shanxi Key Laboratory for Network Computing and Security Technology"
763 条 记 录,以下是361-370 订阅
排序:
Efficient CNN-Transformer Aggregation network for Remote Sensing Image Change Detection
Efficient CNN-Transformer Aggregation Network for Remote Sen...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Bingjie Kong Qinglong Meng Fengqi Hao Jinqiang Bai Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Change detection is a crucial task in the field of remote sensing, focusing on identifying areas where significant changes occur between two remote sensing images captured at different time points. However, existing c... 详细信息
来源: 评论
Channel Drop Out: A Simple Way to Prevent CNN from Overfitting in Motor Imagery Based BCI  7th
Channel Drop Out: A Simple Way to Prevent CNN from Overfitti...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Luo, Jing Wang, Yaojie Xu, Rong Liu, Guangming Wang, Xiaofan Gong, Yijing Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Province Institute of Water Resources and Electric Power Investigation and Design Xi’an China
With the development of deep learning, many motor imagery brain-computer interfaces based on convolutional neural networks (CNNs) show outstanding performances. However, the trial number of EEG in the training set is ... 详细信息
来源: 评论
Adaptive Compression-Encryption Scheme for Medical Image Based on Improved Compressive Sensing and Deoxyribonucleic Acid Coding-Compression
Adaptive Compression-Encryption Scheme for Medical Image Bas...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xianglian Xue Haiyan Jin Changjun Zhou School of Computer Science and Engineering Xi’an University of Technology Xi’an China Section of Computer Teaching and Research Shaanxi University of Chinese Medicine Xianyang China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China School of Computer Science and Technology Zhejiang Normal University Jinhua China
Medical images often occupy large storage space and contain patient privacy or sensitive information, which makes them difficult and unsafe to be transmitted through the network. This paper proposed an adaptive compre... 详细信息
来源: 评论
Feature Aggregation network for Memory-Based Industrial Anomaly Detection
Feature Aggregation Network for Memory-Based Industrial Anom...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Min Li Delong Han Rui Shao Jinghui He Faculty of Data Science City University of Macau China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the process of large-scale industrial production, complex defects of different shapes and sizes can occur in industrial products and their components, and these defects seriously affect the performance of industria... 详细信息
来源: 评论
FAST: a dual-tier few-shot learning paradigm for whole slide image classification  24
FAST: a dual-tier few-shot learning paradigm for whole slide...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Kexue Fu Xiaoyuan Luo Linhao Qu Shuo Wang Ying Xiong Ilias Maglogiannis Longxiang Gao Manning Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China and Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Digital Medical Research Center School of Basic Medical Sciences Fudan University and Shanghai Key Lab of Medical Image Computing and Computer Assisted Intervention Fudan University University of Piraeus
The expensive fine-grained annotation and data scarcity have become the primary obstacles for the widespread adoption of deep learning-based Whole Slide Images (WSI) classification algorithms in clinical practice. Unl...
来源: 评论
Map2Schedule: An End-to-End Link Scheduling Method for Urban V2V Communications
Map2Schedule: An End-to-End Link Scheduling Method for Urban...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Lihao Zhang Haijian Sun Jin Sun Ramviyas Parasuraman Yinghui Ye Rose Qingyang Hu School of Electrical and Computer Engineering University of Georgia Athens GA USA School of Computing University of Georgia Athens GA USA Shanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications China Electrical and Computer Engineering Department at Utah State University Logan UT USA
Urban vehicle-to-vehicle (V2V) link scheduling with shared spectrum is a challenging problem. Its main goal is to find the scheduling policy that can maximize system performance (usually the sum capacity of each link ... 详细信息
来源: 评论
A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in network Moving Target Defense  7
A Hybrid Routing Mutation Mechanism based on Mutation Cost a...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Guo, Kun Gao, Yibo Wang, Dongbin Zhi, Hui Zhang, Tao Lu, Yueming Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Cyberspace Security Research Center Peng Cheng Laboratory Beijing China Beijing University of Posts and Telecommunications National Engineering Laboratory for Mobile Network Beijing China TravelSky Technology Limited Beijing China China Academy of Launch Vehicle Technology Beijing China
network moving target defense technology can effectively defend against attacker monitoring of the service. The technology makes it more difficult for attackers to attack and can ensure secure communication for servic... 详细信息
来源: 评论
Improved YOLOv5 Object Detection Method for Cervical Fluid Cell Pathological Image Detection
Improved YOLOv5 Object Detection Method for Cervical Fluid C...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Qingyan Ding Xuecheng Dong Na Li Yu Pan Wan Zheng Dept. Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Cervical liquid-based cell pathology image detection and recognition is a key task in gynecological pathology aimed at early detection of cervical precancerous lesions. In this study, a deep learning based method is p... 详细信息
来源: 评论
Trust Evaluation Model of Social Internet of Things Based on Multi-relationships
Trust Evaluation Model of Social Internet of Things Based on...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Fan, Fan Zhang, Hongbin Zhao, Dongmei Wang, Yanxia Liu, Bin Liu, Jian Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei Geological Workers' University Shijiazhuang China Hebei University of Science and Technology School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China
Trust plays a vital role in ensuring the security of the Social Internet of Things. Due to the increased mobility of intelligent devices, there are frequent interactions between machines and changes in social relation... 详细信息
来源: 评论
An Auto-Parallel Method for Deep Learning Models Based on Genetic Algorithm  29
An Auto-Parallel Method for Deep Learning Models Based on Ge...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zeng, Yan Huang, Chengchuang Ni, Yijie Zhou, Chunbao Zhang, Jilin Wang, Jue Zhou, Mingyao Xue, Meiting Zhang, Yunquan Hangzhou Dianzi University School of Computer Science and Technology Hangzhou310018 China Ministry of Education Key Laboratory for Modeling and Simulation of Complex Systems Hangzhou310018 China Data Security Governance Zhejiang Engineering Research Center Hangzhou310018 China Hangzhou Dianzi University School of ITMO Joint Institute Hangzhou310018 China Institute of Computer Network Information Center of the Chinese Academy of Sciences Beijing100086 China HuaWei China Institute of Computing Technology of the Chinese Academy of Sciences State Key Laboratory of Computer Architecture Beijing100086 China
As the size of datasets and neural network models increases, automatic parallelization methods for models have become a research hotspot in recent years. The existing auto-parallel methods based on machine learning or... 详细信息
来源: 评论