咨询与建议

限定检索结果

文献类型

  • 577 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 756 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 350 篇 工学
    • 274 篇 计算机科学与技术...
    • 235 篇 软件工程
    • 85 篇 信息与通信工程
    • 77 篇 电气工程
    • 42 篇 控制科学与工程
    • 31 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 网络空间安全
    • 23 篇 机械工程
    • 23 篇 光学工程
    • 21 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 158 篇 理学
    • 97 篇 数学
    • 38 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 10 篇 系统科学
    • 9 篇 化学
  • 83 篇 管理学
    • 51 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 3 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 88 篇 feature extracti...
  • 70 篇 accuracy
  • 54 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 data models
  • 39 篇 training
  • 38 篇 federated learni...
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 20 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 codes
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 227 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 37 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 24 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei zhang

语言

  • 690 篇 英文
  • 65 篇 其他
  • 4 篇 中文
检索条件"机构=Shanxi Key Laboratory for Network Computing and Security Technology"
756 条 记 录,以下是451-460 订阅
排序:
STUI-NET: Semi-Supervised Transformer for Underwater Information Enhancement
STUI-NET: Semi-Supervised Transformer for Underwater Informa...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Zhenqiang Zhang Chuantao Li Jian Song Jialiang Lv Chunxiao Wang Zhigang Zhao Jidong Huo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China China University of Petroleum (East China) Qingdao China
Underwater Image Restoration technology (UIRT) constitutes a pivotal base for subsequent tasks yet confronts obstacles like data scarcity and image distortion in practical deployments. To optimize the use of scarce an... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Contrastive Learning for Chest X-ray Classification: A Fusion of Topological Data Analysis and ResNet
Contrastive Learning for Chest X-ray Classification: A Fusio...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Hao Ren Zeyu Luo Fengshi Jing Xinyue Zhang Han He Yonghao Yu Dawei Zhao Faculty of Data Science City University of Macau China Minzu University of China Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Lung diseases such as pneumonia and tuberculosis present significant global health challenges, leading to millions of deaths annually. Chest X-ray imaging is crucial for diagnosing these conditions, but interpretation... 详细信息
来源: 评论
Enhancing Small Object Detection in Aerial Imagery Based on Strong Feature Extraction and Batch Dimension
Enhancing Small Object Detection in Aerial Imagery Based on ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Bingnan Cao Di Wang Ying Guo Hu Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China The Institute of Data Science City University of Macau Macau China
Object detection is a fundamental component of computer vision, playing a pivotal role in various applications. However, the accurate detection of small and densely distributed objects remains a challenging problem in... 详细信息
来源: 评论
A Short-Term Electric Load Forecasting Method Based on the Fusion of Global and Local Features
A Short-Term Electric Load Forecasting Method Based on the F...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Haozhan Gu Hangwei Tian Jingchun Wang Yumei Li Shandong University Of Arts Academy of Fine Arts China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Accurate short-term electric load forecasting is crucial for ensuring the stability and efficiency of the power grid. This study proposes an innovative dual-branch electric load forecasting model that enhances the acc... 详细信息
来源: 评论
Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
arXiv
收藏 引用
arXiv 2025年
作者: You, Zhichao Dong, Xuewen Li, Shujun Liu, Ximeng Ma, Siqi Shen, Yulong School of Computer Science & Technology Xidian University China Shaanxi Key Laboratory of Network and System Security Xi’an China University of Kent Canterbury United Kingdom College of Computer and Data Science Fuzhou University Fuzhou China School of System and Computing University of New South Wales CanberraACT2612 Australia
Reconstruction attacks against federated learning (FL) aim to reconstruct users’ samples through users’ uploaded gradients. Local differential privacy (LDP) is regarded as an effective defense against various attack... 详细信息
来源: 评论
Optimization Strategy for Remote Differential Upgrade of IoT Firmware
Optimization Strategy for Remote Differential Upgrade of IoT...
收藏 引用
IEEE Joint International Information technology and Artificial Intelligence Conference (ITAIC)
作者: Wenkang Ding Ruirui Sun Qinglong Meng Zhong Wan Guanghe Cheng Huijuan Hao Jinqiang Bai Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the continuous increase of IoT devices, the management and optimization of devices become particularly important. The update cycle of device functions is short, and in order to facilitate management and optimize ...
来源: 评论
CA-STCNN: An Attention-based Hybrid Deep Learning Model for Encrypted Traffic Classification
CA-STCNN: An Attention-based Hybrid Deep Learning Model for ...
收藏 引用
Asia-Pacific network Operations and Management Symposium (APNOMS)
作者: Hongyang Sun Huiling Shi Lei Zhang Lei Huang Wei Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the increasing trend of network traffic encryption, both normal and abnormal traffic have begun to utilize encryption techniques to conceal their behavior, making accurate identification of encrypted traffic an e...
来源: 评论
Felix: A Model of Detecting Off-chain Abnormal States in Decentralized Applications
Felix: A Model of Detecting Off-chain Abnormal States in Dec...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Lianhai Wang Qihao Huang Wei Shao Jinpeng Wang Xiaoqian Liu Fansheng Wang Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid development of blockchain technology, the use of decentralized applications (DApps) has experienced significant growth. However, current testing methods for DApps primarily focus on testing the smart co... 详细信息
来源: 评论
Continuous Verification of Catastrophic Recalling in Machine Unlearning via Adversarial Testing
Continuous Verification of Catastrophic Recalling in Machine...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Y. Neil Qu Zonghao Ji Lei Cui Chong Zhang Lei Liu Zhiyi Tian Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of IT Deakin University VIC Australia Guangzhou Institute of Technology Xidian University Guangzhou China School of Computer Science University of Technology Sydney NSW Australia
Throughout the process of machine unlearning, in order to fulfill the requirements of machine unlearning and to comply with the rules of the right to be forgotten, it is natural to verify whether the unlearning model ... 详细信息
来源: 评论