咨询与建议

限定检索结果

文献类型

  • 577 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 756 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 350 篇 工学
    • 274 篇 计算机科学与技术...
    • 235 篇 软件工程
    • 85 篇 信息与通信工程
    • 77 篇 电气工程
    • 42 篇 控制科学与工程
    • 31 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 网络空间安全
    • 23 篇 机械工程
    • 23 篇 光学工程
    • 21 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 158 篇 理学
    • 97 篇 数学
    • 38 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 10 篇 系统科学
    • 9 篇 化学
  • 83 篇 管理学
    • 51 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 3 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 88 篇 feature extracti...
  • 70 篇 accuracy
  • 54 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 data models
  • 39 篇 training
  • 38 篇 federated learni...
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 20 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 codes
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 227 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 37 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 24 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei zhang

语言

  • 690 篇 英文
  • 65 篇 其他
  • 4 篇 中文
检索条件"机构=Shanxi Key Laboratory for Network Computing and Security Technology"
756 条 记 录,以下是551-560 订阅
排序:
Research and Application of Smart Water Meter Monitoring System Based on NB-IoT
Research and Application of Smart Water Meter Monitoring Sys...
收藏 引用
IEEE Information technology and Mechatronics Engineering Conference (ITOEC)
作者: Yuanyuan Zhao Tixiang Zhang Huijuan Hao Xiaojie Zhang Shandong Computer Science Center Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Qilu University of Technology (Shandong Academy of Sciences) Jinan P. R. China Shandong Yonate Environmental Technology Co. Ltd. Jinan P. R. China
With the increasing shortage of water resources and the improvement of environmental awareness, intelligent water meter monitoring systems have become a hot research topic in the field of water conservation. This pape...
来源: 评论
Research on Optimization and Scheduling of MPTCP Data networks in GNSS network Reference Stations
Research on Optimization and Scheduling of MPTCP Data Networ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Fengqi Hao Yuxin Wang Hoiio Kong Dexin Ma Xiyuan Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Data Science City University of Macau Macau China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Communication College Qingdao Agricultural University Qingdao China
The Global Navigation Satellite System network Reference Stations (GNSS-NRS) are pivotal in modern po-sitioning and navigation applications. However, GNSS-NRS face significant communication challenges, including insta... 详细信息
来源: 评论
Time Series Anomaly Detection Based on Normalized Flow and Bayesian networks
Time Series Anomaly Detection Based on Normalized Flow and B...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Honglei Yao Donglan Liu Yingxian Chang Xin Liu Chaofan Tang State Grid Shandong Electric Power Research Institute Jinan China State Grid Shandong Electric Power Company Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Time series anomaly detection often faces significant challenges due to the high dimensionality, interdependence, and label sparsity of the data. Traditional methods struggle to model the intricate relationships betwe... 详细信息
来源: 评论
Time-Efficient EV Energy Management Through In-Motion V2V Charging
Time-Efficient EV Energy Management Through In-Motion V2V Ch...
收藏 引用
IEEE Conference on Vehicular technology (VTC)
作者: Shuohan Liu Wei Zhang Yue Cao Qiang Ni Carsten Maple Hai Lin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Cyber Science and Engineering Wuhan University Wuhan China School of Computing and Communications Lancaster University Lancaster U.K. Warwick Manufacturing Group University of Warwick Coventry U.K.
In recent years, Electric Vehicles (EVs) have emerged as a sustainable alternative to internal combustion vehicles, noted for better efficiency, lower operational costs, and reduced carbon emissions. However, with the... 详细信息
来源: 评论
Emotion Recognition Empowered Human-Computer Interaction with Domain Adaptation network
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xu, Xu Fu, Chong Chen, Junxin Northeastern University School of Computer Science and Engineering Shenyang110004 China Dalian University of Technology China The School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110004 China Dalian University of Technology School of Software Dalian116621 China
Multi-modal emotion recognition plays a vital role in the human-computer interaction (HCI) for consumer electronics. Nowadays, many studies have developed multi-modal fusion algorithms for this ***, two challenging is... 详细信息
来源: 评论
An edge enhancement-based fusion method of infrared and visible images in low light
An edge enhancement-based fusion method of infrared and visi...
收藏 引用
Signal, Information and Data Processing (ICSIDP), IEEE International Conference on
作者: Xiang Gao Xiyan Wang Hanbin Bao Qian Li Guohua Lv Faculty of Comupter Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Bresee Technology Co. Ltd. Jinan China Shandong Grain Group Co. Ltd. Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The combination of infrared and visible images can result in the generation of a single image with a high degree of detail and important targets in a variety of scenes, which is beneficial for human recognition. Howev... 详细信息
来源: 评论
Efficient Batch Verification and Privacy-Preserving Data Aggregation Scheme in V2G networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wang, Congcong Wang, Chen Shen, Jian Vasilakos, Athanasios V. Wang, Bin Wang, Weizheng Department of Software Engineering Nanjing University of Information Science and Technology Nanjing210044 China the Zhejiang Key Laboratory of Digital Fashion and Data Governance the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Provincial Innovation Center of Advanced Textile Technology Shaoxing312000 China College of Computer Science and Information Technology IAU Saudi Arabia Grimstad4879 Norway Network and Data Security Hangzhou310053 China Computer Science Department City University of Hong Kong Hong Kong the Division of Computer Science University of Aizu Fukushima965–8580 Japan
In recent years, against the backdrop of smart grids, vehicle-to-grid (V2G) interaction has become a hot topic. With the increasing number of new energy vehicles, handling massive amounts of electricity transaction da... 详细信息
来源: 评论
Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain
Non-aligned double JPEG compression detection based on refin...
收藏 引用
作者: Wang, Jinwei Huang, Wei Luo, Xiangyang Shi, Yun-Qing Jha, Sunil Kr. School of Computer and Software Nanjing University of Information Science and Technology NanjingJiangsu China Nanjing University of Information Science and Technology Nanjing China Shanxi Key Laboratory of Network and System Security Xidian University Shanxi China State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengzhouHenan China New Jersey Institute of Technology NewarkNJ United States
Due to the widespread use of the JPEG format, non-aligned double JPEG (NA-DJPEG) compression is very common in image tampering. Therefore, non-aligned double JPEG compression detection has attracted significant attent... 详细信息
来源: 评论
EEG based Parkinson Detection through Supervised Information Enhanced Contrastive Learning
EEG based Parkinson Detection through Supervised Information...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jian Song Xiang Li Wenjing Jiang Chunxiao Wang Zhigang Zhao Jialiang Lv Bin Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Geriatric Neurology Key Laboratory of Cardiovascular Proteomics of Shandong Province Qilu Hospital of Shandong University Jinan China Institute of Engineering Medicine Beijing Institute of Technology Beijing China
This study presents a novel Supervised Information Enhanced Contrastive Learning Algorithm for Parkinson’s Disease Detection (SI-CLAPD) based on Electroencephalography (EEG). SI-CLAPD performs contrastive learning in...
来源: 评论
Chinese named entity recognition method for the field of network security based on RoBERTa
Chinese named entity recognition method for the field of net...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Zhu, Xiaoyan Zhang, Yu Zhu, Lei Hei, Xinhong Wang, Yichuan Hu, Feixiong Yao, Yanni Xi'an Jiaotong University School of Computer Science and Engineering Xi'an710049 China School of Computer Science and Technology Xi'an University of technology Shaanxi Xi'an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi'an710048 China Shenzhen Tencent Computer System Co. Ltd Shenzhen518054 China
As the mobile Internet is developing rapidly, people who use cell phones to access the Internet dominate, and the mobile Internet has changed the development environment of online public opinion and made online public... 详细信息
来源: 评论