咨询与建议

限定检索结果

文献类型

  • 579 篇 会议
  • 184 篇 期刊文献

馆藏范围

  • 763 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 357 篇 工学
    • 281 篇 计算机科学与技术...
    • 237 篇 软件工程
    • 89 篇 信息与通信工程
    • 77 篇 电气工程
    • 48 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 28 篇 网络空间安全
    • 23 篇 机械工程
    • 22 篇 光学工程
    • 20 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 99 篇 数学
    • 37 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 10 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 3 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 87 篇 feature extracti...
  • 70 篇 accuracy
  • 54 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 data models
  • 39 篇 federated learni...
  • 39 篇 training
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 20 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 codes
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 38 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 zhu lei
  • 11 篇 fu chong

语言

  • 692 篇 英文
  • 70 篇 其他
  • 4 篇 中文
检索条件"机构=Shanxi Key Laboratory for Network Computing and Security Technology"
763 条 记 录,以下是561-570 订阅
排序:
A Hybrid Deep Learning-Based Load Forecasting Model for Logical Range
收藏 引用
Applied Sciences 2025年 第10期15卷 5628-5628页
作者: Hao Chen Zheng Dang Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an 710048 China School of Computer Science and Engineering Xi’an University of Technology Xi’an 710048 China
The Logical Range is a mission-oriented, reconfigurable environment that integrates testing, training, and simulation by virtually connecting distributed systems. In such environments, task-processing devices often ex... 详细信息
来源: 评论
EEG based Parkinson Detection through Supervised Information Enhanced Contrastive Learning
EEG based Parkinson Detection through Supervised Information...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jian Song Xiang Li Wenjing Jiang Chunxiao Wang Zhigang Zhao Jialiang Lv Bin Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Geriatric Neurology Key Laboratory of Cardiovascular Proteomics of Shandong Province Qilu Hospital of Shandong University Jinan China Institute of Engineering Medicine Beijing Institute of Technology Beijing China
This study presents a novel Supervised Information Enhanced Contrastive Learning Algorithm for Parkinson’s Disease Detection (SI-CLAPD) based on Electroencephalography (EEG). SI-CLAPD performs contrastive learning in...
来源: 评论
Chinese named entity recognition method for the field of network security based on RoBERTa
Chinese named entity recognition method for the field of net...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Zhu, Xiaoyan Zhang, Yu Zhu, Lei Hei, Xinhong Wang, Yichuan Hu, Feixiong Yao, Yanni Xi'an Jiaotong University School of Computer Science and Engineering Xi'an710049 China School of Computer Science and Technology Xi'an University of technology Shaanxi Xi'an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi'an710048 China Shenzhen Tencent Computer System Co. Ltd Shenzhen518054 China
As the mobile Internet is developing rapidly, people who use cell phones to access the Internet dominate, and the mobile Internet has changed the development environment of online public opinion and made online public... 详细信息
来源: 评论
PCB Defect Detection Model with Convolutional Modules Instead of Self-Attention Mechanism
PCB Defect Detection Model with Convolutional Modules Instea...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: MingLe Zhou ChangLe Yi HongLin Wan Min Li Gang Li DeLong Han Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China College of Physics and Electronic Science Shandong Normal University Jinan China
The detection of defects in printed circuit boards requires high accuracy and realtime performance. Existing industrial detection models generally adopt a pure convolutional structure for ease of deployment. However, ...
来源: 评论
Pulsar candidate recognition based on autoencoder and self-normalizing neural networks
Pulsar candidate recognition based on autoencoder and self-n...
收藏 引用
IEEE Joint International Information technology and Artificial Intelligence Conference (ITAIC)
作者: Zhihao Wang Peng Fu Meng Guo Key Laboratory of Computing Power Network and Information Security of Ministry of Education Shandong Computer Science Center (National Supercomputing Center in Jinan) (Shandong Academy of Sciences) Qilu University of Technology Jinan Shandong P. R. China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan Shandong P. R. China
The identification of pulsar candidates is a crucial step in radio astronomy research. With the continuous improvement of modern radio telescope equipment and the increasing scale of pulsar sky survey, a pulsar survey...
来源: 评论
An Algorithm for Detecting Surface Defects in Industrial Strip Steel based on Receptive Field and Feature Information Supplementation
An Algorithm for Detecting Surface Defects in Industrial Str...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qingyu Xu Jiguo Yu Anming Dong Zihao Shang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Big Data Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Data Intelligence Information Technology Co. Ltd. Jinan China
In the context of Industry 4.0 and the rise of intelligent manufacturing, the quality of industrial products is becoming more and more important. Strip steel surface defect detection, as a key link in industrial produ... 详细信息
来源: 评论
Prompt-Based Few-Shot Text Classification with Virtual Class Representation
Prompt-Based Few-Shot Text Classification with Virtual Class...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Zhengyu Ju Zhao Li Ye Li Shiwei Wu Canjun Wang Shandong Academy of Sciences Qilu University of Technology Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong Fundamental Research Center for Computer Science Jinan China Evay Info Jinan China
Over the past few years, "Pre-training + Fine-tuning" has been highly successful in Natural Language Processing (NLP) tasks, but it has limitations in few-shot tasks and zero-shot tasks. Recently, "Prom...
来源: 评论
Research on the Design of Government Data Governance Evaluation System under the Perspective of Digital Government
Research on the Design of Government Data Governance Evaluat...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Zirui Xu Jinyang Sun Zhe Lu Delong Han Information Research Institute of Shandong Academy of Sciences Qilu University of Technology(Shandong Academy of Sciences) Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
In the context of the digital era, government data governance is a key factor in promoting the modernization of government governance, but there is a lack of a complete set of evaluation index system to standardize th... 详细信息
来源: 评论
Signature Scheme Based on The SM2 Algorithm in Fabric
Signature Scheme Based on The SM2 Algorithm in Fabric
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yaling Zhang Hongyun Wang Yichuan Wang Wenjiang Ji Lei Zhu School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of technology Xi’an China
Based on the analysis and research of the widely used Hyperledger Fabric alliance chain structure, this paper proposes a digital signature scheme based on the national cryptographic algorithm SM2 which can be applied ... 详细信息
来源: 评论
Cross Aggregation network for Semantic Segmentation
SSRN
收藏 引用
SSRN 2022年
作者: Zhao, Minghua Zhi, Yuxing Du, Shuangli Hei, Xinhong Hu, Jing Shi, Cheng Li, Peng School of Computer Science and Engineering Xi’an University of Technology No.5 South Jinhua Road Shaanxi Xi’an710048 China Shaanxi Key Laboratory of Network Computing and Security Technology No.5 South Jinhua Road Shaanxi Xi’an710048 China
To achieve more accurate prediction, advanced semantic segmentation methods are explored in the way of context modeling. Images in real scenes usually contain multi-scale objects and contents. The feature propagation ... 详细信息
来源: 评论