咨询与建议

限定检索结果

文献类型

  • 570 篇 会议
  • 168 篇 期刊文献

馆藏范围

  • 738 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 337 篇 工学
    • 263 篇 计算机科学与技术...
    • 227 篇 软件工程
    • 84 篇 信息与通信工程
    • 73 篇 电气工程
    • 42 篇 控制科学与工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 网络空间安全
    • 23 篇 机械工程
    • 22 篇 光学工程
    • 20 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 11 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 153 篇 理学
    • 96 篇 数学
    • 35 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 10 篇 系统科学
    • 8 篇 化学
  • 79 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 3 篇 经济学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 87 篇 feature extracti...
  • 70 篇 accuracy
  • 54 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 data models
  • 39 篇 training
  • 38 篇 federated learni...
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 20 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 codes
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 223 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 36 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 22 篇 shandong provinc...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 guohua lv
  • 13 篇 jin haiyan
  • 12 篇 xiaohui han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 12 篇 aimin li
  • 11 篇 lu wenpeng
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 10 篇 wang lei

语言

  • 700 篇 英文
  • 37 篇 其他
  • 4 篇 中文
检索条件"机构=Shanxi Key Laboratory for Network Computing and Security Technology"
738 条 记 录,以下是51-60 订阅
排序:
A Semi-supervised Protein Complex Identification Algorithm Based on Sparseness Constraint
A Semi-supervised Protein Complex Identification Algorithm B...
收藏 引用
2024 International Conference on Applied Mathematics, Modelling and Statistics Application, AMMSA 2024
作者: Liu, Guangming Dang, Fengqing Wang, Bin Peng, Yonghong Wang, Xiaofan Tan, Li School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'An University of Technology Shaanxi Xi'an China Faculty of Science and Engineering Computing and Information Science Cambridge United Kingdom School of Computer and Information Engineering Beijing Technology and Business University Beijing China
Recognising protein complexes in protein interaction networks is crucial, but poses a major challenge due to the frequency of noisy interactions. These networks typically involve numerous protein complexes, with each ... 详细信息
来源: 评论
FedIERF: Federated Incremental Extremely Random Forest for Wearable Health Monitoring
收藏 引用
Journal of Computer Science & technology 2023年 第5期38卷 970-984页
作者: 胡春雨 忽丽莎 袁林 陆佃杰 吕蕾 陈益强 Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 25000China Institute of Information Technology Hebei University of Economics and BusinessShijiazhuang 050061China School of Information Science and Engineering Shandong Normal UniversityJinan 250358China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China
Wearable health monitoring is a crucial technical tool that offers early warning for chronic diseases due to its superior portability and low power ***,most wearable health data is distributed across dfferent organiza... 详细信息
来源: 评论
Generating Personalized Imputations for Patient Health Status Prediction in Electronic Health Records
Generating Personalized Imputations for Patient Health Statu...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Liu, Yang Zhang, Weiyu Si, Jiasheng Li, Zhao Peng, Xueping Lu, Wenpeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Evay Info Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China University of Technology Sydney Australian Artificial Intelligence Institute Sydney Australia
Electronic health records (EHRs) play a crucial role in the development of personalized treatment plans for patients. However, EHRs are often highly incomplete, posing significant challenges for predictive modeling. W... 详细信息
来源: 评论
A Covert Communication Model of Ethereum Based on Smart Contracts
A Covert Communication Model of Ethereum Based on Smart Cont...
收藏 引用
2023 International Conference on Cryptography, network security, and Communication technology, CNSCT 2023
作者: Lang, Yan He, Lei School of Information Engineering Xizang Minzu University Shanxi Xianyang712082 China Xizang Key Laboratory of Optical Information Processing and Visualization Technology Shanxi Xianyang712082 China Xizang Network Security Governance Research Base Shanxi Xianyang712082 China
To solve the problems of low hidden capacity, weak concealment and low transmission efficiency in the existing blockchain covert communication, a covert communication model of Ethereum based on smart contracts is prop... 详细信息
来源: 评论
A Novel 3D Medical Image Segmentation Model Using Improved SAM
A Novel 3D Medical Image Segmentation Model Using Improved S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kuang, Yuansen Ma, Xitong Zhao, Jing Wang, Guangchen Zeng, Yijie Liu, Song Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
3D medical image segmentation is an essential task in the medical image field, which aims to segment organs or tumours into different labels. A number of issues exist with the current 3D medical image segmentation tas... 详细信息
来源: 评论
An Enhanced Data-Driven Model for Lithium-Ion Battery State-of-Health Estimation with Optimized Features and Prior Knowledge
收藏 引用
Automotive Innovation 2022年 第2期5卷 134-145页
作者: Huanyang Huang Jinhao Meng Yuhong Wang Lei Cai Jichang Peng Ji Wu Qian Xiao Tianqi Liu Remus Teodorescu College of Electrical Engineering Sichuan UniversityChengduChina Faculty of Computer Science and Engineering Shanxi Key Laboratory for Network Computing and Security TechnologyXi’an University of TechnologyXi’anChina Smart Grid Research Institute Nanjing Institute of TechnologyNanjingChina Department of Automation University of Science and Technology of ChinaHefeiChina Key Laboratory of Smart Grid of Ministry of Education Tianjin UniversityTianjinChina Department of Energy Technology Aalborg University9220 AalborgDenmark
In the long-term prediction of battery degradation,the data-driven method has great potential with historical data recorded by the battery management *** paper proposes an enhanced data-driven model for Lithium-ion(Li... 详细信息
来源: 评论
TCS security Analysis in Intel SGX Enclave MultiThreading
TCS Security Analysis in Intel SGX Enclave MultiThreading
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhang, Tong Cui, Xiangjie Wang, Yichuan Du, Yanning Gao, Wen School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
With the rapid development of Internet technology in recent years, the demand for security support for complex applications is becoming stronger and stronger. Intel Software Guard Extensions (Intel SGX) is created as ... 详细信息
来源: 评论
A Byzantine Client Detection Method for Federated Learning Based on Encrypted Repeated Median Linear Regression  24
A Byzantine Client Detection Method for Federated Learning B...
收藏 引用
5th International Conference on Computer Science and Management technology, ICCSMT 2024
作者: Guo, Jinlong Yang, Ming Li, Huijuan Wu, Xiaoming He, Yunpeng Wang, Xin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Shandong Jinan China Shandong Evayinfo Technology Co. Ltd. Shandong Jinan China
Federated learning is an emerging distributed machine learning technology that allows participants to jointly train machine learning models locally without the need for large-scale data transmission and sharing, there... 详细信息
来源: 评论
Policy network-Based Dual-Agent Deep Reinforcement Learning for Multi-Resource Task Offloading in Multi-Access Edge Cloud networks
收藏 引用
China Communications 2024年 第4期21卷 53-73页
作者: Feng Chuan Zhang Xu Han Pengchao Ma Tianchun Gong Xiaoxue School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Institute of Intelligent Communication and Network Security Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and TelecommunicationsChongqing 400065China School of Information Engineering Guangdong University of TechnologyGuangzhou 510006China
The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC n... 详细信息
来源: 评论
Rail Transit Event Extraction based on the Fusion of Semantic and Local Dependency Features  15
Rail Transit Event Extraction based on the Fusion of Semanti...
收藏 引用
15th IEEE International Conference on Knowledge Graph, ICKG 2024
作者: Chen, Qiang Meng, Haining Bao, Yihao Yang, Mingsong Tong, Xinyu Zhao, Qin Khan, Muhammad Bilal Hei, Xinhong Xi'an University of Technology School of Computer Science and Engineering Xi'an China Xi'an University of Technology School of Computer Science and Engineering Shaanxi Key Laboratory of Network Computing and Security Technology Xi'an China Xi'an University of Technology School of Civil Engineering and Architecture Xi'an China
Event extraction in rail transit plays a vital role in all stages of design, construction, and final acceptance. Event extraction is a key part of building event logic graph (ELG). However, the difficulty in obtaining... 详细信息
来源: 评论