咨询与建议

限定检索结果

文献类型

  • 579 篇 会议
  • 184 篇 期刊文献

馆藏范围

  • 763 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 357 篇 工学
    • 281 篇 计算机科学与技术...
    • 237 篇 软件工程
    • 89 篇 信息与通信工程
    • 77 篇 电气工程
    • 48 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 28 篇 网络空间安全
    • 23 篇 机械工程
    • 22 篇 光学工程
    • 20 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 99 篇 数学
    • 37 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 10 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 3 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 87 篇 feature extracti...
  • 70 篇 accuracy
  • 54 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 data models
  • 39 篇 federated learni...
  • 39 篇 training
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 20 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 codes
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 38 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 zhu lei
  • 11 篇 fu chong

语言

  • 692 篇 英文
  • 70 篇 其他
  • 4 篇 中文
检索条件"机构=Shanxi Key Laboratory for Network Computing and Security Technology"
763 条 记 录,以下是621-630 订阅
排序:
Deepfake Detection: A Comprehensive Survey from the Reliability Perspective
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Tianyi Liao, Xin Chow, Kam Pui Lin, Xiaodong Wang, Yinglong Department of Computer Science The University of Hong Kong Hong Kong College of Computer Science and Electronic Engineering Hunan University China School of Computer Science University of Guelph Canada Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
The mushroomed Deepfake synthetic materials circulated on the internet have raised a profound social impact on politicians, celebrities, and individuals worldwide. In this survey, we provide a thorough review of the e... 详细信息
来源: 评论
Image Electronic Evidence Screening Based on Improved SSD
Image Electronic Evidence Screening Based on Improved SSD
收藏 引用
6th International Conference on Intelligent computing and Signal Processing (ICSP)
作者: Yafei Liu Liehui Jiang Tieming Liu Youwei Zhang Zhongyuan Network Security Research institute Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Zhengzhou Xinda Institute of Advanced Technology Zhengzhou China
With the development of information technology, electronic evidence plays an increasingly important role in the judicial trial. In Judicial Forensics, it is difficult to extract effective electronic evidence accuratel... 详细信息
来源: 评论
An improved RL-based framework for multiple biomedical event extraction via self-supervised learning
An improved RL-based framework for multiple biomedical event...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Zhao, Yao Zhao, Weizhong Jiang, Xingpeng He, Tingting Su, Bianping Central China Normal University Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Hubei Wuhan430079 China School of Computer Central China Normal University Hubei Wuhan430079 China National Language Resources Monitoring and Research Center for Network Media Central China Normal University Hubei Wuhan430079 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin541004 China Xi'An University of Architecture and Technology Shanxi Xi'an China
The main goal of biomedical event extraction is to structurally extract biomedical events from texts, however, the specificity of the domain makes both text modeling and data annotation very difficult. We propose a se... 详细信息
来源: 评论
Research on the Current State of Privacy Risks in Children’s Mobile Applications
Research on the Current State of Privacy Risks in Children’...
收藏 引用
Computer technology and Information Science (ISCTIS), International Symposium on
作者: Xinrui Geng Tao Liu Chong Shang Jianxiang Chen Yueran Lu Yan Zhang Lifeng Wang School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University Suzhou China Key Laboratory of Mobile Application Innovation and Governance Technology MIIT Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Agricultural Engineering Shanxi Agricultural University China School of Software Engineering Tianjin Normal University Tianjin China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Beijing China Shandong Yeda Smart City Operation Technology Co. Ltd. Shandong China
In the digital age, children increasingly access a vast world of information through mobile applications. Despite global regulations and protective measures by app stores, privacy breaches in these apps persist. This ... 详细信息
来源: 评论
Integrated Multi-featured Android Malicious Code Detection  5th
Integrated Multi-featured Android Malicious Code Detection
收藏 引用
5th International Conference of Pioneer Computer Scientists, Engineers and Educators, ICPCSEE 2019
作者: Yu, Qing Zhao, Hui Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin300384 China
To solve the problem that using a single feature cannot play the role of multiple features of Android application in malicious code detection, an Android malicious code detection mechanism is proposed based on integra... 详细信息
来源: 评论
computing Power in the Sky: Digital Twin-assisted Collaborative computing with Multi-UAV networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论
Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net
Shellshock Bash Vulnerability Modeling Analysis Based on Pet...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Liumei Zhang Xi Deng Yichuan Wang School of Computer Science Xi’an Shiyou University Xi’an China School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi’an China
The enhancement of Internet connectivity and the increase of information transmission speed yield the increasing frequency of network attacks. The Shellshock attackers often exploit bash vulnerability to read the cont... 详细信息
来源: 评论
Auction Theory and Game Theory Based Pricing of Edge computing Resources: A Survey
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Jiguo Liu, Shun Zou, Yifei Wang, Guijuan Hu, Chunqiang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Qufu Normal University School of Computer Science Shandong Rizhao China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250353 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol... 详细信息
来源: 评论
Intelligent decoding method for Ground-penetrating radar based on improved YOLOv5
Intelligent decoding method for Ground-penetrating radar bas...
收藏 引用
Computer, Big Data and Artificial Intelligence (ICCBD+AI), International Conference on
作者: ZeYu Chen YongKang Wang HongLiang Liu Chuan Wang XinBo Jiang Ning Zhang Zhen Huang Lei Jiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) JiNan China Technological Innovation Department Shandong Hi-Speed Group Co Ltd JiNan China School of Qilu Transportation Shandong University JiNan China No.1 Engineering Development Co. Ltd. of China Railway 14Th Bureau Group RiZhao China
Ground-penetrating radar (GPR) is a non-invasive detection technique that effectively gathers information about subsurface materials. In tunneling projects, GPR can provide a fast and accurate forecast of the geologic... 详细信息
来源: 评论
CODH++: Macro-semantic differences oriented instance segmentation network
收藏 引用
Expert Systems with Applications 2022年 202卷 1页
作者: Zhang, Wenchao Fu, Chong Cao, Lin Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China School of Computer Science The University of Auckland New Zealand
With the idea of divide and rule, there exist two different forms of semantic features flowing in the two stage instance segmentation paradigms. They are the global features at the image level and the instance feature... 详细信息
来源: 评论