咨询与建议

限定检索结果

文献类型

  • 579 篇 会议
  • 184 篇 期刊文献

馆藏范围

  • 763 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 357 篇 工学
    • 281 篇 计算机科学与技术...
    • 237 篇 软件工程
    • 89 篇 信息与通信工程
    • 77 篇 电气工程
    • 48 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 28 篇 网络空间安全
    • 23 篇 机械工程
    • 22 篇 光学工程
    • 20 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 99 篇 数学
    • 37 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 10 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 3 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 87 篇 feature extracti...
  • 70 篇 accuracy
  • 54 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 data models
  • 39 篇 federated learni...
  • 39 篇 training
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 20 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 codes
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 38 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 zhu lei
  • 11 篇 fu chong

语言

  • 692 篇 英文
  • 70 篇 其他
  • 4 篇 中文
检索条件"机构=Shanxi Key Laboratory for Network Computing and Security Technology"
763 条 记 录,以下是641-650 订阅
排序:
WebIDE cloud server resource allocation with task pre-scheduling in IOT application development  2
WebIDE cloud server resource allocation with task pre-schedu...
收藏 引用
2nd IEEE International Conference on Industrial Internet Cloud, ICII 2019
作者: Wang, Huaijun Li, Junhuai Tian, Jubo Wang, Kan Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xian University of Technology Xian710048 China
WebIDE is leveraged for IOT applications development, which could adapt to the rapid growth of IOT applications and meanwhile facilitate the rapid development. Resource allocation is of vital significance in the WebID... 详细信息
来源: 评论
Segment Anything Model is a Good Teacher for Local Feature Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Jingqian Xu, Rongtao Wood-Doughty, Zach Wang, Changwei Xu, Shibiao Lam, Edmund Y. The University of Hong Kong Pokfulam Hong Kong The State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing China School of Artificial Intelligence University of Chinese Academy of Sciences Beijing100190 China Northwestern University EvanstonIL60201 United States The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250013 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China The School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China
Local feature detection and description play an important role in many computer vision tasks, which are designed to detect and describe keypoints in any scene and any downstream task. Data-driven local feature learnin... 详细信息
来源: 评论
MedSteGAN: Medical Embedding-Optimized Steganography with Improved GAN
SSRN
收藏 引用
SSRN 2023年
作者: Peng, Yuxiang Fu, Chong Zheng, Yu Tian, Yunjia Cao, Guixing Chen, Junxin School of Computer Science and Engineering Northeastern University Liaoning Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Liaoning Shenyang110819 China Department of Information Engineering The Chinese University of Hong Kong Ma Liu Shui Shatin New Territories Hong Kong Institute of Telecommunication Satellite China Academy of Space Technology Beijing100094 China School of Software Dalian University of Technology Liaoning Dalian116621 China
Medical diagnosing systems contain sensitive information, especially the resulting certificate of diagnosis that involves the patient’s privacy, required to be protected carefully. An effective way is to secretly emb... 详细信息
来源: 评论
Crsanet: Class Representations Self-Attention network for the Segmentation of Thyroid Nodules
SSRN
收藏 引用
SSRN 2023年
作者: Sun, Shiyao Fu, Chong Xu, Sen Wen, Yingyou Ma, Tao School of Computer Science and Engineering Northeastern University Shenyang110819 China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China General Hospital of Northern Theatre Command Shenyang110016 China Medical Imaging Research Department Neusoft Research of Intelligent Healthcare Technology Co. Ltd. Shenyang China Dopamine Group Ltd. Auckland1542 New Zealand
Segmenting accurate thyroid nodules in medical ultrasound images is always non-trivial due to the large variation in size, shape and texture of nodules, and also the presence of surrounding tissues and organs with sim... 详细信息
来源: 评论
Risk Modeling and Traceability of Boundary Attacks on Internet of Power Systems Based on Complex networks
Risk Modeling and Traceability of Boundary Attacks on Intern...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Xin Li Zhaoyang Qu Tong Yu Ming Xie Fu Yu Wei Ding School of Electrical Engineering Northeast Electric Power University Jilin China People’s Bank of China Qinghai Provincial Branch Xining China China Southern Power Grid Guangxi Power Grid Co. Ltd. Research Institute Nanning China Bijie Power Supply Bureau China Guizhou Power Grid Co. Ltd. Bijie China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the increasing intelligence of power IoT terminal devices, the massive volume of data transmission, and the widespread adoption of shared services, traditional terminal boundary security mechanisms are unable to ... 详细信息
来源: 评论
Chinese named entity recognition method for the field of network security based on RoBERTa
Chinese named entity recognition method for the field of net...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xiaoyan Zhu Yu Zhang Lei Zhu Xinhong Hei Yichuan Wang Feixiong Hu Yanni Yao School of Computer Science and Engineering Xi’an Jiaotong University Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China School of Computer Science and Technology Xi’an University of technology Xi’an China Shenzhen Tencent Computer System Co. Ltd Shenzhen China
As the mobile Internet is developing rapidly, people who use cell phones to access the Internet dominate, and the mobile Internet has changed the development environment of online public opinion and made online public... 详细信息
来源: 评论
Scene text image super-resolution with semantic-aware interaction
收藏 引用
Engineering Applications of Artificial Intelligence 2025年 158卷
作者: Mingle Zhou Wenlong Liu Jin Wan Delong Han Min Li Gang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd. China
Scene text image super-resolution aims to enhance the resolution of images containing text in various scenes, which amplifies the prominence of the text and improves its recognizability. Existing methods struggle to a...
来源: 评论
MemMambaAD: Memory-augmented state space model for multivariate time series anomaly detection
收藏 引用
Engineering Applications of Artificial Intelligence 2025年 158卷
作者: Gang Li Mingchao Ge Jin Wan Delong Han Min Li Mingle Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd. Jinan China
Multivariate time series anomaly detection focuses on recognizing abnormal patterns to reduce system failures and improve production efficiency and product quality. Accurately detecting anomalies in data remains chall...
来源: 评论
Robust Beamforming for Localization-Aided Millimeter Wave Communication Systems
arXiv
收藏 引用
arXiv 2022年
作者: Sun, Junchang Ma, Shuai Li, Shiyin Yang, Ruixin Min, Minghui Seco-Granados, Gonzalo The School of Information and Control Engineering China University of Mining and Technology Xuzhou221116 China The Department of Telecommunications and Systems Engineering Universitat Autònoma de Barcelona Barcelona08193 Spain The Engineering Research Center of Intelligent Control for Underground Space Ministry of Education China University of Mining and Technology Xuzhou221116 China The National Mobile Communications Research Laboratory Southeast University Nanjing210096 China The Shanxi Key Laboratory of Information Communication Network and Security Xian University of Posts and Telecommunications Xian710121 China
In this letter, we investigate a robust beamforming problem for localization-aided millimeter wave (mmWave) communication systems. To handle this problem, we propose a novel restriction and relaxation (R&R) method... 详细信息
来源: 评论
FedBT: Effective and Robust Federated Unlearning via Bad Teacher Distillation for Secure Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Fangwei Huo, Jiashuai Wang, Wei Zhang, Xi Liu, Yan Tan, Zhiyuan Wang, Changguang Hebei Normal University Key Laboratory of Network and Information Security of Hebei Province College of Computer and Cyber Security Shijiazhuang China Xidian University Hangzhou Institute of Technology Hangzhou China Edinburgh Napier University School of Computing Engineering and the Built Environment EdinburghEH10 5DT United Kingdom
Smart Internet of Things (IoT) devices generate vast, distributed data, and their limited computational and storage capacities complicate data protection. Federated Learning (FL) enables collaborative model training a... 详细信息
来源: 评论