咨询与建议

限定检索结果

文献类型

  • 579 篇 会议
  • 184 篇 期刊文献

馆藏范围

  • 763 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 357 篇 工学
    • 281 篇 计算机科学与技术...
    • 237 篇 软件工程
    • 89 篇 信息与通信工程
    • 77 篇 电气工程
    • 48 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 28 篇 网络空间安全
    • 23 篇 机械工程
    • 22 篇 光学工程
    • 20 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 99 篇 数学
    • 37 篇 物理学
    • 27 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 10 篇 化学
    • 10 篇 系统科学
  • 83 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 3 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 87 篇 feature extracti...
  • 70 篇 accuracy
  • 54 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 data models
  • 39 篇 federated learni...
  • 39 篇 training
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 20 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 codes
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 38 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 zhu lei
  • 11 篇 fu chong

语言

  • 692 篇 英文
  • 70 篇 其他
  • 4 篇 中文
检索条件"机构=Shanxi Key Laboratory for Network Computing and Security Technology"
763 条 记 录,以下是681-690 订阅
排序:
DLEDNet: A deep learning-based image encryption and decryption network for internet of medical things
arXiv
收藏 引用
arXiv 2020年
作者: Ding, Yi Wu, Guozheng Chen, Dajiang Zhang, Ning Gong, Linpeng Cao, Mingsheng Qin, Zhiguang Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu Sichuan610054 China Institute of Electronic and Information Engineering of UESTC in Guangdong Dongwan Guangdong China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu Sichuan610054 China National Natural Science Foundation of China Beijing China Department of Computing Science Texas A&M University-Corpus Christi Corpus ChristiTX78412 United States
With the rapid development of Internet of Medical Things (IoMT) technology, many medical imaging equipments are connected to the medical information network to facilitate the process of diagnosing and treating for doc... 详细信息
来源: 评论
Fair and autonomous sharing of federate learning models in mobile Internet of Things
arXiv
收藏 引用
arXiv 2020年
作者: Hao, Xiaohan Ren, Wei Xiong, Ruoting Zheng, Xianghan Zhu, Tianqing Xiong, Neal N. School of Computer Science China University of Geoscience Wuhan China Guangxi Key Laboratory of Cryptography and Information Security Guilin541004 China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Mingbyte Technology QingDao China School of Software University of Technology Sydney UltimoNSW2007 Australia Dept. of Mathematics and Computer Science Northeastern State University United States
Federate learning can conduct machine learning as well as protect the privacy of self-owned training data on corresponding ends, instead of having to upload to a central trusted data aggregation server. In mobile scen... 详细信息
来源: 评论
A more compact object detector head network with feature enhancement and relational reasoning
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Wenchao Fu, Chong Chang, Xiangshi Zhao, Tengfei Li, Xiang Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Baidu Smart Life Group NO. 10 Xibeiwang East Street Ke Ji Yuan Haidian District Beijing100193 China School of Computer Science University of Auckland New Zealand
Modeling implicit feature interaction patterns is of significant importance to object detection tasks. However, in the two-stage detectors, due to the excessive use of hand-crafted components, it is very difficult to ... 详细信息
来源: 评论
NoViSec: Novel Virtual network Mapping Framework for Secure Software-Defined networking
NoViSec: Novel Virtual Network Mapping Framework for Secure ...
收藏 引用
IEEE Wireless Communications and networking Conference Workshops (WCNCW)
作者: Haotong Cao Yue Hu Shengchen Wu Jianbo Du Feng Tian Gagangeet Singh Aujla Longxiang Yang College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China Department of Key Accounts China Mobile Group Jiangsu Co. Ltd. Nanjing China Shanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Xi'an China School of Computing Newcastle University Newcastle upon Tyne U.K
network softwarization technologies, such as software defined networking (SDN), network virtualization (NV), and network function virtualization (NFV), emerge and have been greatly promoted by their supporters. This s...
来源: 评论
Deep Learning for Password Guessing and Password Strength Evaluation, A Survey
Deep Learning for Password Guessing and Password Strength Ev...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Tao Zhang Zelei Cheng Yi Qin Qiang Li Lin Shi Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis Guangxi University for Nationalities Nanning China Department of Computer and Information Technology Purdue University West Lafayette USA PLA Information Engineering University Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Cloud Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
Text passwords are the most widely used authentication methods and will also be used in the future. Text passwords can be regarded as meaningful strings, and deep learning methods have an advantage of text processing.... 详细信息
来源: 评论
In-situ data scheduling optimization based on rainbow DQN for IIoT
收藏 引用
Future Generation Computer Systems 2026年 174卷
作者: Peiying Zhang Siyi Li Lizhuang Tan Neeraj Kumar Jian Wang Kai Liu Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao 266580 China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao 266580 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250014 China Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Patiala 147004 India Department of Computer Science University of Economics and Human Sciences Warszawa 01-043 Poland Department of Networks and Communications College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Dammam 31441 Saudi Arabia College of Science China University of Petroleum (East China) Qingdao 266580 China Beijing National Research Center for Information Science and Technology Tsinghua University Beijing 100084 China State Key Laboratory of Space Network and Communications Tsinghua University Beijing 100084 China
In industrial systems, in-situ computing refers to a mode of local or proximate data processing within the cloud–edge-terminal architecture. In the Industrial Internet of Things (IIoT) environment, servers are typica...
来源: 评论
Global context aware RCNN for object detection
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Wenchao Fu, Chong Xie, Haoyu Zhu, Mai Tie, Ming Chen, Junxin School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Science and Technology on Space Physics Laboratory Beijing100076 China College of Medicine and Biological Information Engineering Northeastern University Shenyang110819 China
RoIPool/RoIAlign is an indispensable process for the typical two-stage object detection algorithm, it is used to rescale the object proposal cropped from the feature pyramid to generate a fixed size feature map. Howev... 详细信息
来源: 评论
A novel Image security Protection Method Based on DCT Compression Theory and Hyper-chaotic Mapping
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2066卷
作者: Xianglian Xue Haiyan Jin School of Computer Science and Engineering Xi'an University of Technology Xi'an 710077Shaanxi China Shaanxi University of Chinese Medicine Xianyang712046Shaanxi China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an710077Shaanxi China
This paper studies the current situation of image compression encryption and analyzes the influence of low frequency (DC coefficient) and high frequency (AC coefficient) on image structure in DCT transformation. Based...
来源: 评论
Enhancing Collaborative Inference on Heterogeneous Edge Devices via Adaptive Ensemble Knowledge Distillation
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年
作者: Wu, Shangrui Li, Yupeng Wang, Wenhua Guo, Jianxiong Fan, Wentao Liu, Qin Jia, Weijia Yu, Shui Cao, Jiannong Wang, Tian Beijing Normal-Hong Kong Baptist University Guangdong Provincial/Zhuhai Key Laboratory of IRADS Department of Computer Science Zhuhai China Hong Kong Baptist University Hong Kong Hong Kong Hong Kong Baptist University Department of Interactive Media Hong Kong Hong Kong Beijing Normal University Institute of Artificial Intelligence and Future Networks Zhuhai China Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Shaanxi Xi'an China Hunan University College of Computer Science and Electronic Engineering Changsha China University of Technology Sydney School of Computer Science Sydney Australia The Hong Kong Polytechnic University Department of Computing Hong Kong Hong Kong
The integration of edge computing with deep neural networks (DNNs) is crucial for intelligent industrial cyber-physical systems. Typically, deploying DNNs on heterogeneous edge devices relies on methods like model com... 详细信息
来源: 评论
Optimizing network resource allocation with graph pointer neural network in large-scale AI systems
收藏 引用
Digital Communications and networks 2024年
作者: Peiying Zhang Yilin Li Athanasios V. Vasilakos Konstantin Igorevich Kostromitin Jianyong Zhang Mohsen Guizani Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao 266580 China State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710071 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250013 China Department of Networks and Communications College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University P.O. Box 1982 Dammam 31441 Saudi Arabia Department of Physics of Nanoscale Systems South Ural State University Chelyabinsk 454080 the Russian Federation Institute of Lightwave Technology Beijing Jiaotong University Beijing 100044 China Key Lab of All Optical Network and Advanced Telecommunication of EMC Institute of Lightwave Technology Beijing Jiaotong University Beijing 100044 China Machine Learning Department Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI) Abu Dhabi 999041 United Arab Emirates
For increasingly complex communication demands of large-scale AI communication systems, the Space-Air-Ground Integrated network (SAGIN) better caters to demands but also raises concerns about resource scarcity and div... 详细信息
来源: 评论