咨询与建议

限定检索结果

文献类型

  • 988 篇 期刊文献
  • 657 篇 会议

馆藏范围

  • 1,645 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,020 篇 工学
    • 670 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 229 篇 信息与通信工程
    • 122 篇 电气工程
    • 102 篇 生物工程
    • 98 篇 电子科学与技术(可...
    • 91 篇 控制科学与工程
    • 73 篇 化学工程与技术
    • 69 篇 光学工程
    • 51 篇 生物医学工程(可授...
    • 49 篇 仪器科学与技术
    • 46 篇 机械工程
    • 45 篇 网络空间安全
    • 33 篇 材料科学与工程(可...
    • 32 篇 动力工程及工程热...
    • 28 篇 安全科学与工程
  • 617 篇 理学
    • 234 篇 数学
    • 219 篇 物理学
    • 141 篇 生物学
    • 83 篇 统计学(可授理学、...
    • 54 篇 地球物理学
    • 52 篇 化学
    • 31 篇 系统科学
  • 281 篇 管理学
    • 166 篇 图书情报与档案管...
    • 123 篇 管理科学与工程(可...
    • 44 篇 工商管理
  • 102 篇 医学
    • 70 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 46 篇 农学
    • 27 篇 作物学
  • 41 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 6 篇 教育学
  • 2 篇 艺术学

主题

  • 70 篇 semantics
  • 47 篇 deep learning
  • 44 篇 feature extracti...
  • 39 篇 accuracy
  • 38 篇 training
  • 31 篇 quantum cryptogr...
  • 30 篇 computational mo...
  • 30 篇 federated learni...
  • 26 篇 privacy
  • 23 篇 neural networks
  • 20 篇 forecasting
  • 19 篇 image segmentati...
  • 19 篇 information retr...
  • 19 篇 data models
  • 18 篇 generative adver...
  • 18 篇 knowledge graph
  • 18 篇 graph neural net...
  • 17 篇 data mining
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 210 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 key laboratory o...
  • 52 篇 school of comput...
  • 49 篇 network and data...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 43 篇 college of compu...
  • 42 篇 cas key laborato...
  • 36 篇 college of cyber...
  • 34 篇 school of comput...
  • 32 篇 cas center for e...
  • 31 篇 hefei national l...
  • 31 篇 shaanxi key labo...
  • 27 篇 anhui province k...
  • 27 篇 cas key lab of n...
  • 26 篇 school of comput...
  • 24 篇 shaanxi key labo...

作者

  • 194 篇 cheng xueqi
  • 154 篇 guo jiafeng
  • 52 篇 zhang ruqing
  • 49 篇 fan yixing
  • 45 篇 lan yanyan
  • 43 篇 shen huawei
  • 33 篇 jin xiaolong
  • 29 篇 pang liang
  • 25 篇 guo guang-can
  • 24 篇 bi keping
  • 22 篇 de rijke maarten
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 20 篇 xueqi cheng
  • 19 篇 chen yanping
  • 19 篇 xu jun
  • 19 篇 jie tian
  • 17 篇 liu jun
  • 17 篇 li chuan-feng
  • 17 篇 chen wei

语言

  • 1,468 篇 英文
  • 142 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science Technology"
1645 条 记 录,以下是1621-1630 订阅
排序:
Attribute-Based Authenticated Group key Management Protocol for Mobile Peer-to-Peer network
收藏 引用
China Communications 2012年 第10期9卷 68-77页
作者: Zhang Guoyin Fu Xiaojing Ma Chunguang College of Computer Science and Technology Harbin Engineering University Harbin 150001 P. R. China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu 611731 P. R. China
The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer network ( MP2... 详细信息
来源: 评论
Distributed redundancy strategy in P2P environment
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第3期6卷 148-157页
作者: Yang, Lei Qin, Zhi-Guang Wang, Can Yang, Hao School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province Chengdu 611731 China
P2P storage architecture plays an important role in distributed storage systems. For P2P dynamic environment, the sufficient redundant data must be maintained to ensure the data availability. System will pay various c... 详细信息
来源: 评论
SECURITY STRUCTURE OF CLOUD STORAGE BASED ON HOMOMORPHIC ENCRYPTION SCHEME
SECURITY STRUCTURE OF CLOUD STORAGE BASED ON HOMOMORPHIC ENC...
收藏 引用
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems
作者: Jian Li Sicong Chen Danjie Song School of Computer Beijing University of Posts and Telecommunications Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China
According to the demerits of the traditional cloud storage that there exists superuser, encryption and decryption would take up many client’s sources, and the retrieval spends much time and is complex, the paper prop... 详细信息
来源: 评论
A SIMPLE FULLY HOMOMORPHIC ENCRYPTION SCHEME AVAILABLE IN CLOUD COMPUTING
A SIMPLE FULLY HOMOMORPHIC ENCRYPTION SCHEME AVAILABLE IN CL...
收藏 引用
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems
作者: Jian Li Danjie Song Sicong Chen Xiaofeng Lu School of Computer Beijing University of Posts and Telecommunications Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China
With continuous expansion of cloud computing, problems of third-party data security become increasingly prominent. However, effective retrieval of encrypted data and other operations are difficult to achieve by tradit... 详细信息
来源: 评论
Alliance-Authentication Protocol in Clouds Computing Environment
收藏 引用
China Communications 2012年 第7期9卷 42-54页
作者: Zhang Qikun Li Yuanzhang Song Danjie Tan Yuan School of Computer Science and Technology Beijing Institute of Technology Beijing 100081 P. R. China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology ofChina Chengdu 610054 P. R. China School of Computer Beijing University of Posts and Telecommunications Beijing 100876 P. R. China
Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or p... 详细信息
来源: 评论
Pattern mining, semantic label identification and movement prediction using mobile phone data
Pattern mining, semantic label identification and movement p...
收藏 引用
8th International Conference on Advanced data Mining and Applications, ADMA 2012
作者: Xie, Rong Luo, Jun Yue, Yang Li, Qingquan Zou, Xiaoqing International School of Software Wuhan University Wuhan 430079 China Shenzhen Institutes of Advanced Technology CAS Shenzhen 518055 China Shenzhen Key Laboratory of High Performance Data Mining Shenzhen 518055 China Shenzhen University Shenzhen China State Key Lab. of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University Wuhan 430079 China Faculty of Land Resource Engineering Kunming University of Science and Technology Kunming China
data collected from mobile phones have potential knowledge to provide with important behavior patterns of individuals. In this paper, we present approaches to discovering personal mobility and characteristics based on... 详细信息
来源: 评论
Overhead Power Line Detection from UAV Video Images
Overhead Power Line Detection from UAV Video Images
收藏 引用
International Conference on Mechatronics and Machine Vision in Practice
作者: Tang Wen YANG Hang YIN Qiu Qi RUAN Jian Da HAN Jun Tong QI Qing YONG Zi Tong WANG Zeng Qi SUN Beijing Key Laboratory of Advanced Information Science and Network Technology Institute of Information Science Beijing Jiaotong University Beijing 100044 China Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044 China State Key Laboratory of Robotics Shenyang Institute of Automation CAS Shenyang 110016 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
Currently, unmanned aerial vehicles (UAVs) are applied to routine inspection tasks of electric distribution networks. As an important information source, machine vision attracts much attention in the area of the UAV&#... 详细信息
来源: 评论
miRDeathDB:a database bridging microRNAs and the programmed cell death
miRDeathDB:a database bridging microRNAs and the programmed ...
收藏 引用
第五届全国生物信息学与系统生物学学术大会暨国际生物信息学前沿研讨会高通量时代的生物信息学与系统生物学
作者: Jianzhen Xu Yan-Hui Li College of Bioengineering Henan University of TechnologyZhengzhouChina 450001 Institute of Cardiovascular Sciences and Key Laboratory of Molecular Cardiovascular Sciences Ministry of EducationPeking University Health Science Center Scientific Data Center Computer Network Information CenterChinese Academy of Sciences
Background:MicroRNAs(miRNAs) are a class of small non-coding RNAs,which negatively regulate protein coding genes at the posttranscriptional *** tiny regulators have been associated to almost all known physiological an... 详细信息
来源: 评论
miRDeathDB: a database bridging microRNAs and the programmed cell death
miRDeathDB: a database bridging microRNAs and the programmed...
收藏 引用
第五届全国生物信息学与系统生物学学术大会
作者: Jianzhen Xu Yan-Hui Li College of Bioengineering Henan University of Technology Zhengzhou China 450001 Institute of Cardiovascular Sciences and Key Laboratory of Molecular Cardiovascular Sciences Ministry of Education Peking University Health Science Center 38 Xueyuan Road Haidian District Beijing China 100191 Scientific Data Center Computer Network Information Center Chinese Academy of SciencesBeijing China 100190
Background: MicroRNAs (miRNAs) are a class of small non-coding RNAs, which negatively regulate protein coding genes at the posttranscriptional *** tiny regulators have been associated to almost all known physiological... 详细信息
来源: 评论
Improved deduplication method based on variable-size sliding window
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2011年 第9期5卷 80-87页
作者: Wang, Can Qin, Zhiguang Yang, Lei Nie, Peng School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province Chengdu 611731 China
To improve the deduplication performance while keep a reasonable metadata cost and time cost at the same time, a state deduplication method based on variable-size sliding window and a universal model of performance-an... 详细信息
来源: 评论