咨询与建议

限定检索结果

文献类型

  • 307 篇 期刊文献
  • 264 篇 会议

馆藏范围

  • 571 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 384 篇 工学
    • 261 篇 计算机科学与技术...
    • 222 篇 软件工程
    • 112 篇 信息与通信工程
    • 81 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 38 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 22 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 12 篇 航空宇航科学与技...
    • 11 篇 化学工程与技术
    • 11 篇 安全科学与工程
  • 179 篇 理学
    • 92 篇 数学
    • 52 篇 生物学
    • 34 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 27 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 31 篇 semantics
  • 20 篇 feature extracti...
  • 18 篇 federated learni...
  • 18 篇 accuracy
  • 16 篇 deep learning
  • 15 篇 image segmentati...
  • 15 篇 training
  • 11 篇 internet of thin...
  • 11 篇 neural networks
  • 11 篇 computational mo...
  • 10 篇 data mining
  • 10 篇 network security
  • 10 篇 data models
  • 9 篇 visualization
  • 9 篇 correlation
  • 8 篇 optimization
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 simulation
  • 7 篇 vectors

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 46 篇 key laboratory o...
  • 22 篇 network and data...
  • 12 篇 shandong enginee...
  • 12 篇 school of comput...
  • 12 篇 shandong fundame...
  • 12 篇 shenzhen researc...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 10 篇 key laboratory o...
  • 9 篇 school of inform...
  • 9 篇 cas key laborato...
  • 8 篇 computer network...
  • 8 篇 network and data...
  • 8 篇 school of comput...
  • 7 篇 network and data...
  • 7 篇 beijing key labo...
  • 7 篇 school of comput...
  • 7 篇 school of comput...

作者

  • 15 篇 qin zhen
  • 14 篇 liu jun
  • 11 篇 jing zhao
  • 11 篇 qin zhiguang
  • 10 篇 liu bin
  • 9 篇 zhenyu yang
  • 8 篇 yang yang
  • 8 篇 ding yi
  • 8 篇 chen yanping
  • 8 篇 yang shenghao
  • 8 篇 wang zhongmin
  • 8 篇 zhang hongbin
  • 7 篇 niyato dusit
  • 7 篇 yi ding
  • 7 篇 zhen qin
  • 7 篇 zhao dongmei
  • 6 篇 hu liang
  • 6 篇 cao mingsheng
  • 6 篇 qin lu
  • 6 篇 ding ming

语言

  • 525 篇 英文
  • 39 篇 其他
  • 8 篇 中文
检索条件"机构=Data Engineering and Network Technology Laboratory"
571 条 记 录,以下是551-560 订阅
排序:
Privacy preserving for network coding in smart grid  15th
Privacy preserving for network coding in smart grid
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: He, Shiming Zeng, Weini Xie, Kun Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer and Communication Engineering Hunan Province Engineering Research Center of Electric Transportation and Smart Distributed Network Changsha University of Science and Technology Changsha410114 China The 716th Research Institute China Shipbuilding Industry Corporation Lianyungang222061 China College of Computer Science and Electronics Engineering Hunan University Changsha410082 China Department of Electrical and Computer Engineering State University of New York at Stony Brook New York United States
In smart grid, privacy implications to individuals and their family is an important issue, due to the fine-grained usage data collection. Wireless communications are considered by many utility companies to obtain info... 详细信息
来源: 评论
26th Annual Computational Neuroscience Meeting (CNS*2017): Part 3 Antwerp, Belgium. 15-20 July 2017 Abstracts
收藏 引用
BMC NEUROSCIENCE 2017年 第SUPPL 1期18卷 95-176页
作者: [Anonymous] Department of Neuroscience Yale University New Haven CT 06520 USA Department Physiology & Pharmacology SUNY Downstate Brooklyn NY 11203 USA NYU School of Engineering 6 MetroTech Center Brooklyn NY 11201 USA Departament de Matemàtica Aplicada Universitat Politècnica de Catalunya Barcelona 08028 Spain Institut de Neurobiologie de la Méditerrannée (INMED) INSERM UMR901 Aix-Marseille Univ Marseille France Center of Neural Science New York University New York NY USA Aix-Marseille Univ INSERM INS Inst Neurosci Syst Marseille France Laboratoire de Physique Théorique et Modélisation CNRS UMR 8089 Université de Cergy-Pontoise 95300 Cergy-Pontoise Cedex France Department of Mathematics and Computer Science ENSAT Abdelmalek Essaadi’s University Tangier Morocco Laboratory of Natural Computation Department of Information and Electrical Engineering and Applied Mathematics University of Salerno 84084 Fisciano SA Italy Department of Medicine University of Salerno 84083 Lancusi SA Italy Dipartimento di Fisica Università degli Studi Aldo Moro Bari and INFN Sezione Di Bari Italy Data Analysis Department Ghent University Ghent Belgium Coma Science Group University of Liège Liège Belgium Cruces Hospital and Ikerbasque Research Center Bilbao Spain BIOtech Department of Industrial Engineering University of Trento and IRCS-PAT FBK 38010 Trento Italy Department of Data Analysis Ghent University Ghent 9000 Belgium The Wellcome Trust Centre for Neuroimaging University College London London WC1N 3BG UK Department of Electronic Engineering NED University of Engineering and Technology Karachi Pakistan Blue Brain Project École Polytechnique Fédérale de Lausanne Lausanne Switzerland Departement of Mathematics Swansea University Swansea Wales UK Laboratory for Topology and Neuroscience at the Brain Mind Institute École polytechnique fédérale de Lausanne Lausanne Switzerland Institute of Mathematics University of Aberdeen Aberdeen Scotland UK Department of Integrativ
来源: 评论
Novel way to research nonlinear feedback shift register
收藏 引用
Science China(Information Sciences) 2014年 第9期57卷 161-174页
作者: ZHAO DaWei PENG HaiPeng LI LiXiang HUI SiLi YANG YiXian Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Zhejiang Provincial Key Lab of Data Storage and Transmission Technology Hangzhou Dianzi University National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center
In this paper,we regard the nonlinear feedback shift register(NLFSR)as a special Boolean network,and use semi-tensor product of matrices and matrix expression of logic to convert the dynamic equations of NLFSR into an... 详细信息
来源: 评论
ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks  15
ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks
收藏 引用
International Conference on Software engineering (ICSE)
作者: Xiang Yuan Chenggang Wu Zhenjiang Wang Jianjun Li Pen-Chung Yew Jeff Huang Xiaobing Feng Yanyan Lan Yunji Chen Yong Guan University of Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Architecture Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering University of Minnesota at Twin-Cities Minneapolis USA Department of Computer Science and Engineering Texas A&M University Texas USA CAS Key Laboratory of Network Data Science and Technology Chinese Academy of Sciences Beijing China College of Information Engineering Capital Normal University Beijing China
Multi-threaded programs play an increasingly important role in current multi-core environments. Exposing concurrency bugs and debugging such multi-threaded programs have become quite challenging due to their inherent ... 详细信息
来源: 评论
A UC-secure authenticated contributory group key exchange protocol based on discrete logarithm
A UC-secure authenticated contributory group key exchange pr...
收藏 引用
9th International Conference on Information Systems Security, ICISS 2013
作者: Sobhdel, Yasser Jalili, Rasool Data and Network Security Laboratory Department of Computer Engineering Sharif University of Technology Tehran Iran
Authenticated key exchange protocols allow parties to establish a common session key which in turn is fundamental to building secure channels. Authenticated group key exchange protocols allow parties to interact with ... 详细信息
来源: 评论
An efficient and provably-secure coercion-resistant e-voting protocol
An efficient and provably-secure coercion-resistant e-voting...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Alireza Toroghi Haghighat Mohammad Sadeq Dousti Rasool Jalili Data and Network Security Laboratory Department of Computer Engineering Sharif University of Technology Tehran Iran
We present an efficient and provably-secure e-voting protocol, which is a variant of the JCJ e-voting protocol (Juels et al., 2010). It decreases the total number of JCJ's operations from O(n 2 ) to O(n), where n ... 详细信息
来源: 评论
Cryptanalysis of 2-layer nonlinear piece in hand method
Cryptanalysis of 2-layer nonlinear piece in hand method
收藏 引用
CD-ARES 2013 Workshops: 2nd International Workshop on Modern Cryptography and Security engineering, MoCrySEn 2013 and 3rd International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2013
作者: Nie, Xuyun Petzoldt, Albrecht Buchmann, Johannes School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Technische Universität Darmstadt Department of Computer Science Hochschulstraße 10 64289 Darmstadt Germany State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Network and Data Security Key Laboratory of Sichuan Province China
Piece in Hand method is a security enhancement method for Multivariate Public Key Cryptosystems (MPKCs). Since 2004, many types of this method have been proposed. In this paper, we consider the 2-layer nonlinear Piece... 详细信息
来源: 评论
Efficient and random oracle-free conditionally anonymous ring signature
Efficient and random oracle-free conditionally anonymous rin...
收藏 引用
6th International Conference on Provable Security, ProvSec 2012
作者: Zeng, Shengke Qin, Zhiguang Lu, Qing Li, Qinyi School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security China
Compared to conventional ring signature schemes, conditionally anonymous ring signatures allow to revoke the anonymity of actual signer without the group manager's help if necessary. When the actual signer intends... 详细信息
来源: 评论
Sequence data and association statistics from 12,940 type 2 diabetes cases and controls
收藏 引用
Scientific data 2017年 第1期4卷 170179页
作者: Jason Flannick Christian Fuchsberger Anubha Mahajan Tanya M Teslovich Vineeta Agarwala Kyle J Gaulton Lizz Caulkins Ryan Koesterer Clement Ma Loukas Moutsianas Davis J McCarthy Manuel A Rivas John R B Perry Xueling Sim Thomas W Blackwell Neil R Robertson N William Rayner Pablo Cingolani Adam E Locke Juan Fernandez Tajes Heather M Highland Josee Dupuis Peter S Chines Cecilia M Lindgren Christopher Hartl Anne U Jackson Han Chen Jeroen R Huyghe Martijn van de Bunt Richard D Pearson Ashish Kumar Martina Müller-Nurasyid Niels Grarup Heather M Stringham Eric R Gamazon Jaehoon Lee Yuhui Chen Robert A Scott Jennifer E Below Peng Chen Jinyan Huang Min Jin Go Michael L Stitzel Dorota Pasko Stephen C J Parker Tibor V Varga Todd Green Nicola L Beer Aaron G Day-Williams Teresa Ferreira Tasha Fingerlin Momoko Horikoshi Cheng Hu Iksoo Huh Mohammad Kamran Ikram Bong-Jo Kim Yongkang Kim Young Jin Kim Min-Seok Kwon Juyoung Lee Selyeong Lee Keng-Han Lin Taylor J Maxwell Yoshihiko Nagai Xu Wang Ryan P Welch Joon Yoon Weihua Zhang Nir Barzilai Benjamin F Voight Bok-Ghee Han Christopher P Jenkinson Teemu Kuulasmaa Johanna Kuusisto Alisa Manning Maggie C Y Ng Nicholette D Palmer Beverley Balkau Alena Stančáková Hanna E Abboud Heiner Boeing Vilmantas Giedraitis Dorairaj Prabhakaran Omri Gottesman James Scott Jason Carey Phoenix Kwan George Grant Joshua D Smith Benjamin M Neale Shaun Purcell Adam S Butterworth Joanna M M Howson Heung Man Lee Yingchang Lu Soo-Heon Kwak Wei Zhao John Danesh Vincent K L Lam Kyong Soo Park Danish Saleheen Wing Yee So Claudia H T Tam Uzma Afzal David Aguilar Rector Arya Tin Aung Edmund Chan Carmen Navarro Ching-Yu Cheng Domenico Palli Adolfo Correa Joanne E Curran Dennis Rybin Vidya S Farook Sharon P Fowler Barry I Freedman Michael Griswold Daniel Esten Hale Pamela J Hicks Chiea-Chuen Khor Satish Kumar Benjamin Lehne Dorothée Thuillier Wei Yen Lim Jianjun Liu Marie Loh Solomon K Musani Sobha Puppala William R Scott Loïc Yengo Sian-Tsung Tan Herman A Taylor Farook Thameem Gregory Wilson Tien Yin Wong Pål Rasmu Department of Molecular Biology Massachusetts General Hospital Boston Massachusetts USA. Program in Medical and Population Genetics Broad Institute Cambridge Massachusetts USA. Department of Biostatistics and Center for Statistical Genetics University of Michigan Ann Arbor Michigan USA. Wellcome Trust Centre for Human Genetics Nuffield Department of Medicine University of Oxford Oxford UK. Harvard-MIT Division of Health Sciences and Technology Massachusetts Institute of Technology Cambridge Massachusetts USA. Department of Statistics University of Oxford Oxford UK. Genetics of Complex Traits University of Exeter Medical School University of Exeter Exeter UK. MRC Epidemiology Unit Institute of Metabolic Science University of Cambridge Cambridge UK. Department of Twin Research and Genetic Epidemiology King's College London London UK. Oxford Centre for Diabetes Endocrinology and Metabolism Radcliffe Department of Medicine University of Oxford Oxford UK. Department of Human Genetics Wellcome Trust Sanger Institute Hinxton Cambridgeshire UK. School of Computer Science McGill University Montreal Quebec Canada. McGill University and Génome Québec Innovation Centre Montreal Quebec Canada. Human Genetics Center The University of Texas Graduate School of Biomedical Sciences at Houston The University of Texas Health Science Center at Houston Houston Texas USA. Department of Biostatistics Boston University School of Public Health Boston Massachusetts USA. National Heart Lung and Blood Institute's Framingham Heart Study Framingham Massachusetts USA. Medical Genomics and Metabolic Genetics Branch National Human Genome Research Institute National Institutes of Health Bethesda Maryland USA. Department of Biostatistics Harvard School of Public Health Boston Massachusetts USA. Chronic Disease Epidemiology Swiss Tropical and Public Health Institute University of Basel Basel Switzerland. Institute of Genetic Epidemiology Helmholtz Zentrum München German R
To investigate the genetic basis of type 2 diabetes (T2D) to high resolution, the GoT2D and T2D-GENES consortia catalogued variation from whole-genome sequencing of 2,657 European individuals and exome sequencing of 1...
来源: 评论
Attribute-Based Authenticated Group Key Management Protocol for Mobile Peer-to-Peer network
收藏 引用
China Communications 2012年 第10期9卷 68-77页
作者: Zhang Guoyin Fu Xiaojing Ma Chunguang College of Computer Science and Technology Harbin Engineering University Harbin 150001 P. R. China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu 611731 P. R. China
The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer network ( MP2... 详细信息
来源: 评论