咨询与建议

限定检索结果

文献类型

  • 252 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 246 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 62 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 化学工程与技术
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 438 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
469 条 记 录,以下是321-330 订阅
排序:
Large-Capacity Three-Party Quantum Digital Secret Sharing Using Three Particular Matrices Coding
收藏 引用
Communications in Theoretical Physics 2016年 第11期65卷 501-508页
作者: 赖红 罗明星 Josef Pieprzyk 陶丽 刘志明 Mehmet A.Orgun School of Computer and Information Science Southwest University Information Security and National Computing Grid Laboratory School of Information Science and TechnologySouthwest Jiaotong University School of Electrical Engineering and Computer Science Queensland University of Technology Institute of Computer Science Polish Academy of Sciences Department of Computing Macquarie University Faculty of Information Technology Macao University of Science and Technology
In this paper, we develop a large-capacity quantum digital secret sharing(QDSS) scheme, combined the Fibonacci- and Lucas-valued orbital angular momentum(OAM) entanglement with the recursive Fibonacci and Lucas matric... 详细信息
来源: 评论
Multi-label inductive matrix completion for joint MGMT and IDH1 status prediction for glioma patients  1
收藏 引用
20th International Conference on Medical Image computing and computer-Assisted Intervention, MICCAI 2017
作者: Chen, Lei Zhang, Han Thung, Kim-Han Liu, Luyan Lu, Junfeng Wu, Jinsong Wang, Qian Shen, Dinggang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Department of Radiology and BRIC University of North Carolina Chapel Hill United States School of Biomedical Engineering Med-X Research Institute Shanghai Jiao Tong University Shanghai China Department of Neurosurgery Huashan Hospital Fudan University Shanghai China Shanghai Key Lab of Medical Image Computing and Computer Assisted Intervention Shanghai China
MGMT promoter methylation and IDH1 mutation in high-grade gliomas (HGG) have proven to be the two important molecular indicators associated with better prognosis. Traditionally, the statuses of MGMT and IDH1 are obtai... 详细信息
来源: 评论
Robust Multi-Exposure Image Fusion: A Structural Patch Decomposition Approach
Robust Multi-Exposure Image Fusion: A Structural Patch Decom...
收藏 引用
作者: Ma, Kede Li, Hui Yong, Hongwei Wang, Zhou Meng, Deyu Zhang, Lei Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong Department of Computing. Hong Kong Polytechnic University Hong Kong Hong Kong Institute for Information and System Sciences and Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China Inst. for Info. and Syst. Sci. and Min. of Educ. Key Lab. of Intelligent Networks and Netwk. Secty. Xi'an Jiaotong University Xi'an710049 China
We propose a simple yet effective structural patch decomposition approach for multi-exposure image fusion (MEF) that is robust to ghosting effect. We decompose an image patch into three conceptually independent compon... 详细信息
来源: 评论
Person re-identification by camera correlation aware feature augmentation
arXiv
收藏 引用
arXiv 2017年
作者: Chen, Ying-Cong Zhu, Xiatian Zheng, Wei-Shi Lai, Jian-Huang School of Data and Computer Science Sun Yat-sen University Guangzhou510275 China Collaborative Innovation Center of High Performance Computing National University of Defense Technology Changsha410073 China Department of Computer Science and Engineering Chinese University of Hong Kong School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom Key Laboratory of Machine Intelligence and Advanced Computing Sun Yatsen University Ministry of Education China Guangdong Province Key Laboratory of Information Security China
The challenge of person re-identification (re-id) is to match individual images of the same person captured by different non-overlapping camera views against significant and unknown cross-view feature distortion. Whil... 详细信息
来源: 评论
Early containment of fast network worm malware
Early containment of fast network worm malware
收藏 引用
National Foundation for Science and Technology Development Conference on Information and computer Science (NICS)
作者: Muhammad Aminu Ahmad Steve Woodhead Diane Gan Department of Engineering Science Internet Security Research Laboratory Department of Computing and Information System University of Greenwich UK
This paper presents a countermeasure mechanism for the propagation of fast network worm malware. The mechanism uses a cross layer architecture with a detection technique at the network layer to identify worm infection... 详细信息
来源: 评论
A geometric image segmentation method based on a bi-convex, fuzzy, variational principle with teaching-learning optimization
A geometric image segmentation method based on a bi-convex, ...
收藏 引用
作者: Jin, Haiyan Li, Yaning Xing, Bei Wang, Lei Department of Computer Science and Engineering Xi'An University of Technology No. 5 South Jinhua Road Xi'an Shaanxi710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
This paper proposes an efficient, bi-convex, fuzzy, variational (BFV) method with teaching and learning based optimization (TLBO) for geometric image segmentation. Firstly, we adopt a bi-convex, object function to pro... 详细信息
来源: 评论
A novel quantum image compression method based on JPEG
arXiv
收藏 引用
arXiv 2017年
作者: Wang, Jian Jiang, Nan Zhao, Na School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China Department of Computer Science Purdue University West Lafayette47907 United States Department of Chemistry Purdue University West Lafayette47907 United States College of Computer Science Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China
Quantum image processing has been a hot topic. The first step of it is to store an image into qubits, which is called quantum image preparation. Different quantum image representations may have different preparation m... 详细信息
来源: 评论
Unified quantum no-go theorems and transforming of quantum states in a restricted set
arXiv
收藏 引用
arXiv 2017年
作者: Luo, Ming-Xing Li, Hui-Ran Lai, Hong Wang, Xiaojun Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu610031 China Department of Physics University of Michigan Ann ArborMI48109 United States School of Computer and Information Science Southwest University Chongqing400715 China School of Electronic Engineering Dublin City University Dublin 9 Ireland
The linear superposition principle in quantum mechanics is essential for several no-go theorems such as the no-cloning theorem, the no-deleting theorem and the no-superposing theorem. It remains an open problem of fin... 详细信息
来源: 评论
Modularity based community detection with deep learning  25
Modularity based community detection with deep learning
收藏 引用
25th International Joint Conference on Artificial Intelligence, IJCAI 2016
作者: Liang, Yang Cao, Xiaochun He, Dongxiao Chuan, Wang Xiao, Wang Weixiong, Zhang State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China School of Information Engineering Tianjin University of Commerce China School of Computer Science and Technology Tianjin Key Laboratory of Cognitive Computing and Application Tianjin University China Department of Computer Science and Technology Tsinghua University China College of Math and Computer Science Institute for Systems Biology Jianghan University China Department of Computer Science and Engineering Washington University St. Louis United States
Identification of module or community structures is important for characterizing and understanding complex systems. While designed with different objectives, i.e., stochastic models for regeneration and modularity max... 详细信息
来源: 评论
Performance analysis of parallel replica molecular dynamics
收藏 引用
AIP Conference Proceedings 2018年 第1期1978卷
作者: Boyao Zhang Jue Wang Yangde Feng Ji Xiang Lei Wang 1Computer Network Information Center Chinese Academy of Science Department of High Performance Computing Technology and Application Development Beijing China 2University of Chinese Academy of Sciences Beijing China 3State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China 4School of cybersecurity Chinese Academy of Sciences China
Molecular dynamics simulation is an important tool for studying materials microstructure evolution under radiation effects. It is difficult to simulate atomic diffusion in materials owing to the time-scale limitations...
来源: 评论