咨询与建议

限定检索结果

文献类型

  • 526 篇 会议
  • 403 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 557 篇 工学
    • 395 篇 计算机科学与技术...
    • 325 篇 软件工程
    • 154 篇 信息与通信工程
    • 70 篇 控制科学与工程
    • 69 篇 电气工程
    • 60 篇 电子科学与技术(可...
    • 48 篇 生物工程
    • 42 篇 网络空间安全
    • 36 篇 机械工程
    • 27 篇 仪器科学与技术
    • 23 篇 光学工程
    • 15 篇 生物医学工程(可授...
    • 14 篇 建筑学
    • 14 篇 交通运输工程
    • 14 篇 安全科学与工程
    • 12 篇 土木工程
    • 11 篇 材料科学与工程(可...
  • 223 篇 理学
    • 144 篇 数学
    • 49 篇 生物学
    • 41 篇 统计学(可授理学、...
    • 35 篇 物理学
    • 30 篇 系统科学
    • 9 篇 化学
  • 131 篇 管理学
    • 77 篇 管理科学与工程(可...
    • 60 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 18 篇 法学
    • 10 篇 法学
    • 9 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 11 篇 军事学
    • 11 篇 军队指挥学
  • 10 篇 医学
  • 4 篇 教育学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 60 篇 feature extracti...
  • 52 篇 accuracy
  • 48 篇 semantics
  • 38 篇 computational mo...
  • 33 篇 cryptography
  • 32 篇 training
  • 30 篇 federated learni...
  • 26 篇 data models
  • 25 篇 deep learning
  • 22 篇 transformers
  • 22 篇 neural networks
  • 21 篇 authentication
  • 21 篇 security
  • 20 篇 object detection
  • 19 篇 information secu...
  • 19 篇 protocols
  • 18 篇 wireless sensor ...
  • 18 篇 visualization
  • 17 篇 privacy
  • 16 篇 noise

机构

  • 199 篇 shandong provinc...
  • 158 篇 key laboratory o...
  • 44 篇 shandong fundame...
  • 41 篇 shandong enginee...
  • 41 篇 key laboratory o...
  • 28 篇 key lab of educa...
  • 28 篇 pca lab key lab ...
  • 25 篇 school of comput...
  • 24 篇 key laboratory o...
  • 20 篇 ministry of educ...
  • 18 篇 guangxi key lab ...
  • 17 篇 pca lab key lab ...
  • 16 篇 ministry of educ...
  • 15 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 key laboratory o...
  • 13 篇 guangxi key lab ...
  • 12 篇 key laboratory o...
  • 12 篇 qilu university ...

作者

  • 70 篇 yang jian
  • 33 篇 jianfeng ma
  • 32 篇 jian yang
  • 31 篇 meng deyu
  • 27 篇 hu yupu
  • 24 篇 ma jianfeng
  • 23 篇 xie jin
  • 22 篇 wang hui-ming
  • 17 篇 ma jian-feng
  • 16 篇 cao xiangyong
  • 15 篇 jiang haobo
  • 14 篇 pei qingqi
  • 13 篇 qian jianjun
  • 13 篇 qingqi pei
  • 12 篇 yang yang
  • 12 篇 xiaoming wu
  • 12 篇 li xiang
  • 12 篇 pang liaojun
  • 11 篇 hui le
  • 11 篇 jing zhao

语言

  • 874 篇 英文
  • 30 篇 其他
  • 27 篇 中文
检索条件"机构=Key Lab of Computer Networks and Information Security of Ministry of Education"
931 条 记 录,以下是51-60 订阅
排序:
Robust MVDR beamforming based on covariance matrix reconstruction
收藏 引用
Science China(information Sciences) 2013年 第4期56卷 28-39页
作者: MU PengCheng LI Dan YIN QinYe GUO Wei Ministry of Education Key Lab for Intelligent Networks and Network Security School of Electronics and Information EngineeringXi'an Jiaotong University
The minimum variance distortionless response(MVDR) beamformer has better resolution and much better interference rejection capability than the data-independent ***,the former is more sensitive to errors,such as the st... 详细信息
来源: 评论
A Hierarchical Semantic Distillation Framework for Open-Vocabulary Object Detection
arXiv
收藏 引用
arXiv 2025年
作者: Fu, Shenghao Yan, Junkai Yang, Qize Wei, Xihan Xie, Xiaohua Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Peng Cheng Laboratory China Tongyi Lab Alibaba Group China School of Computer Science and Engineering Sun Yat-sen University Guangdong Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangdong Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Ministry of Education Guangdong Guangzhou China
Open-vocabulary object detection (OVD) aims to detect objects beyond the training annotations, where detectors are usually aligned to a pre-trained vision-language model, e.g., CLIP, to inherit its generalizable recog... 详细信息
来源: 评论
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer networks
收藏 引用
Transactions of Tianjin University 2008年 第1期14卷 66-72页
作者: 王方伟 张运凯 马建峰 Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Network Center Hebei Normal University
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... 详细信息
来源: 评论
Cryptanalysis and Improvement of a Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations
收藏 引用
Chinese Physics Letters 2010年 第6期27卷 13-15页
作者: ZHU Zhen-Chao ZHANG Yu-Qing Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 National Computer Network Intrusion Protection Center Graduate University Chinese Academy of Sciences Beijing 100049
In a recent paper [Chin. Phys. Lett 25(2008)1187], a quantum secret sharing scheme between multiparty and multiparty was presented. We show that the protocol is not secure because the last member in Alice's group c... 详细信息
来源: 评论
Broadcast encryption schemes based on RSA
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2009年 第1期16卷 69-75页
作者: MU Ning-bo HU Yu-pu OU Hai-wen The Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Key Laboratory of Information Security and Secrecy Beijing Institute of Electronic Science and Technology Beijing 100070 China
Three broadcast schemes for small receiver set using the property of RSA modulus are presented. They can solve the problem of data redundancy when the size of receiver set is small. In the proposed schemes, the center... 详细信息
来源: 评论
Computing Power in the Sky: Digital Twin-assisted Collaborative Computing with Multi-UAV networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论
On cross-correlation indicators of an S-box
收藏 引用
Frontiers of computer Science 2011年 第4期5卷 448-453页
作者: Sheng GAO Wenping MA Zepeng ZHUO Fenghe WANG Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China
Substitution boxes (S-boxes) are often used as the most important nonlinear components in many symmetric encryption algorithms. The cryptographic properties of an S-box directly affect the security of the whole ciph... 详细信息
来源: 评论
A sub-spectrum sensing scheme based on reputation in Cognitive Radio networks
A sub-spectrum sensing scheme based on reputation in Cogniti...
收藏 引用
International Conference on Computational Intelligence and security
作者: Li, Hongning Pei, Qingqi Jiang, Xiaohong Liang, Rui Geng, Peng Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
With the existing Cognitive Radio networks development, we present a sub-spectrum sensing scheme based on reputation, which takes advantage in energy consumption, security and fairness from spectrum sensing, data fusi... 详细信息
来源: 评论
Design of TNC MAP Server based on information fusion
Design of TNC MAP Server based on information fusion
收藏 引用
International Conference on computer Application and System Modeling
作者: Chen, Xi Li, XingHua Ma, JianFeng Key Laboratory of Computer Networks and Information Security Ministry of Education Xi' an China
In current version of Trusted Network Connection (TNC) architecture, IF-MAP protocol creates a structured way to support real-time data interchange and dynamic management. However, there is a big challenge that the MA... 详细信息
来源: 评论
Auction Theory and Game Theory Based Pricing of Edge Computing Resources: A Survey
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Jiguo Liu, Shun Zou, Yifei Wang, Guijuan Hu, Chunqiang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Qufu Normal University School of Computer Science Shandong Rizhao China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250353 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol... 详细信息
来源: 评论