咨询与建议

限定检索结果

文献类型

  • 1,520 篇 期刊文献
  • 1,296 篇 会议
  • 1 册 图书

馆藏范围

  • 2,817 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,914 篇 工学
    • 1,331 篇 计算机科学与技术...
    • 1,123 篇 软件工程
    • 452 篇 信息与通信工程
    • 220 篇 生物工程
    • 206 篇 电气工程
    • 195 篇 控制科学与工程
    • 169 篇 电子科学与技术(可...
    • 142 篇 光学工程
    • 107 篇 生物医学工程(可授...
    • 103 篇 机械工程
    • 100 篇 化学工程与技术
    • 80 篇 网络空间安全
    • 74 篇 仪器科学与技术
    • 55 篇 交通运输工程
    • 53 篇 动力工程及工程热...
    • 53 篇 安全科学与工程
    • 46 篇 材料科学与工程(可...
    • 45 篇 土木工程
  • 1,012 篇 理学
    • 497 篇 数学
    • 276 篇 物理学
    • 253 篇 生物学
    • 174 篇 统计学(可授理学、...
    • 91 篇 化学
    • 75 篇 系统科学
  • 517 篇 管理学
    • 276 篇 图书情报与档案管...
    • 251 篇 管理科学与工程(可...
    • 92 篇 工商管理
  • 105 篇 医学
    • 84 篇 临床医学
    • 62 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 16 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 110 篇 semantics
  • 75 篇 feature extracti...
  • 66 篇 deep learning
  • 62 篇 training
  • 54 篇 accuracy
  • 41 篇 computational mo...
  • 40 篇 machine learning
  • 39 篇 federated learni...
  • 34 篇 object detection
  • 34 篇 graph neural net...
  • 33 篇 data mining
  • 32 篇 image segmentati...
  • 31 篇 optimization
  • 31 篇 privacy
  • 27 篇 forecasting
  • 27 篇 data models
  • 26 篇 generative adver...
  • 26 篇 neural networks
  • 25 篇 knowledge graph
  • 25 篇 visualization

机构

  • 160 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 62 篇 cas key laborato...
  • 60 篇 key laboratory o...
  • 48 篇 network and data...
  • 47 篇 college of compu...
  • 47 篇 school of comput...
  • 46 篇 shandong enginee...
  • 45 篇 tianjin key labo...
  • 36 篇 zhejiang lab
  • 34 篇 college of cyber...
  • 33 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 29 篇 peng cheng labor...
  • 28 篇 key lab of infor...
  • 26 篇 hubei key labora...
  • 25 篇 national enginee...
  • 25 篇 shaanxi key labo...

作者

  • 185 篇 cheng xueqi
  • 141 篇 guo jiafeng
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 43 篇 fan yixing
  • 42 篇 zhang ruqing
  • 33 篇 jin xiaolong
  • 28 篇 pang liang
  • 26 篇 liu jun
  • 25 篇 meng deyu
  • 24 篇 jin hai
  • 23 篇 bi keping
  • 21 篇 chen enhong
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 xueqi cheng
  • 19 篇 de rijke maarten
  • 19 篇 chen yanping
  • 19 篇 xu jun
  • 18 篇 li tao

语言

  • 2,629 篇 英文
  • 147 篇 其他
  • 42 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2817 条 记 录,以下是2641-2650 订阅
排序:
Attribute-Based Authenticated Group key Management Protocol for Mobile Peer-to-Peer network
收藏 引用
China Communications 2012年 第10期9卷 68-77页
作者: Zhang Guoyin Fu Xiaojing Ma Chunguang College of Computer Science and Technology Harbin Engineering University Harbin 150001 P. R. China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu 611731 P. R. China
The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer network ( MP2... 详细信息
来源: 评论
A genetic clustering algorithm using a message-based similarity measure
A genetic clustering algorithm using a message-based similar...
收藏 引用
作者: Chang, Dongxia Zhao, Yao Zheng, Changwen Zhang, Xianda Institute of Information Science Beijing Jiaotong University Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing 100044 China National Key Lab of Integrated Information System Technology Institute of Software Chinese Academy of Sciences Beijing 100080 China Tsinghua Department of Automation Tsinghua University Beijing 100084 China
In this paper, a genetic clustering algorithm is described that uses a new similarity measure based message passing between data points and the candidate centers described by the chromosome. In the new algorithm, a va... 详细信息
来源: 评论
Study on sensor for solution concentration and temperature based on fused tapering optical fiber coupler
Study on sensor for solution concentration and temperature b...
收藏 引用
2012 International Symposium on Photonics and Optoelectronics, SOPO 2012
作者: Lv, Min Ren, Guobin Yang, Xiaoyu Ding, Jianbo Wang, Wenzhong College of Science Minzu University of China Beijing 100081 China Key Lab. of All Optical Network and Advanced Telecommunication Network of EMC Beijing Jiaotong University Beijing 100044 China Institute of Lightwave Technology Beijing Jiaotong University Beijing 100044 China
A simple and high-degree accuracy sensor for solution concentration and temperature based on fused tapering optical fiber coupler is fabricated. The change of refractive index in the evanescent field on the fused regi... 详细信息
来源: 评论
High-definition image processing algorithm and digital platform design
High-definition image processing algorithm and digital platf...
收藏 引用
2012 IEEE 12th International Conference on Computer and Information technology, CIT 2012
作者: Ao, Qian Chen, Rongguan Ning, Ning Sun, Guozhi Zhang, Xiaochen Zheng, Jie Kong, Deyu Computer Network Center Shangrao Normal University Shangrao Jiangxi China State Key Lab. of Electronic Thin Films and Integrated Devices University of Electronic Science and Technology of China Chengdu Sichuan China
The issue designs a high-definition digital processing platform, present algorithms of image sensor decoding and image enhancement pre-processing and its implementation. Firstly, the framework of the high-definition d... 详细信息
来源: 评论
Distributed redundancy strategy in P2P environment
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第3期6卷 148-157页
作者: Yang, Lei Qin, Zhi-Guang Wang, Can Yang, Hao School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province Chengdu 611731 China
P2P storage architecture plays an important role in distributed storage systems. For P2P dynamic environment, the sufficient redundant data must be maintained to ensure the data availability. System will pay various c... 详细信息
来源: 评论
A load-balanced data aggregation scheduling for duty-cycled wireless sensor networks
A load-balanced data aggregation scheduling for duty-cycled ...
收藏 引用
2012 4th IEEE International Conference on Cloud Computing technology and science, CloudCom 2012
作者: Chen, Zhengyu Yang, Geng Chen, Lei Xu, Jian Wang, Haiyong Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts AndTelecommunications Nanjing 210046 China College of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210046 China School of Information Technology Jinling Institute of Technology Nanjing 211169 China
To bridge the gap between limited energy supplies of the sensor nodes and the system lifetime, duty-cycle Wireless Sensor networks (WSNs) with data aggregation are studied in this paper. We proposed a load-balanced an... 详细信息
来源: 评论
Information encryption based on virtual optical imaging system and Chen's chaos
Information encryption based on virtual optical imaging syst...
收藏 引用
2012 International Conference on Web Information Systems and Mining, WISM 2012
作者: Zhu, Wei Yang, Geng Xu, Jian Yang, Xiao-Ling College of Science Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China
A new scheme of information encryption is presented in this paper, which employs Chen's chaos to construct the random mask of the virtual optical imaging system instead of randomly generated by computer. The gener... 详细信息
来源: 评论
The Double-System Architecture for Trusted OS
The Double-System Architecture for Trusted OS
收藏 引用
2012 International Conference on Solid State Devices and Materials science(SSDMS 2012)
作者: Yong Zhao Yu Li Jing Zhan College of Computer Science and Technology Beijing University of Technology Key Lab of Information Network Security Ministry of Public Security
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system(TOS) is proposed to try to solve these problems. Ho... 详细信息
来源: 评论
The Double-System Architecture for Trusted OS
收藏 引用
Physics Procedia 2012年 25卷 2006-2013页
作者: Yong Zhao Yu Li Jing Zhan College of Computer Science and Technology Beijing University of Technology Beijing 100124 China Key Lab of Information Network Security Ministry of Public Security Shanghai 201204 China
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. H... 详细信息
来源: 评论
SECURITY STRUCTURE OF CLOUD STORAGE BASED ON HOMOMORPHIC ENCRYPTION SCHEME
SECURITY STRUCTURE OF CLOUD STORAGE BASED ON HOMOMORPHIC ENC...
收藏 引用
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems
作者: Jian Li Sicong Chen Danjie Song School of Computer Beijing University of Posts and Telecommunications Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China
According to the demerits of the traditional cloud storage that there exists superuser, encryption and decryption would take up many client’s sources, and the retrieval spends much time and is complex, the paper prop... 详细信息
来源: 评论