咨询与建议

限定检索结果

文献类型

  • 1,509 篇 期刊文献
  • 1,284 篇 会议
  • 1 册 图书

馆藏范围

  • 2,794 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,910 篇 工学
    • 1,331 篇 计算机科学与技术...
    • 1,124 篇 软件工程
    • 452 篇 信息与通信工程
    • 220 篇 生物工程
    • 204 篇 电气工程
    • 196 篇 控制科学与工程
    • 168 篇 电子科学与技术(可...
    • 141 篇 光学工程
    • 106 篇 生物医学工程(可授...
    • 103 篇 机械工程
    • 100 篇 化学工程与技术
    • 80 篇 网络空间安全
    • 73 篇 仪器科学与技术
    • 55 篇 交通运输工程
    • 53 篇 安全科学与工程
    • 52 篇 动力工程及工程热...
    • 46 篇 材料科学与工程(可...
    • 45 篇 土木工程
  • 1,011 篇 理学
    • 497 篇 数学
    • 276 篇 物理学
    • 253 篇 生物学
    • 174 篇 统计学(可授理学、...
    • 91 篇 化学
    • 74 篇 系统科学
  • 518 篇 管理学
    • 276 篇 图书情报与档案管...
    • 252 篇 管理科学与工程(可...
    • 92 篇 工商管理
  • 105 篇 医学
    • 84 篇 临床医学
    • 62 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 16 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 110 篇 semantics
  • 75 篇 feature extracti...
  • 65 篇 deep learning
  • 61 篇 training
  • 54 篇 accuracy
  • 41 篇 computational mo...
  • 40 篇 machine learning
  • 39 篇 federated learni...
  • 34 篇 object detection
  • 34 篇 graph neural net...
  • 33 篇 data mining
  • 32 篇 image segmentati...
  • 31 篇 privacy
  • 30 篇 optimization
  • 27 篇 forecasting
  • 27 篇 data models
  • 26 篇 generative adver...
  • 26 篇 neural networks
  • 25 篇 knowledge graph
  • 24 篇 reinforcement le...

机构

  • 160 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 62 篇 cas key laborato...
  • 60 篇 key laboratory o...
  • 48 篇 network and data...
  • 47 篇 college of compu...
  • 46 篇 shandong enginee...
  • 46 篇 school of comput...
  • 46 篇 tianjin key labo...
  • 35 篇 zhejiang lab
  • 34 篇 college of cyber...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 31 篇 school of cyber ...
  • 28 篇 key lab of infor...
  • 28 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 25 篇 national enginee...
  • 25 篇 cas key lab of n...

作者

  • 185 篇 cheng xueqi
  • 142 篇 guo jiafeng
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 43 篇 fan yixing
  • 42 篇 zhang ruqing
  • 34 篇 jin xiaolong
  • 28 篇 pang liang
  • 26 篇 liu jun
  • 25 篇 meng deyu
  • 24 篇 jin hai
  • 23 篇 bi keping
  • 21 篇 chen enhong
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 19 篇 de rijke maarten
  • 19 篇 chen yanping
  • 19 篇 xu jun
  • 18 篇 li tao
  • 18 篇 pan jeng-shyang

语言

  • 2,606 篇 英文
  • 147 篇 其他
  • 42 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2794 条 记 录,以下是2651-2660 订阅
排序:
Potential field based routing to support QoS in WSN
收藏 引用
Journal of Computational Information Systems 2012年 第6期8卷 2375-2385页
作者: Liang, Qingwei Yao, Daoyuan Deng, Sui Gong, Siliang Zhu, Jian Key Lab. of Wireless Sensor Network and Communications Shanghai Institute of Microsystem and Information Technology Chinese Academy of Science Shanghai 200050 China Wuxi SensingNet Industrialization Research Institute Wuxi 214135 China
To design a routing protocol that saves sensor node energy while meeting the needs of different applications has become a research focus in wireless sensor network. In this paper, we propose Delay-Guaranteed Energy-Ef... 详细信息
来源: 评论
SAR RANGE AMBIGUITY SUPPRESSION VIA SPARSE REGULARIZATION
SAR RANGE AMBIGUITY SUPPRESSION VIA SPARSE REGULARIZATION
收藏 引用
IEEE International Geoscience and Remote Sensing Symposium
作者: Jian Fang Zongben Xu Chenglong Jiang Bingchen Zhang Wen Hong Ministry of Education Key Lab for Intelligent Networks and Network Security & Xi'an Jiaotong University Science and Technology on Microwave Imaging Laboratory & Institute of Electronics Chinese Academy of Sciences (IECAS)
Range ambiguity in synthetic aperture radar (SAR) imaging primarily arises from scattered energy of bright targets out-side the interested region. So to reduce the ambiguity, we need to identify these targets addition... 详细信息
来源: 评论
Relay power allocation in auction-based game approach
Relay power allocation in auction-based game approach
收藏 引用
IEEE Global Communications Conference
作者: Dan Wu Yueming Cai Zhou, Liang Rodrigues, Joel Institute of Communications Engineering PLA University of Science and Technology The Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Ministry of Education Institute de Telecomunicacoes University of Beira Interior
In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At fir... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed Computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
miRDeathDB:a database bridging microRNAs and the programmed cell death
miRDeathDB:a database bridging microRNAs and the programmed ...
收藏 引用
第五届全国生物信息学与系统生物学学术大会暨国际生物信息学前沿研讨会高通量时代的生物信息学与系统生物学
作者: Jianzhen Xu Yan-Hui Li College of Bioengineering Henan University of TechnologyZhengzhouChina 450001 Institute of Cardiovascular Sciences and Key Laboratory of Molecular Cardiovascular Sciences Ministry of EducationPeking University Health Science Center Scientific Data Center Computer Network Information CenterChinese Academy of Sciences
Background:MicroRNAs(miRNAs) are a class of small non-coding RNAs,which negatively regulate protein coding genes at the posttranscriptional *** tiny regulators have been associated to almost all known physiological an... 详细信息
来源: 评论
Numen: network risk evaluation based on naïve bayes-based attack tree
收藏 引用
International Journal of Advancements in Computing technology 2012年 第21期4卷 466-472页
作者: Wang, Hongbing Jing, Qi Liu, Heng Wang, Zhao Cheng, Li National Computer network Emergency Response technical Team Coordination Center of China Beijing China School of Software and Microelectronics Peking University Beijing China Institute Of Computing Technology Chinese Academy Of Sciences Beijing China School of Electronics Engineering and Computer Science Peking University Beijing China Key Lab of NSSA MoE China
Attack Tree has been widely used in network risk evaluation. However, in most situations attack trees can only describe the network risk in a visualized way and without any analysis of risk probabilities. This paper p... 详细信息
来源: 评论
miRDeathDB: a database bridging microRNAs and the programmed cell death
miRDeathDB: a database bridging microRNAs and the programmed...
收藏 引用
第五届全国生物信息学与系统生物学学术大会
作者: Jianzhen Xu Yan-Hui Li College of Bioengineering Henan University of Technology Zhengzhou China 450001 Institute of Cardiovascular Sciences and Key Laboratory of Molecular Cardiovascular Sciences Ministry of Education Peking University Health Science Center 38 Xueyuan Road Haidian District Beijing China 100191 Scientific Data Center Computer Network Information Center Chinese Academy of SciencesBeijing China 100190
Background: MicroRNAs (miRNAs) are a class of small non-coding RNAs, which negatively regulate protein coding genes at the posttranscriptional *** tiny regulators have been associated to almost all known physiological... 详细信息
来源: 评论
Query-aware anonymization in location-based service
Query-aware anonymization in location-based service
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Li, Wei Li, Guangye Liu, Chunlei Key Lab. of Beijing Network Technology School of Computer Science and Technology Beihang University Beijing China
Query privacy protection is an important part of the privacy protection in LBS. Currently, query privacy protection mainly consider the two typical attack models: query sampling attack and query homogeneity attack. Th... 详细信息
来源: 评论
Improved quantum "Ping-pong" protocol based on GHZ state and classical XOR operation
收藏 引用
science China(Physics,Mechanics & Astronomy) 2011年 第9期54卷 1612-1618页
作者: LI Jian JIN HaiFei JING Bo State Key Lab of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science Beijing Institute of Applied Meteorology Beijing 100029 China
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 200... 详细信息
来源: 评论
Quantum Secure Direct Communication with Five-Qubit Entangled State
收藏 引用
Chinese Physics Letters 2011年 第3期28卷 17-20页
作者: LIN Song GAO Fei LIU Xiao-Fen School of Mathematics and Computer Science Fujian Normal UniversityFuzhou 350007 Key Lab of Network Security and Cryptography Fujian Normal UniversityFuzhou 350007 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[***.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state *** we build a quantum... 详细信息
来源: 评论