咨询与建议

限定检索结果

文献类型

  • 1,520 篇 期刊文献
  • 1,296 篇 会议
  • 1 册 图书

馆藏范围

  • 2,817 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,914 篇 工学
    • 1,331 篇 计算机科学与技术...
    • 1,123 篇 软件工程
    • 452 篇 信息与通信工程
    • 220 篇 生物工程
    • 206 篇 电气工程
    • 195 篇 控制科学与工程
    • 169 篇 电子科学与技术(可...
    • 142 篇 光学工程
    • 107 篇 生物医学工程(可授...
    • 103 篇 机械工程
    • 100 篇 化学工程与技术
    • 80 篇 网络空间安全
    • 74 篇 仪器科学与技术
    • 55 篇 交通运输工程
    • 53 篇 动力工程及工程热...
    • 53 篇 安全科学与工程
    • 46 篇 材料科学与工程(可...
    • 45 篇 土木工程
  • 1,012 篇 理学
    • 497 篇 数学
    • 276 篇 物理学
    • 253 篇 生物学
    • 174 篇 统计学(可授理学、...
    • 91 篇 化学
    • 75 篇 系统科学
  • 517 篇 管理学
    • 276 篇 图书情报与档案管...
    • 251 篇 管理科学与工程(可...
    • 92 篇 工商管理
  • 105 篇 医学
    • 84 篇 临床医学
    • 62 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 16 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 110 篇 semantics
  • 75 篇 feature extracti...
  • 66 篇 deep learning
  • 62 篇 training
  • 54 篇 accuracy
  • 41 篇 computational mo...
  • 40 篇 machine learning
  • 39 篇 federated learni...
  • 34 篇 object detection
  • 34 篇 graph neural net...
  • 33 篇 data mining
  • 32 篇 image segmentati...
  • 31 篇 optimization
  • 31 篇 privacy
  • 27 篇 forecasting
  • 27 篇 data models
  • 26 篇 generative adver...
  • 26 篇 neural networks
  • 25 篇 knowledge graph
  • 25 篇 visualization

机构

  • 160 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 62 篇 cas key laborato...
  • 60 篇 key laboratory o...
  • 48 篇 network and data...
  • 47 篇 college of compu...
  • 47 篇 school of comput...
  • 46 篇 shandong enginee...
  • 45 篇 tianjin key labo...
  • 36 篇 zhejiang lab
  • 34 篇 college of cyber...
  • 33 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 29 篇 peng cheng labor...
  • 28 篇 key lab of infor...
  • 26 篇 hubei key labora...
  • 25 篇 national enginee...
  • 25 篇 shaanxi key labo...

作者

  • 185 篇 cheng xueqi
  • 141 篇 guo jiafeng
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 43 篇 fan yixing
  • 42 篇 zhang ruqing
  • 33 篇 jin xiaolong
  • 28 篇 pang liang
  • 26 篇 liu jun
  • 25 篇 meng deyu
  • 24 篇 jin hai
  • 23 篇 bi keping
  • 21 篇 chen enhong
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 20 篇 xueqi cheng
  • 19 篇 de rijke maarten
  • 19 篇 chen yanping
  • 19 篇 xu jun
  • 18 篇 li tao

语言

  • 2,629 篇 英文
  • 147 篇 其他
  • 42 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2817 条 记 录,以下是2651-2660 订阅
排序:
A SIMPLE FULLY HOMOMORPHIC ENCRYPTION SCHEME AVAIlabLE IN CLOUD COMPUTING
A SIMPLE FULLY HOMOMORPHIC ENCRYPTION SCHEME AVAILABLE IN CL...
收藏 引用
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems
作者: Jian Li Danjie Song Sicong Chen Xiaofeng Lu School of Computer Beijing University of Posts and Telecommunications Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China
With continuous expansion of cloud computing, problems of third-party data security become increasingly prominent. However, effective retrieval of encrypted data and other operations are difficult to achieve by tradit... 详细信息
来源: 评论
An efficient two-stage level set segmentation framework for overlapping plant leaf image
An efficient two-stage level set segmentation framework for ...
收藏 引用
8th International Conference on Intelligent Computing technology, ICIC 2012
作者: Wang, Xiao-Feng Min, Hai Key Lab. of Network and Intelligent Information Processing Department of Computer Science and Technology Hefei University Hefei Anhui 230022 China Intelligent Computing Lab. Hefei Institute of Intelligent Machines Chinese Academy of Sciences P.O.Box 1130 Hefei Anhui 230031 China Department of Automation University of Science and Technology of China Hefei Anhui 230027 China
In this paper, an efficient two-stage segmentation framework was proposed to address the plant leaf image with overlapping phenomenon, which is built based on the leaf approximate symmetry and level set evolution theo... 详细信息
来源: 评论
A dynamic programming algorithm for QoS-aware replica placement in distributed caching systems
收藏 引用
Journal of Convergence Information technology 2012年 第12期7卷 226-234页
作者: Wang, Biyao Wang, Jinlin Liu, Xue The Key Lab of Network Communication System and Control The Chinese Academy of Sciences The Key Lab of Network Communication System and Control Anhui Department of Automation University of Science and Technology China National Network New Media Engineering Research Center Institute of Acoustics Chinese Academy of Sciences China
The rapid growth of new information services, especially like new media services, providing content distribution to clients with good quality of service(QoS) while retaining efficient is a great challenge. This paper ... 详细信息
来源: 评论
On the resistance of Boolean functions against fast algebraic attacks
On the resistance of Boolean functions against fast algebrai...
收藏 引用
14th International Conference on Information Security and Cryptology, ICISC 2011
作者: Du, Yusong Zhang, Fangguo Liu, Meicheng School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China Key Lab. of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
Boolean functions with large algebraic immunity resist algebraic attacks to a certain degree, but they may not resist fast algebraic attacks (FAA's). It is necessary to study the resistance of Boolean functions ag... 详细信息
来源: 评论
Fully secure unidirectional identity-based proxy re-encryption
Fully secure unidirectional identity-based proxy re-encrypti...
收藏 引用
14th International Conference on Information Security and Cryptology, ICISC 2011
作者: Luo, Song Shen, Qingni Chen, Zhong College of Computer Science and Engineering Chongqing University of Technology Chongqing China School of Software and Microelectronics MoE Key Lab. of Network and Software Assurance Peking University Beijing China Institute of Software School of Electronics Engineering and Computer Science Peking University China Ministry of Education China
Proxy re-encryption (PRE) allows the proxy to translate a ciphertext encrypted under Alice's public key into another ciphertext that can be decrypted by Bob's secret key. Identity-based proxy re-encryption (IB... 详细信息
来源: 评论
Alliance-Authentication Protocol in Clouds Computing Environment
收藏 引用
China Communications 2012年 第7期9卷 42-54页
作者: Zhang Qikun Li Yuanzhang Song Danjie Tan Yuan School of Computer Science and Technology Beijing Institute of Technology Beijing 100081 P. R. China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology ofChina Chengdu 610054 P. R. China School of Computer Beijing University of Posts and Telecommunications Beijing 100876 P. R. China
Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or p... 详细信息
来源: 评论
A node similarity based trust transmission method
收藏 引用
2nd World Congress on Computer science and Information Engineering, CSIE 2011
作者: Wang, Haiyan Wang, Ying Yue, Xiwen College of Computer Science Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 Jiangsu China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing 210003 Jiangsu China
A novel trust transmission method which is based on the similarities of nodes in trust models is proposed in this paper. Trust transmission is evaluated by calculating the similarity between recommenders when trustor ... 详细信息
来源: 评论
Research on Separation of Three Powers Architecture for Trusted OS
收藏 引用
Physics Procedia 2012年 25卷 1168-1175页
作者: Yu Li Yong Zhao Siyuan Xin College of Computer Science and Technology Beijing University of Technology Beijing 100124 China Key Lab of Information Network Security Ministry of Public Security Shanghai 201204 China Institute of Electronic Technology the PLA Information Engineering University
The privilege in the operating system (OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control,... 详细信息
来源: 评论
WSSecTool: A web service security analysis tool based on program slicing
WSSecTool: A web service security analysis tool based on pro...
收藏 引用
2012 IEEE 8th World Congress on Services, SERVICES 2012
作者: Fu, Wei Zhang, Yingzhou Zhu, Xianting Qian, Junyan College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China Dept. of Computer Science and Technology Guilin Univ. of Electronic Technology Guilin 541004 China
With the development of web service, more and more attention has been drawn to web service in recent years. However, the damage caused by service security problems is becoming more and more serious nowadays. This pape... 详细信息
来源: 评论
Research on Separation of Three Powers Architecture for Trusted OS
Research on Separation of Three Powers Architecture for Trus...
收藏 引用
2012 International Conference on Solid State Devices and Materials science(SSDMS 2012)
作者: Yu Li Yong Zhao Siyuan Xin College of Computer Science and Technology Beijing University of Technology Key Lab of Information Network Security Ministry of Public Security Institute of Electronic Technology the PLA Information Engineering University
The privilege in the operating system(OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control, ... 详细信息
来源: 评论