咨询与建议

限定检索结果

文献类型

  • 486 篇 期刊文献
  • 425 篇 会议
  • 1 册 图书

馆藏范围

  • 912 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 660 篇 工学
    • 425 篇 计算机科学与技术...
    • 348 篇 软件工程
    • 162 篇 信息与通信工程
    • 75 篇 电子科学与技术(可...
    • 74 篇 生物工程
    • 65 篇 控制科学与工程
    • 54 篇 光学工程
    • 53 篇 电气工程
    • 41 篇 机械工程
    • 30 篇 网络空间安全
    • 28 篇 仪器科学与技术
    • 27 篇 生物医学工程(可授...
    • 23 篇 化学工程与技术
    • 20 篇 安全科学与工程
    • 19 篇 动力工程及工程热...
    • 19 篇 交通运输工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 航空宇航科学与技...
  • 366 篇 理学
    • 182 篇 数学
    • 120 篇 物理学
    • 83 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 25 篇 化学
  • 181 篇 管理学
    • 99 篇 图书情报与档案管...
    • 80 篇 管理科学与工程(可...
    • 30 篇 工商管理
  • 34 篇 医学
    • 26 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 19 篇 法学
    • 14 篇 社会学
  • 12 篇 经济学
  • 9 篇 军事学
  • 6 篇 农学
  • 4 篇 文学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 28 篇 semantics
  • 27 篇 deep learning
  • 15 篇 wireless sensor ...
  • 13 篇 feature extracti...
  • 12 篇 information retr...
  • 12 篇 training
  • 11 篇 authentication
  • 10 篇 reinforcement le...
  • 10 篇 throughput
  • 10 篇 image segmentati...
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 machine learning
  • 10 篇 federated learni...
  • 10 篇 privacy
  • 9 篇 wireless communi...
  • 9 篇 security
  • 9 篇 network security
  • 8 篇 learning systems
  • 8 篇 big data

机构

  • 90 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 29 篇 key lab of infor...
  • 27 篇 cas key lab of n...
  • 21 篇 cas key lab of n...
  • 21 篇 beijing electron...
  • 20 篇 university of am...
  • 19 篇 key lab of broad...
  • 18 篇 institute of qua...
  • 18 篇 state informatio...
  • 13 篇 zhejiang lab
  • 11 篇 key lab of broad...
  • 11 篇 key lab of broad...
  • 10 篇 moe key lab for ...
  • 9 篇 faculty of educa...
  • 9 篇 shonan institute...
  • 9 篇 faculty of engin...
  • 9 篇 faculty of syste...
  • 9 篇 center of space ...
  • 9 篇 department of ph...

作者

  • 114 篇 guo jiafeng
  • 108 篇 cheng xueqi
  • 51 篇 zhang ruqing
  • 50 篇 fan yixing
  • 41 篇 lan yanyan
  • 26 篇 pang liang
  • 26 篇 meng deyu
  • 21 篇 bi keping
  • 19 篇 de rijke maarten
  • 16 篇 shen huawei
  • 16 篇 xu jun
  • 13 篇 cao xiangyong
  • 13 篇 wang zhiqiang
  • 13 篇 zheng qinghua
  • 13 篇 chen wei
  • 13 篇 sun xiaoming
  • 11 篇 yang tao
  • 10 篇 tao yang
  • 9 篇 feng c.f.
  • 9 篇 wang h.

语言

  • 848 篇 英文
  • 45 篇 其他
  • 19 篇 中文
检索条件"机构=Key Lab of Network Science and Technology"
912 条 记 录,以下是121-130 订阅
排序:
New results on quantum boomerang attacks
收藏 引用
Quantum Information Processing 2023年 第4期22卷 1-27页
作者: Zou, Hongkai Zou, Jian Luo, Yiyuan College of Computer and Data Science Fuzhou University Fuzhou China Key Lab of Information Security of Network Systems Fuzhou University Fuzhou China School of Information Sciences and Technology Huizhou University Huizhou China
At SAC 2021, Frixons et al. proposed quantum boomerang attacks that can effectively recover the keys of block ciphers in the quantum setting. Based on their work, we further consider how to quantize the generic boomer... 详细信息
来源: 评论
RETRACTED ARTICLE: A method to device flow hash algorithm based traffic character
RETRACTED ARTICLE: A method to device flow hash algorithm ba...
收藏 引用
2008 11th IEEE International Conference on Communication technology, ICCT 2008
作者: Cheng, Guang Gong, Jian College of Computer Science and Engineering Southeast University Key Lab. of the Computer Network Technology Jiangsu Province Nanjing 210096 China
Flow sampling algorithms and data streaming algorithms have widely adopted the hashing algorithms to detect flow information at the high-speed links for the applications of the flow distribution, the number of flow, t... 详细信息
来源: 评论
Effect of computational delay on the convergence property of digital optical burst-mode receivers with parallel and pipelined design
Effect of computational delay on the convergence property of...
收藏 引用
Asia Communications and Photonics Conference, ACPC 2014
作者: Liu, Xinyu Xu, Bo Wu, Chenyu Key lab of optical fiber sensing and communication network Ministry of Education University of Electronic Science and Technology of China Chengdu611731 China
Parallel digital signal processing (DSP) with pipelined structure is proposed for 112 Gb/s optical burst-mode receiver (BMR). The effect of computational delay on the convergence speed of the equalizer and the overall... 详细信息
来源: 评论
Evaluating natural language generation via unbalanced optimal transport  29
Evaluating natural language generation via unbalanced optima...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Chen, Yimeng Lan, Yanyan Xiong, Ruibin Pang, Liang Ma, Zhiming Cheng, Xueqi University of Chinese Academy of Sciences China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology CAS China Academy of Mathematics and Systems Science CAS China
Embedding-based evaluation measures have shown promising improvements on the correlation with human judgments in natural language generation. In these measures, various intrinsic metrics are used in the computation, i... 详细信息
来源: 评论
DBPD: A dynamic birthmark-based software plagiarism detection tool  26
DBPD: A dynamic birthmark-based software plagiarism detectio...
收藏 引用
26th International Conference on Software Engineering and Knowledge Engineering, SEKE 2014
作者: Tian, Zhenzhou Zheng, Qinghua Fan, Ming Zhuang, Eryue Wang, Haijun Liu, Ting Ministry of Education Key Lab For Intelligent Networks and Network Security Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China
With the burst of open source software, software plagiarism has been a serious threat to the software industry. In this paper, we present the demo tool DBPD: Dynamic Birthmark-based Software Plagiarism Detection. Majo... 详细信息
来源: 评论
Polarization-dependent loss monitoring in stokes space in a digital coherent optical receiver
Polarization-dependent loss monitoring in stokes space in a ...
收藏 引用
Asia Communications and Photonics Conference, ACP 2013
作者: Yu, Zhenming Yi, Xingwen Deng, Mingliang Chen, Xuemei Qiu, Kun Key Lab of Optical Fiber Sensing and Communication Network Ministry of Education University of Electronic Science and Technology of China Chengdu 611731 China
We propose a novel and simple method that estimates polarization-dependent loss (PDL) in Stokes space in a digital coherent optical receiver. It is applicative to all single carrier and OFDM systems. © OSA 2013.
来源: 评论
Controlling Risk of Retrieval-augmented Generation: A Counterfactual Prompting Framework
Controlling Risk of Retrieval-augmented Generation: A Counte...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Chen, Lu Zhang, Ruqing Guo, Jiafeng Fan, Yixing Cheng, Xueqi CAS Key Lab of Network Data Science and Technology ICT CAS Beijing China University of Chinese Academy of Sciences Beijing China
Retrieval-augmented generation (RAG) has emerged as a popular solution to mitigate the hallucination issues of large language models. However, existing studies on RAG seldom address the issue of predictive uncertainty... 详细信息
来源: 评论
An immune danger theory inspired model for network security monitoring
An immune danger theory inspired model for network security ...
收藏 引用
2010 International Conference on Challenges in Environmental science and Computer Engineering, CESCE 2010
作者: Sun, Feixian Han, Xinchao Wang, Jianhong School of Computer Science Zhongyuan University of Technology Zhengzhou China Zhengzhou Key Lab of Computer Network Security Assessment Zhengzhou China
In order to overcome the deficiencies of the traditional Artificial Immune Systems (AIS) in the security field of computer information system, an immune danger theory inspired model for network security monitoring is ... 详细信息
来源: 评论
A Deep Exploration of BitLocker Encryption and Security Analysis  20
A Deep Exploration of BitLocker Encryption and Security Anal...
收藏 引用
20th IEEE International Conference on Communication technology, ICCT 2020
作者: Tan, Cheng Zhang, Lijun Bao, Liang Science and Technology on Communication Security Laboratory Chengdu China Security Ministry of Public Security Key Lab of Information Network Shanghai China
Due to the popularity of Windows system, BitLocker is widely used as a built-in disk encryption tool. As a commercial application, the design of BitLocker has to consider a capability of disaster recovery, which helps... 详细信息
来源: 评论
A Method for Improving CNN-Based Image Recognition Using DCGAN
收藏 引用
Computers, Materials & Continua 2018年 第10期57卷 167-178页
作者: Wei Fang Feihong Zhang Victor S.Sheng Yewen Ding School of Computer&Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science&TechnologyNanjing210044China State Key Lab.for Novel Software Technology Nanjing UniversityNanjing210023China Computer Science Department University of Central ArkansasConway AR72035USA
Image recognition has always been a hot research topic in the scientific community and *** emergence of convolutional neural networks(CNN)has made this technology turned into research focus on the field of computer vi... 详细信息
来源: 评论