咨询与建议

限定检索结果

文献类型

  • 104 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 101 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 10 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 57 篇 理学
    • 41 篇 数学
    • 12 篇 物理学
    • 7 篇 生物学
    • 6 篇 统计学(可授理学、...
  • 38 篇 管理学
    • 22 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 8 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学

主题

  • 9 篇 cryptography
  • 8 篇 privacy
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 image segmentati...
  • 3 篇 optimization
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 malware
  • 3 篇 federated learni...
  • 3 篇 cloud computing

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 college of infor...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 yu zhang

语言

  • 149 篇 英文
  • 12 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Computer Network and Information Integration"
171 条 记 录,以下是111-120 订阅
排序:
AUV dead-reckoning navigation based on neural network using a single accelerometer  11
AUV dead-reckoning navigation based on neural network using ...
收藏 引用
11th ACM International Conference on Underwater networks and Systems, WUWNet 2016
作者: Xie, Yan-Xin Liu, Jun Hu, Cheng-Quan Cui, Jun-Hong Xu, Hongli State Key Laboratory of Robotics CAS No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University Changchun China Underwater Sensor Network Lab. University of Connecticut StorrsCT06269 United States Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China
The accuracy of the Autonomous Underwater Vehicles (AUVs) navigation system determines whether they can safely operate and return. Traditional Dead-reckoning (DR) relies on the inertial sensors such as gyroscope and a... 详细信息
来源: 评论
A delay guaranteed and services differentiated MAC protocol based on location and reservation in near-space
收藏 引用
Journal of Convergence information Technology 2011年 第2期6卷 120-130页
作者: Chen, Chen Gao, Xinbo Pei, Qingqi National Key Lab. of Integrated Service Networks Xidian Univ Xi'an 710071 China School of Electronic Engineering Xidian Univ Xi'an 710071 China Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian Univ Xi'an 710071 China
With an ever-increasing interests and demands in Near-Space, more and more researchers have put their attentions on this field, leading to an emerging needs for modeling the 20-100km altitude space especially for broa... 详细信息
来源: 评论
Gradient sparsification for efficient wireless federated learning with differential privacy
收藏 引用
Science China(information Sciences) 2024年 第4期67卷 272-288页
作者: Kang WEI Jun LI Chuan MA Ming DING Feng SHU Haitao ZHAO Wen CHEN Hongbo ZHU School of Electronic and Optical Engineering Nanjing University of Science and Technology Zhejiang Lab Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of Education Data61 Commonwealth Scientific and Industrial Research Organisation School of Information and Communication Engineering Hainan University School of Communications and Information Engineering Nanjing University of Posts and Telecommunications School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University
Federated learning(FL) enables distributed clients to collab.ratively train a machine learning model without sharing raw data with each other. However, it suffers from the leakage of private information from uploading... 详细信息
来源: 评论
Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
Improvement on Ahn et al.'s RSA P-homomorphic signature sche...
收藏 引用
8th International ICST Conference on Security and Privacy in Communication networks, SecureComm 2012
作者: Wang, Zhiwei College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100190 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m... 详细信息
来源: 评论
Graphic-based theory proof of compliance algorithm
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第21期32卷 175-176页
作者: Rao, Yixuan Yang, Bo Key Lab. of Computer Network and Information Security Xi'an 710071 China
The paper puts forward a new proof of compliance algorithm in PolicyMaker, the algorithm applies graphic theory's DFS notion and the dynamic character, in the face of withdrawing the delegation, deletes the delega... 详细信息
来源: 评论
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage  29
A Lightening Fine-grained Access Control Scheme Supporting F...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Shi, Jiaoli Hu, Chao Yao, Shimao Mei, Zhuolin Wu, Bin Li, Hui Jiujiang Univ. School of Computer and Big Data Jiujiang China Jiangxi Univ. of Finance and Economics School of Software IoT Engineering Nanchang China Jiujiang Key Lab. of Network and Information Security Jiujiang China Jiujiang University School of Computer and Big Data Jiujiang China Peking University School of Elec. and Comp. Engineering Shenzhen China
Efficiency, security, and flexibility are difficult to balance in a full policy hiding CP-ABE scheme. This paper creatively converts the privacy matching problem of access policy and a user's private key to the pr... 详细信息
来源: 评论
A Control Task Assignment Algorithm based on sub-graph isomorphism
A Control Task Assignment Algorithm based on sub-graph isomo...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Feng Yu Xixian Li Huimin Zhang Li-e Wang College of computer science Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
To enhance the controllab.lity and trustworthiness of the Internet, a new network control architecture has been presented with control task extracted to the intra-domain control node and executed in distributed multi-... 详细信息
来源: 评论
Collosion detection research based on capsule bounding volume
收藏 引用
Journal of Computational information Systems 2014年 第7期10卷 2743-2750页
作者: Kong, Dehan Liu, Yongshan Cui, Na Department of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China The Data Industry Research Lab. Qinhuangdao 066004 China
A collision detection algorithm based on capsule bounding volume (CBV for short) is presented improve the efficiency of Collision detection in three-dimensional scene. This algorithm use CBV to encircle roles and achi... 详细信息
来源: 评论
Secure Data Propagation in Edge-Cloud Orchestrated Computing Paradigms: Statistcs and Taxonomy
Secure Data Propagation in Edge-Cloud Orchestrated Computing...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Feng Yu Xixian Li Huimin Zhang Li-e Wang College of computer science Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Guangxi Key Lab of Multi-source Information Mining &Security Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
Despite the importance of the secure data propagation in the edge-cloud orchestrated computing paradigms, to the best of our knowledge, there is lack of systematic and comprehensive review on this research topic. The ... 详细信息
来源: 评论
Random Access for a Cognitive Radio Transmitter with RF Energy Harvesting
Random Access for a Cognitive Radio Transmitter with RF Ener...
收藏 引用
IEEE Global Communications Conference
作者: Yue Lu Wei Wang Zhaoyang Zhang Aiping Huang Vincent K. N. Lau Dept. of Information Science and Electronic Engineering Zhejiang Key Lab. of Information Network Technology Zhejiang University Dept. of Electronic and Computer Engineering Hong Kong University of Science and Technology
In this paper, we investigate the random access for an energy harvesting secondary user (SU) in a cognitive radio system, in which the SU harvests energy from radio frequency (RF) radiation of the primary user (PU). W... 详细信息
来源: 评论