咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7901 条 记 录,以下是4951-4960 订阅
排序:
Federated learning for task and resource allocation in wireless high altitude balloon networks
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Sihua Chen, Mingzhe Yin, Changchuan Saad, Walid Hong, Choong Seon Cui, Shuguang Vincent Poor, H. Beijing Laboratory of Advanced Information Network Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing100876 China Department of Electrical Engineering Princeton University PrincetonNJ08544 United States Wireless@VT Bradley Department of Electrical and Computer Engineering Virginia Tech BlacksburgVA24060 United States Department of Computer Science and Engineering Kyung Hee University Korea Republic of Chinese University of Hong Kong Shenzhen518172 China Department of Electrical Engineering Princeton University PrincetonNJ08544 United States
In this paper, the problem of minimizing energy and time consumption for task computation and transmission is studied in a mobile edge computing (MEC)-enabled balloon network. In the considered network, each user need... 详细信息
来源: 评论
Design and implementation of augmented reality cloud platform system for 3D entity objects  8
Design and implementation of augmented reality cloud platfor...
收藏 引用
8th International Congress of information and Communication Technology, ICICT 2018
作者: He, Zhimin Peng, Lin Han, Haiyun Xu, Min Wang, Gang Bao, Xingchuan Yu, Hai Hou, Zhansheng Wang, He Zhu, Liang Zhang, Zehao Global Energy Interconnection Research Institute Nanri Road 8 Nanjing210003 China State Grid Key Laboratory of Information and Network Security Beiqijia Beijing100000 China
This project is about design and implementation of Augmented Reality cloud recognition power platform for 3D Entity Objects. Typical power operations include equipment inspection, equipment maintenance, emergency repa... 详细信息
来源: 评论
An Associated Behavior Sequence Based User Authentication Approach in M2M Mobile Terminals
An Associated Behavior Sequence Based User Authentication Ap...
收藏 引用
IEEE Global Communications Conference
作者: Congcong Shi Miao Du Weidong Lu Sanglu Lu State Key Laboratory for Novel Software Technology Nanjing University Nanjing China State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute co. Ltd Beijing China Nanjing University of Posts and Telecommunications Nanjing China
With the rapid development of machine-to-machine (M2M) mobile smart terminals, M2M services can be used in a wide range of industries, including such as telemedicine, remote meter reading and public security. Since di... 详细信息
来源: 评论
A review of uncertainty quantification in deep learning: Techniques, applications and challenges
arXiv
收藏 引用
arXiv 2020年
作者: Abdar, Moloud Pourpanah, Farhad Hussain, Sadiq Rezazadegan, Dana Liu, Li Ghavamzadeh, Mohammad Fieguth, Paul Cao, Xiaochun Khosravi, Abbas Rajendra Acharya, U. Makarenkov, Vladimir Nahavandi, Saeid Deakin University Australia College of Mathematics and Statistics Guangdong Key Lab. of Intelligent Information Processing Shenzhen University Shenzhen518060 China Dibrugarh University Dibrugarh India Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Center for Machine Vision and Signal Analysis University of Oulu Oulu Finland Google research United States Department of Systems Design Engineering University of Waterloo Waterloo Canada State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Department of Electronics and Computer Engineering Ngee Ann Polytechnic Clementi Singapore Department of Computer Science University of Quebec in Montreal MontrealQC Canada
—Uncertainty quantification (UQ) plays a pivotal role in the reduction of uncertainties during both optimization and decision making, applied to solve a variety of real-world applications in science and engineering. ... 详细信息
来源: 评论
The Cognition Is Not Enough:Another Look on Existing Interesting Points Chosen Methods
收藏 引用
Chinese Journal of Electronics 2017年 第2期26卷 416-423页
作者: FAN Guangjun ZHOU Yongbin ZHANG Hailong FENG Dengguo State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of Sciences State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
For classical template attacks,many papers suggested a guideline of choosing interesting points which is still not *** to now,many different methods of choosing interesting points were ***,it is still unclear that whi... 详细信息
来源: 评论
Intelligent recommendation of related items based on naive bayes and collaborative filtering combination model
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1682卷
作者: Wei Wei Zhuo Wang Changlong Fu Robertas Damaševičius Rafal Scherer Marcin Wožniak School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 Shaanxi Key Laboratory for Network Computing and Security Technology China.
Nowadays, data plays a unique role in various fields. Based on the background of the era of big data, this paper collects user evaluations of certain commodities and labels the evaluations into positive emotions and n...
来源: 评论
A novel Image security Protection Method Based on DCT Compression Theory and Hyper-chaotic Mapping
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2066卷
作者: Xianglian Xue Haiyan Jin School of Computer Science and Engineering Xi'an University of Technology Xi'an 710077Shaanxi China Shaanxi University of Chinese Medicine Xianyang712046Shaanxi China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an710077Shaanxi China
This paper studies the current situation of image compression encryption and analyzes the influence of low frequency (DC coefficient) and high frequency (AC coefficient) on image structure in DCT transformation. Based...
来源: 评论
Automatic Text Summarization Based on Transformer and Switchable Normalization
Automatic Text Summarization Based on Transformer and Switch...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Tao Luo Kun Guo Hong Guo College of Mathematics and Computer Sciences Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Key Laboratory of Spatial Data Mining & Information Sharing Ministry of Education Fuzhou University Fuzhou China
With the development of text summarization research, the methods based on RNN with the Encoder-Decoder model gradually become the mainstream. However, RNN tends to forget previous context information and leads to the ... 详细信息
来源: 评论
Survey of recent progress in semantic image segmentation with CNNs
收藏 引用
Science China(information Sciences) 2018年 第5期61卷 107-124页
作者: Qichuan GENG Zhong ZHOU Xiaochun CAO State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
In recent years, convolutional neural networks(CNNs) are leading the way in many computer vision tasks, such as image classification, object detection, and face recognition. In order to produce more refined semantic i... 详细信息
来源: 评论
Discussion and testing of 802.11ah wireless communication in intelligent substation  2
Discussion and testing of 802.11ah wireless communication in...
收藏 引用
2nd IEEE International Conference on Energy Internet, ICEI 2018
作者: Zheng, Zhe Qiao, Lei Wang, Liang Cui, Wenpeng Guo, Jinghong Research Department of Smart Chip Global Energy Interconnection Research Institute Co. Ltd Beijing China State Grid Key Laboratory of Information and Network Security State Grid Laboratory of Electric Power Communication Network Technology Beijing China
In response to the application and requirements of all things seamless interconnection, International Institute of Electrical and Electronics Engineers (IEEE) has put forward a new generation of standard 802.11 ah, wo... 详细信息
来源: 评论