咨询与建议

限定检索结果

文献类型

  • 4,446 篇 会议
  • 3,346 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,800 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,222 篇 工学
    • 3,921 篇 计算机科学与技术...
    • 3,127 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 652 篇 电气工程
    • 539 篇 控制科学与工程
    • 522 篇 电子科学与技术(可...
    • 441 篇 网络空间安全
    • 439 篇 生物工程
    • 299 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 149 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,280 篇 理学
    • 1,359 篇 数学
    • 498 篇 物理学
    • 476 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,324 篇 管理学
    • 807 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 228 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 151 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 175 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 111 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 65 篇 university of ch...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 65 篇 guangdong provin...
  • 64 篇 computer network...
  • 61 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 25 篇 xu li
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,190 篇 英文
  • 348 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7800 条 记 录,以下是4961-4970 订阅
排序:
Channel Estimation and Throughput Evaluation for 5G Wireless Communication Systems in Various Scenarios on High Speed Railways
收藏 引用
China Communications 2018年 第4期15卷 86-97页
作者: yanrong zhao xiyu wang gongpu wang ruisi he yulong zou zhuyan zhao school of computer and information technology beijing jiaotong universityBeijing 100044China the state key laboratory of rail traffic control and safety beijing jiaotong universityBeijing 100044China the key laboratory of broadband wireless communication and sensor network technology of ministry of education nanjing university of posts and telecommunicationsNanjing 210003China nokia bell labs beijing Beijing 100044China
The fifth generation (5G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways (HSR) are important applications of 5G technologies. Existing stud- ies ... 详细信息
来源: 评论
Visual Tracking Algorithm Based on Color Name Histogram
Visual Tracking Algorithm Based on Color Name Histogram
收藏 引用
作者: Chenchen Yue Wangsheng Yu Zhiqiang Hou Sugang Ma College of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Information and Navigation Institute of Air Force Engineering University
Aimed at the problem that traditional histogram is sensitive to illumination changes in visual tracking,combined with the CN(Color Name) feature,we proposed a new feature(denotes CNH,Color Name Histogram) based on col... 详细信息
来源: 评论
Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning
Beyond Inferring Class Representatives: User-Level Privacy L...
收藏 引用
IEEE Conference on computer Communications
作者: Zhibo Wang Mengkai Song Zhifei Zhang Yang Song Qian Wang Hairong Qi Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University P. R. China Deptment of Electrical Engineering and Computer Science University of Tennessee Knoxville USA
Federated learning, i.e., a mobile edge computing framework for deep learning, is a recent advance in privacy-preserving machine learning, where the model is trained in a decentralized manner by the clients, i.e., dat... 详细信息
来源: 评论
Superpixel segmentation based on spatially constrained subspace clustering
arXiv
收藏 引用
arXiv 2020年
作者: Li, Hua Jia, Yuheng Cong, Runmin Wu, Wenhui Kwong, Sam Chen, Chuanbo School of Software Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science City University of Hong Kong Kowloon Hong Kong School of Computer Science and Engineering Southeast University Nanjing211189 China Institute of Information Science Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing Jiaotong University Beijing100044 China College of Electronics and Information Engineering Shenzhen University Shenzhen518060 China Department of Computer Science City University of Hong Kong Kowloon Hong Kong City University of Hong Kong Shenzhen Research Institute Shenzhen518057 China School of Software Engineering Huazhong University of Science and Technology Wuhan430074 China
Superpixel segmentation aims at dividing the input image into some representative regions containing pixels with similar and consistent intrinsic properties, without any prior knowledge about the shape and size of eac... 详细信息
来源: 评论
Direct constructions and proofs for CCA secure(LR)IBE with dual system encryption
收藏 引用
Science China(information Sciences) 2017年 第11期60卷 306-308页
作者: Yi ZHAO Bo YANG School of Computer Science Shaanxi Normal University State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
Dear editor,In the past decade,the development of identitybased cryptography has been highly *** to its superiority in the task of key distribution as well as its expressive ability,many related techniques have been m... 详细信息
来源: 评论
Efficient identity-based threshold decryption scheme from bilinear pairings
收藏 引用
Frontiers of computer Science 2018年 第1期12卷 177-189页
作者: Wei GAO Guilin WANG Kefei CHEN Xueli WANG School of Mathematics and Statistics Ludong University Yantai 264025 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing 210044 China Key Laboratory of Information Security Guangzhou University Guangzhou 510006 China Shield Lab Singapore Research Center of Huawei Singapore 117674 Singapore Department of Mathematics Hangzhou Normal University Hangzhou 311121China School of Mathematics South China Normal University Guangzhou 510631 China
Using Shamir's secret sharing scheme to indi- rectly share the identity-based private key in the form of a pairing group element, we propose an efficient identity-based threshold decryption scheme from pairings and p... 详细信息
来源: 评论
A novel outer approximation method combined penalty function and for hydrothermal coordination  11
A novel outer approximation method combined penalty function...
收藏 引用
11th IET International Conference on Advances in Power System Control, Operation and Management, APSCOM 2018
作者: Luo, Jiangyao Yang, Linfeng Jian, Jinbao Zhang, Zhenrong Department of Computer Electronics and Information Guangxi University Nanning China Department of Science Guangxi University for Nationalities Nanning China Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning China
Hydrothermal Coordination (HTC) is a problem involving a large number of continuous variables, binary variables and constraints that is difficult to solve efficiently. A novel outer approximation method (OAM) combined... 详细信息
来源: 评论
Hierarchical prototype learning for zero-shot recognition
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Xingxing Gui, Shupeng Zhu, Zhenfeng Zhao, Yao Liu, Ji Institute of Information Science Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing Jiaotong University Beijing100044 China Department of Computer Science University of Rochester RochesterNY14611 United States
Zero-Shot Learning (ZSL) has received extensive attention and successes in recent years especially in areas of fine-grained object recognition, retrieval, and image captioning. key to ZSL is to transfer knowledge from... 详细信息
来源: 评论
Robust unsupervised feature selection by nonnegative sparse subspace learning
收藏 引用
Neurocomputing 2019年 334卷 156-171页
作者: Wei Zheng Hui Yan Jian Yang School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China School of Computer Engineering Jinling Institute of Technology Nanjing PR China PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing Xiaozhuang University Nanjing PR China
Sparse subspace learning has been demonstrated to be effective in data mining and machine learning. In this paper, we cast the unsupervised feature selection scenario as a matrix factorization problem from the viewpoi... 详细信息
来源: 评论
Cost Efficient Offloading Strategy for DNN-Based Applications in Edge-Cloud Environment
Cost Efficient Offloading Strategy for DNN-Based Application...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Yinhao Huang Bing Lin Yongjie Zheng Junqin Hu Yuchang Mo Xing Chen College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China College of Physics and Energy Fujian Normal University Fuzhou China Fujian Province University Key Laboratory of Computational Science Huaqiao University Quanzhou China
Deep Neural networks (DNNs) are pervasively used in a large number of applications, such as Microsoft Cortana, Apple Siri, and Google Now. The traditional method is to offload them in the cloud, which causes serious d... 详细信息
来源: 评论