咨询与建议

限定检索结果

文献类型

  • 1,914 篇 会议
  • 1,628 篇 期刊文献

馆藏范围

  • 3,542 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,353 篇 工学
    • 1,720 篇 计算机科学与技术...
    • 1,327 篇 软件工程
    • 628 篇 信息与通信工程
    • 336 篇 电气工程
    • 258 篇 电子科学与技术(可...
    • 251 篇 控制科学与工程
    • 223 篇 生物工程
    • 158 篇 机械工程
    • 145 篇 网络空间安全
    • 114 篇 仪器科学与技术
    • 112 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 83 篇 交通运输工程
    • 77 篇 动力工程及工程热...
    • 67 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,088 篇 理学
    • 636 篇 数学
    • 249 篇 生物学
    • 237 篇 物理学
    • 196 篇 统计学(可授理学、...
    • 97 篇 化学
    • 90 篇 系统科学
  • 686 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 154 篇 feature extracti...
  • 128 篇 semantics
  • 124 篇 accuracy
  • 92 篇 computational mo...
  • 88 篇 training
  • 86 篇 federated learni...
  • 73 篇 data models
  • 64 篇 deep learning
  • 56 篇 robustness
  • 53 篇 data mining
  • 52 篇 protocols
  • 51 篇 privacy
  • 50 篇 optimization
  • 50 篇 adaptation model...
  • 49 篇 clustering algor...
  • 48 篇 transformers
  • 47 篇 neural networks
  • 47 篇 visualization
  • 47 篇 cryptography
  • 46 篇 security

机构

  • 272 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 169 篇 school of comput...
  • 85 篇 key laboratory o...
  • 68 篇 computer network...
  • 68 篇 shandong provinc...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 47 篇 school of cyber ...
  • 45 篇 institute of inf...
  • 42 篇 the key laborato...
  • 41 篇 school of comput...
  • 40 篇 shandong provinc...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...

作者

  • 46 篇 zhao yao
  • 40 篇 ren jiadong
  • 37 篇 zhou deyu
  • 31 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 xiaoming wu
  • 25 篇 guo wenzhong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 xiangzhi liu
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xiaoping li
  • 18 篇 wei zhang
  • 18 篇 liu ximeng
  • 17 篇 di xiaoqiang

语言

  • 2,875 篇 英文
  • 548 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3542 条 记 录,以下是2931-2940 订阅
排序:
A forensics method of web browsing behavior based on association rule mining
A forensics method of web browsing behavior based on associa...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Yiyun Zhang Guolong Chen College of Mathematics and Computer Science Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the development of network, web forensics is becoming more and more important due to the rampant cybercrime. In this paper, a forensics method of web browsing behavior based on association rule mining is presente... 详细信息
来源: 评论
Dynamics Nature and Link Prediction Methods in Opportunistic networks
Dynamics Nature and Link Prediction Methods in Opportunistic...
收藏 引用
IEEE International Conference on Computational Science and Engineering, CSE
作者: Yin Li Xuebing Zhao Hao Tang Qi Wang Sanfeng Zhang College of Software Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Ministry of Education Southeast University Nanjing China
With the increasing popularization of low-cost smart mobile devices, which have the capability of short-range wireless communication, opportunistic networks aimed to meet different requirements start to put into pract... 详细信息
来源: 评论
Independent component analysis based on information bottleneck
Abstract and Applied Analysis
收藏 引用
Abstract and Applied Analysis 2015年 第1期2015卷
作者: Ke, Qiao Zhang, Jiangshe Srivastava, H.M. Wei, Wei Chen, Guang-Sheng School of Mathematics and Statistics Xi'An Jiaotong University Xi'an 710049 China Department of Mathematics and Statistics University of Victoria Victoria V8W3R4 BC Canada School of Computer Science and Engineering Xi'An University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an 710048 China Department of Construction and Information Engineering Guangxi Modern Vocational Technology College Hechi Guangxi 547000 China
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
来源: 评论
Chip waveforms attribute recognition model research and design
Chip waveforms attribute recognition model research and desi...
收藏 引用
2014 International Conference on Manufacturing Technology and Electronics Applications, ICMTEA 2014
作者: Xiao, Da Feng, Jing Zhu, Yue Fei Peng, Fei Lan, Jing Hong Computer network department ZhengZhou Information Science University ZhengZhouHeNan China State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhouHeNan China Urumqi General Hospital of PLA.Urumqi 7 Jianxue Street Xinjiang Uygur Zizhiqu Jinshui District ZhengZhouHeNan China
For hardware Trojan detection process is difficult to effectively extract the exact equivalent logic function of the target chip logic function is proposed based on contradictory truth table equivalent extraction sche... 详细信息
来源: 评论
High-efficiency quantum steganography based on the tensor product of Bell states
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2013年 第9期56卷 1745-1754页
作者: XU ShuJiang CHEN XiuBo NIU XinXin YANG YiXian Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first pa... 详细信息
来源: 评论
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
收藏 引用
Communications in Theoretical Physics 2013年 第5期59卷 547-553页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security (Institute of Information Engineering Chinese Academy of Sciences)
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... 详细信息
来源: 评论
A Background Prior Based Saliency Detection for JPEG Image
A Background Prior Based Saliency Detection for JPEG Image
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Xiaolong Sun Zhanghui Liu Wenzhong Guo College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Province Key Laboratory of Network Computing and Intelligent Information Process Fuzhou China
Image saliency detection, which is aiming at locating meaningful objects in image and extracting the corresponding saliency map, has been attracting considerable attention. Most of existing saliency detection algorith... 详细信息
来源: 评论
Implementation and evaluation of a backtracking algorithm for finding all justifications in OWL 2 EL
Implementation and evaluation of a backtracking algorithm fo...
收藏 引用
7th Chinese Semantic Web Symposium and the 2nd Chinese Web ScienceConference, CSWS 2013
作者: Zhou, Zhangquan Qi, Guilin Key Laboratory of Computer Network and Information Integration of State Education Ministry School of Computer Science and Engineering Southeast University China
Finding justifications plays an important role in the development and maintenance of ontologies. It helps users or developers to understand the entailments by presenting the minimal subsets of the ontology which are r... 详细信息
来源: 评论
Multi-label classification with unlabeled data: An inductive approach  5
Multi-label classification with unlabeled data: An inductive...
收藏 引用
5th Asian Conference on Machine Learning, ACML 2013
作者: Wu, Lei Zhang, Min-Ling MOE Key Laboratory of Computer Network and Information Integration School of Computer Science and Engineering Southeast University Nanjing210096 China
The problem of multi-label classification has attracted great interests in the last decade. Multi-label classification refers to the problems where an example that is represented by a single instance can be assigned t... 详细信息
来源: 评论
A centralized latency optimization solution for tree-based application layer multicast
A centralized latency optimization solution for tree-based a...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Xinchang Zhang Weidong Gu Lu Wang Xiaomin Zhu Meng Sun DNSLAB China Internet Network Information Center Beijing China Shandong Key Laboratory of Computer Networks Shandong Computer Science Center (National Supercomputing Center in Jinan) Jinan China
Most application layer multicast (ALM) protocols build the delivery tree by the distributed way, which is necessary for large-scale group applications because of its good scalability. However, it is difficult for the ... 详细信息
来源: 评论