咨询与建议

限定检索结果

文献类型

  • 1,743 篇 会议
  • 1,341 篇 期刊文献

馆藏范围

  • 3,084 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,003 篇 工学
    • 1,479 篇 计算机科学与技术...
    • 1,156 篇 软件工程
    • 538 篇 信息与通信工程
    • 272 篇 电气工程
    • 213 篇 电子科学与技术(可...
    • 204 篇 控制科学与工程
    • 199 篇 生物工程
    • 135 篇 机械工程
    • 125 篇 网络空间安全
    • 99 篇 仪器科学与技术
    • 92 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 66 篇 化学工程与技术
    • 66 篇 交通运输工程
    • 63 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 912 篇 理学
    • 525 篇 数学
    • 219 篇 生物学
    • 198 篇 物理学
    • 162 篇 统计学(可授理学、...
    • 81 篇 系统科学
    • 76 篇 化学
  • 559 篇 管理学
    • 340 篇 管理科学与工程(可...
    • 241 篇 图书情报与档案管...
    • 123 篇 工商管理
  • 93 篇 法学
    • 60 篇 社会学
  • 70 篇 医学
    • 57 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 150 篇 feature extracti...
  • 123 篇 semantics
  • 119 篇 accuracy
  • 89 篇 computational mo...
  • 85 篇 training
  • 82 篇 federated learni...
  • 70 篇 data models
  • 58 篇 deep learning
  • 53 篇 robustness
  • 49 篇 privacy
  • 48 篇 adaptation model...
  • 47 篇 protocols
  • 47 篇 cryptography
  • 46 篇 transformers
  • 46 篇 neural networks
  • 45 篇 optimization
  • 45 篇 data mining
  • 45 篇 security
  • 43 篇 visualization
  • 41 篇 authentication

机构

  • 262 篇 key laboratory o...
  • 205 篇 shandong provinc...
  • 158 篇 school of comput...
  • 85 篇 key laboratory o...
  • 67 篇 college of compu...
  • 66 篇 computer network...
  • 65 篇 shandong provinc...
  • 59 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 44 篇 institute of inf...
  • 40 篇 school of cyber ...
  • 40 篇 school of comput...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...
  • 36 篇 university of ch...
  • 35 篇 key laboratory o...
  • 32 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 27 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 21 篇 liu ximeng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 xiangzhi liu
  • 19 篇 guang cheng
  • 19 篇 du bo
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 15 篇 jianfeng ma

语言

  • 2,607 篇 英文
  • 381 篇 其他
  • 116 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3084 条 记 录,以下是2551-2560 订阅
排序:
Dynamics Nature and Link Prediction Methods in Opportunistic networks
Dynamics Nature and Link Prediction Methods in Opportunistic...
收藏 引用
IEEE International Conference on Computational Science and Engineering, CSE
作者: Yin Li Xuebing Zhao Hao Tang Qi Wang Sanfeng Zhang College of Software Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Ministry of Education Southeast University Nanjing China
With the increasing popularization of low-cost smart mobile devices, which have the capability of short-range wireless communication, opportunistic networks aimed to meet different requirements start to put into pract... 详细信息
来源: 评论
Independent component analysis based on information bottleneck
Abstract and Applied Analysis
收藏 引用
Abstract and Applied Analysis 2015年 第1期2015卷
作者: Ke, Qiao Zhang, Jiangshe Srivastava, H.M. Wei, Wei Chen, Guang-Sheng School of Mathematics and Statistics Xi'An Jiaotong University Xi'an 710049 China Department of Mathematics and Statistics University of Victoria Victoria V8W3R4 BC Canada School of Computer Science and Engineering Xi'An University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an 710048 China Department of Construction and Information Engineering Guangxi Modern Vocational Technology College Hechi Guangxi 547000 China
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
来源: 评论
Chip waveforms attribute recognition model research and design
Chip waveforms attribute recognition model research and desi...
收藏 引用
2014 International Conference on Manufacturing Technology and Electronics Applications, ICMTEA 2014
作者: Xiao, Da Feng, Jing Zhu, Yue Fei Peng, Fei Lan, Jing Hong Computer network department ZhengZhou Information Science University ZhengZhouHeNan China State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhouHeNan China Urumqi General Hospital of PLA.Urumqi 7 Jianxue Street Xinjiang Uygur Zizhiqu Jinshui District ZhengZhouHeNan China
For hardware Trojan detection process is difficult to effectively extract the exact equivalent logic function of the target chip logic function is proposed based on contradictory truth table equivalent extraction sche... 详细信息
来源: 评论
High-efficiency quantum steganography based on the tensor product of Bell states
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2013年 第9期56卷 1745-1754页
作者: XU ShuJiang CHEN XiuBo NIU XinXin YANG YiXian Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first pa... 详细信息
来源: 评论
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
收藏 引用
Communications in Theoretical Physics 2013年 第5期59卷 547-553页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security (Institute of Information Engineering Chinese Academy of Sciences)
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... 详细信息
来源: 评论
A Background Prior Based Saliency Detection for JPEG Image
A Background Prior Based Saliency Detection for JPEG Image
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Xiaolong Sun Zhanghui Liu Wenzhong Guo College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Province Key Laboratory of Network Computing and Intelligent Information Process Fuzhou China
Image saliency detection, which is aiming at locating meaningful objects in image and extracting the corresponding saliency map, has been attracting considerable attention. Most of existing saliency detection algorith... 详细信息
来源: 评论
A centralized latency optimization solution for tree-based application layer multicast
A centralized latency optimization solution for tree-based a...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Xinchang Zhang Weidong Gu Lu Wang Xiaomin Zhu Meng Sun DNSLAB China Internet Network Information Center Beijing China Shandong Key Laboratory of Computer Networks Shandong Computer Science Center (National Supercomputing Center in Jinan) Jinan China
Most application layer multicast (ALM) protocols build the delivery tree by the distributed way, which is necessary for large-scale group applications because of its good scalability. However, it is difficult for the ... 详细信息
来源: 评论
A linearization regression method to determine life data distribution type
A linearization regression method to determine life data dis...
收藏 引用
3rd International Conference on Manufacture Engineering, Quality and Production System, ICMEQP 2014
作者: Qin, Jin Lei Niu, Yu Guang Li, Zheng Information and Network Management Center North China Electric Power University Baoding China State Key Laboratory of Alternate Electric Power System with Renewable Energy Sources North China Electric Power University Beijing China Department of Computer Science and Technology North China Electric Power University Baoding China
The law of equipments or products life is the calculation fundament of reliability indexes in power plant. Aim to how to determine the most fitted life distribution type, the linear regression and correlation coeffici... 详细信息
来源: 评论
Multi-user access control scheme based on resources hierarchies for perceptual layer of IoT
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2014年 第1期42卷 28-35页
作者: Ma, Jun Guo, Yuan-Bo Ma, Jian-Feng Liu, Xi-Meng Li, Qi School of Computer Science and Technology Xidian University Xi'an Shaanxi 710071 China PLA Information Engineering University Zhengzhou Henan 450004 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an Shaanxi 710071 China
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, ... 详细信息
来源: 评论
A Density-Based Space Filling Curve for Location Privacy-Preserving
A Density-Based Space Filling Curve for Location Privacy-Pre...
收藏 引用
IEEE International Conference on Services Computing (SCC)
作者: Feng Tian Xiaolin Gui Jian An Pan Yang Xuejun Zhang School of Electronic and Information Engineering Xi'an Jiaotong University Xi'an China Shaanxi Province Key Laboratory of Computer Network Xi'an Jiaotong University Xi'an China
Location-aware devices and cloud computing services have triggered the widespread development of location-based applications. However, such applications require users to disclose their actual locations, which raises s... 详细信息
来源: 评论