咨询与建议

限定检索结果

文献类型

  • 4,446 篇 会议
  • 3,346 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,800 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,222 篇 工学
    • 3,921 篇 计算机科学与技术...
    • 3,127 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 652 篇 电气工程
    • 539 篇 控制科学与工程
    • 522 篇 电子科学与技术(可...
    • 441 篇 网络空间安全
    • 439 篇 生物工程
    • 299 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 149 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,280 篇 理学
    • 1,359 篇 数学
    • 498 篇 物理学
    • 476 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,324 篇 管理学
    • 807 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 228 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 151 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 175 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 111 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 65 篇 university of ch...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 65 篇 guangdong provin...
  • 64 篇 computer network...
  • 61 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 25 篇 xu li
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,190 篇 英文
  • 348 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7800 条 记 录,以下是4981-4990 订阅
排序:
Fast stochastic ordinal embedding with variance reduction and adaptive step size
arXiv
收藏 引用
arXiv 2019年
作者: Ma, Ke Zeng, Jinshan Xiong, Jiechao Xu, Qianqian Cao, Xiaochun Liu, Wei Yao, Yuan School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen518055 China School of Computer Information Engineering Jiangxi Normal University NanchangJiangxi330022 China Tencent AI Lab Shenzhen Guangdong China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China Department of Mathematics and by courtesy Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong
—Learning representation from relative similarity comparisons, often called ordinal embedding, gains rising attention in recent years. Most of the existing methods are based on semi-definite programming (SDP), which ... 详细信息
来源: 评论
A Low-Cost Service Node Selection Method in Crowdsensing Based on Region-Characteristics  13th
A Low-Cost Service Node Selection Method in Crowdsensing Bas...
收藏 引用
13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018
作者: Peng, Zhenlong An, Jian Gui, Xiaolin Liao, Dong Gui, RuoWei School of Electronics and Information Engineering Xi’an Jiaotong University No. 28 Xianning West Road Xi’an710049 China Xi’an Jiaotong University Shenzhen Research School High-Tech Zone Shenzhen518057 China TSL Business School Quanzhou Normal University Donghai Streat Quanzhou362000 China Shaanxi Province Key Laboratory of Computer Network No. 28. Xianning West Road Xi’an710049 China
Crowdsensing is a human-centred perception model. Through the cooperation of multiple nodes, an entire sensing task is completed. To improve the efficiency of accomplishing sensing missions, a proper and cost-effectiv... 详细信息
来源: 评论
An Improved Non-Geometrical Stochastic Model for Non-WSSUS Vehicle-to-Vehicle Channels
收藏 引用
ZTE Communications 2019年 第4期17卷 62-71页
作者: HUANG Ziwei CHENG Xiang ZHANG Nan State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Engineering and Computer SciencePeking UniversityBeijing 100871China Key Laboratory of Wireless Sensor Network&Communication Shanghai Institute of Microsystem and Information TechnologyChinese Academy of SciencesShanghai 200050China Wireless Algorithm Department Product Research and Development SystemZTE CorporationShanghai 201203China
A novel non-geometrical stochastic model(NGSM)for non-wide sense station ary uncorrelated scattering(non-WSSUS)vehicle-to-vehicle(V2V)channels is *** model is based on a conventional NGSM and employs a more accurate m... 详细信息
来源: 评论
Slice-Based Window Detection from Scene Point Clouds
Slice-Based Window Detection from Scene Point Clouds
收藏 引用
International Conference on Virtual Reality and Visualization (ICVRV)
作者: Wen Hao Yinghui Wang Wei Liang Xiaojuan Ning Ye Li Institute of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
In this paper, we propose a comprehensive strategy to detect the windows from scene point clouds. First, the planar points are extracted after computing the dimensionality structure of each point. The planar points ar... 详细信息
来源: 评论
A novel convolution neural network for background segmentation recognition  4th
A novel convolution neural network for background segmentati...
收藏 引用
4th International Conference on Cloud Computing and security, ICCCS 2018
作者: Fang, Wei Ding, Yewen Zhang, Feihong School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
The convolution neural network for image classification is an application of deep learning on image processing. Convolutional neural networks have the advantage of being able to convolve directly with image pixels and... 详细信息
来源: 评论
Evolutionary Cryptography Theory-Based Generating Method for Secure ECs
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 499-510页
作者: Chao Wang Feng Hu Huanguo Zhang Jie Wu the Key Laboratory of Specialty Fiber Optics and Optical Access Networks School of Communication and Information EngineeringShanghai University the Department of Computer and Information Sciences Temple University the Key Lab of Aerospace Information Security and Trusted Computing Wuhan University
Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly bas... 详细信息
来源: 评论
Simple Method for Realizing Weil Theorem in Secure ECC Generation
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 511-519页
作者: Feng Hu Chao Wang Huanguo Zhang Jie Wu the Key Laboratory of Specialty Fiber Optics and Optical Access Networks School of Communication and Information EngineeringShanghai University the Department of Computer and Information Sciences Temple University the Key Lab of Aerospace Information Security and Trusted Computing Wuhan University
How to quickly compute the number of points on an Elliptic Curve (EC) has been a longstanding challenge. The computational complexity of the algorithm usually employed makes it highly inefficient. Unlike the general... 详细信息
来源: 评论
Phishing detection research based on LSTM recurrent neural network  4th
Phishing detection research based on LSTM recurrent neural n...
收藏 引用
4th International Conference of Pioneer computer Scientists, Engineers and Educators, ICPCSEE 2018
作者: Chen, Wenwu Zhang, Wei Su, Yang Key Laboratory for Network and Information Security of Chinese Armed Police Force Engineering University of Chinese Armed Police Force Xi’anShaanxi China Department of Electronic Technology Engineering University of the Chinese Armed Police Force Xi’anShaanxi China
In order to effectively detect phishing attacks, this paper designed a new detection system for phishing websites using LSTM Recurrent neural networks. LSTM has the advantage of capturing data timing and long-term dep... 详细信息
来源: 评论
Corrigendum to "Generation of a local lung respiratory motion model using a weighted sparse algorithm and motion prior-based registration" [Comput. Biol. Med. 123 (2020) 103913]
收藏 引用
computers in biology and medicine 2021年 140卷 104271页
作者: Dong Chen Hongzhi Xie Lixu Gu Jing Liu Liang Tian College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Hebei Normal University Shijiazhuang China Key Laboratory of Augmented Reality College of Mathematics and Information Science Hebei Normal University Shijiazhuang China. Department of Cardiothoracic Surgery Peking Union Medical College Hospital Beijing China. School of Biomedical Engineering Shanghai Jiao Tong University Shanghai China. Key Laboratory of Augmented Reality College of Mathematics and Information Science Hebei Normal University Shijiazhuang China. Electronic address: liujing01@***. Key Laboratory of Augmented Reality College of Mathematics and Information Science Hebei Normal University Shijiazhuang China. Electronic address: tianliang@***.
来源: 评论
Spatial Pyramid Pooling based Convolutional Autoencoder network for Loop Closure Detection
Spatial Pyramid Pooling based Convolutional Autoencoder Netw...
收藏 引用
IEEE International Conference on Real-time Computing and Robotics (RCAR)
作者: Rong Xiang Yuan Liu Qieshi Zhang Jun Cheng School of Computer Science and Information Security Guilin University of Electronic Technology GuangXi China Guangdong Provincial Key Laboratory of Computer Vision and Virtual Reality Technology Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen China The Chinese University of Hong Kong Hong Kong China
Loop closure detection is a crucial module in simultaneous localization and mapping (SLAM), which reduces accumulative error in building environment map. Traditional appearance-based methods for loop closure detection... 详细信息
来源: 评论