咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 176 篇 期刊文献

馆藏范围

  • 802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 417 篇 工学
    • 314 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 142 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 建筑学
  • 156 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
    • 9 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 44 篇 computational mo...
  • 42 篇 semantics
  • 40 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 measurement
  • 17 篇 robustness

机构

  • 221 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 21 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 763 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and information Security"
802 条 记 录,以下是761-770 订阅
排序:
A Design of the Common Platform of Wireless Communication Based on FPGA
A Design of the Common Platform of Wireless Communication Ba...
收藏 引用
IEEE Conference on Energy Internet and Energy System Integration
作者: Lei Qiao Zhe Zheng Wenpeng Cui Weilong Zhang Xueping Jiang Research Department of Smart Chip Global Energy Interconnection Research Institute State Grid Key Laboratory of Information & Network Security State Grid Laboratory of Electric Power Communication Network Technology
We present a design of the common platform of wireless communication based on FPGA. The platform, developed by us, allows researchers to modify transport protocols on any layer of an OSI reference model, from physical... 详细信息
来源: 评论
Performance analysis of parallel replica molecular dynamics
收藏 引用
AIP Conference Proceedings 2018年 第1期1978卷
作者: Boyao Zhang Jue Wang Yangde Feng Ji Xiang Lei Wang 1Computer Network Information Center Chinese Academy of Science Department of High Performance Computing Technology and Application Development Beijing China 2University of Chinese Academy of Sciences Beijing China 3State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China 4School of cybersecurity Chinese Academy of Sciences China
Molecular dynamics simulation is an important tool for studying materials microstructure evolution under radiation effects. It is difficult to simulate atomic diffusion in materials owing to the time-scale limitations...
来源: 评论
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity
Strongly average-case secure obfuscation: achieving input pr...
收藏 引用
作者: Zhang, Mingwu Mu, Yi Shen, Jian Huang, Xinyi School of Computer Science Hubei University of Technology Wuhan430068 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University China School of Computing and Information Technology University of Wollongong NSW2522 Australia
A program obfuscator is a compiling algorithm that takes a program/circuit as input and generates a new garbled circuit to implement the same functionality as before while obtaining hard-to-understand in some sense, t... 详细信息
来源: 评论
Learning to segment with image-level annotations
收藏 引用
Pattern Recognition 2016年 59卷 234-244页
作者: Wei, Yunchao Liang, Xiaodan Chen, Yunpeng Jie, Zequn Xiao, Yanhui Zhao, Yao Yan, Shuicheng Institute of information Science Beijing Jiaotong University Beijing 100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing 100044 China School of Advanced Computing Sun Yat-Sen University Guangzhou 510006 China Vision and Machine Learning Lab National University of Singapore 117583 Singapore People׳s Public Security University of China Beijing 100038 China
Recently, deep convolutional neural networks (DCNNs) have significantly promoted the development of semantic image segmentation. However, previous works on learning the segmentation network often rely on a large numbe... 详细信息
来源: 评论
Robust low-rank tensor factorization by cyclic weighted median
收藏 引用
Science China(information Sciences) 2015年 第5期58卷 145-155页
作者: MENG DeYu ZHANG Biao XU ZongBen ZHANG Lei GAO ChenQiang Institute for Information and System Sciences and Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Department of Computing Hong Kong Polytechnic University Chongqing Key Laboratory of Signal and Information Processing Chongqing University of Posts and Telecommunications
Low-rank tensor factorization(LRTF) provides a useful mathematical tool to reveal and analyze multi-factor structures underlying data in a wide range of practical applications. One challenging issue in LRTF is how to ... 详细信息
来源: 评论
Some classes of complete permutation polynomials over Fq
收藏 引用
Science China Mathematics 2015年 第10期58卷 2081-2094页
作者: WU GaoFei LI Nian HELLESETH Tor ZHANG YuQing State Key Laboratory of Integrated Service Networks Xidian University Information Security and National Computing Grid Laboratory Southwest Jiaotong University Department of Informatics University of Bergen National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences
By using a powerful criterion for permutation polynomials, we give several classes of complete permutation polynomials over finite fields. First, two classes of complete permutation monomials whose exponents are of Ni... 详细信息
来源: 评论
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Sch...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Xu Yang Joseph K. Liu Wei Wu Man Ho Au Willy Susilo Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University China and State Key Laboratory of Cryptology Beijing China Faculty of Information Technology Monash University Australia Department of Computing Hong Kong Polytechnic University Hong Kong School of Computer Science and Software Engineering University of Wollongong Australia
Electric Vehicle (EV) infrastructure is relatively new in many countries. Due to the recency of an EV infrastructure, it is important to carry out a series of testing programs. Furthermore, authenticity for collection... 详细信息
来源: 评论
Independent component analysis based on information bottleneck
Abstract and Applied Analysis
收藏 引用
Abstract and Applied Analysis 2015年 第1期2015卷
作者: Ke, Qiao Zhang, Jiangshe Srivastava, H.M. Wei, Wei Chen, Guang-Sheng School of Mathematics and Statistics Xi'An Jiaotong University Xi'an 710049 China Department of Mathematics and Statistics University of Victoria Victoria V8W3R4 BC Canada School of Computer Science and Engineering Xi'An University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an 710048 China Department of Construction and Information Engineering Guangxi Modern Vocational Technology College Hechi Guangxi 547000 China
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
来源: 评论
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & Technology 2013年 第4期28卷 743-748页
作者: 葛爱军 黄欣沂 陈成 马传贵 张锐 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University Institute of Software Chinese Academy of Sciences
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... 详细信息
来源: 评论
ESSVCS: An enriched secret sharing visual cryptography
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8363卷 1-24页
作者: Liu, Feng Yan, Wei Q. Li, Peng Wu, Chuankun State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China School of Computing and Mathematical Sciences Auckland University of Technology 1142 New Zealand Department of Mathematics and Physics North China Electric Power University Baoding Hebei 071003 China
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that are able to... 详细信息
来源: 评论