咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2421-2430 订阅
排序:
Safeguarding Next Generation Multiple Access Using Physical Layer security Techniques: A Tutorial
arXiv
收藏 引用
arXiv 2024年
作者: Lv, Lu Xu, Dongyang Hu, Rose Qingyang Ye, Yinghui Yang, Long Lei, Xianfu Wang, Xianbin Kim, Dong In Nallanathan, Arumugam The State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China The School of Information and Communications Engineering Xi’an Jiaotong University Xi’an710049 China The Department of Electrical and Computer Engineering Utah State University LoganUT84322 United States The Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications Xi’an710121 China The School of Information Science and Technology Southwest Jiaotong University Chengdu610031 China The Department of Electrical and Computer Engineering Western University LondonONN6A 5B9 Canada The Department of Electrical and Computer Engineering Sungkyunkwan University Suwon16419 Korea Republic of School of Electronic Engineering and Computer Science Queen Mary University of London E1 4NS United Kingdom
Driven by the ever-increasing requirements of ultrahigh spectral efficiency, ultra-low latency, and massive connectivity, the forefront of wireless research calls for the design of advanced next generation multiple ac... 详细信息
来源: 评论
Learning with multiclass AUC: Theory and algorithms
arXiv
收藏 引用
arXiv 2021年
作者: Yang, Zhiyong Xu, Qianqian Bao, Shilong Cao, Xiaochun Huang, Qingming The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China The School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China School of Cyber Science and Technology Sun Yat-sen University Shenzhen518100 China University of Chinese Academy of Sciences Beijing101408 China Peng Cheng Laboratory Shenzhen518055 China
The Area under the ROC curve (AUC) is a well-known ranking metric for problems such as imbalanced learning and recommender systems. The vast majority of existing AUC-optimization-based machine learning methods only fo... 详细信息
来源: 评论
Respiratory Sound Classification Based on BiGRU-Attention network with XGBoost
Respiratory Sound Classification Based on BiGRU-Attention Ne...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xuesong Zhao Yanbo Shao Juanyun Mai Airu Yin Sihan Xu College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China KLMDASR Tianjin China
In recent years, the mortality rate of respiratory diseases ranks high among the major diseases. Early detection of respiratory diseases is a key factor in reducing the mortality rate and curing diseases. In this pape... 详细信息
来源: 评论
Performance Analysis of Phase Pre-Configured Spatial Modulation Empowered by RIS With Discrete Phase Alphabet
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Liu, Chaowen Shi, Zhengmin Zheng, Tong-Xing Liu, Boyang Wen, Miaowen Wang, Wenjie Lu, Guangyue Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China National Key Laboratory of Multi-domain Data Collaborative Processing and Control Xi'an710068 China Xi'an Jiaotong University School of Information and Communications Engineering Xi'an710049 China South China University of Technology School of Electronics and Information Engineering Guangzhou510641 China
In this paper, we are motivated to introduce and investigate a novel reconfigurable intelligent surface assisted phase preconfigured spatial modulation (RIS-PPSM) scheme, which can be employed to achieve reliability e... 详细信息
来源: 评论
Cipherchain:A Secure and Efficient Ciphertext Blockchain via mPECK
收藏 引用
Journal of Quantum computing 2020年 第1期2卷 57-83页
作者: Hailin Chen Gang Xu Yuling Chen Xiubo Chen Yixian Yang Ruibin Fan Kaixiang Zhang Huizhong Li Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Guizhou University Sate Key Laboratory of Public Big DataGuizhou550025China North China University of Technology School of Computing Science and TechnologyBeijingChina Webank Shenzhen518000China
Most existing blockchain schemes are based on the design concept“openness and transparency”to realize data security,which usually require transaction data to be presented in the form of ***,it inevitably brings the ... 详细信息
来源: 评论
Minimizing Economic Costs and Task Processing Fails in MEC-Enabled Satellite-Ground Integrated networks With MADDPG and Fuzzy Logic
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Du, Jianbo Zhang, Jianjun Kong, Ziwen Yu, Zuting Hu, Bintao Jiang, Jing Lu, Guangyue Xi’an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security School of Communications and Information Engineering Xi’an710121 China Chinese Academy of Space Technology Beijing100094 China Xi’an Jiaotong-Liverpool University School of Internet of Things Suzhou215123 China
As the Internet of Things (IoT) continues to expand rapidly, traditional ground networks are increasingly unable to meet the growing demands for connectivity and coverage. To address these challenges, integrated satel... 详细信息
来源: 评论
Adversity-Based Social Circles Inference via Context-Aware Mobility
Adversity-Based Social Circles Inference via Context-Aware M...
收藏 引用
GLOBECOM 2020 - 2020 IEEE Global Communications Conference
作者: Qiang Gao Fan Zhou Goce Trajcevski Fengli Zhang Xucheng Luo Network and Data Security Key Laboratory of Sichuan Province China University of Electronic Science and Technology of China China Iowa State University Ames USA
The ubiquity of mobile devices use has generated huge volumes of location-aware contextual data, providing opportunities enriching various location-based social network (LBSN) applications - e.g., trip recommendation,... 详细信息
来源: 评论
SPECBOX: A label-based transparent speculation scheme against transient execution attacks
arXiv
收藏 引用
arXiv 2021年
作者: Tang, Bowen Wu, Chenggang Wang, Zhe Jia, Lichen Yew, Pen-Chung Cheng, Yueqiang Zhang, Yinqian Wang, Chenxi Xu, Guoqing Harry State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China University of the Chinese Academy of Sciences China University of Minnesota Twin Cities United States NIO Security Research United States Southern University of Science and Technology China University of California Los Angeles United States
Speculative execution techniques have been a cornerstone of modern processors to improve instruction-level parallelism. However, recent studies showed that this kind of techniques could be exploited by attackers to le... 详细信息
来源: 评论
衰亡链揭示互利共生生态系统中安全与崩溃的中间阶段(英文)
收藏 引用
Engineering 2024年 第12期 89-98页
作者: 王光炜 刘雪明 肖颖 袁烨 潘林强 管晓宏 高建喜 张海涛 The MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Digital Manufacturing Equipment and Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology Guangdong HUST Industrial Technology Research Institute Huazhong University of Science and Technology Guangdong Provincial Engineering Technology Center of Autonomous Unmanned Vessels MOE Key Laboratory of Intelligent Networks and Network Security&State Key Laboratory of Manufacturing Systems Xi'an Jiaotong University Tsinghua National Laboratory of Information Science and Technology Department of Automation Tsinghua University Department of Computer Science Rensselaer Polytechnic Institute
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities, such as overfishing and deforestation, and the effects of such damage on ecological stability are u...
来源: 评论
Cross-modal consensus network for weakly supervised temporal action localization
arXiv
收藏 引用
arXiv 2021年
作者: Hong, Fa-Ting Feng, Jia-Chang Xu, Dan Shan, Ying Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Peng Cheng Laboratory Shenzhen China Tencent PCG Shenzhen China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Department of Computer Science and Engineering HKUST Hong Kong Pazhou Lab Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
Weakly supervised temporal action localization (WS-TAL) is a challenging task that aims to localize action instances in the given video with video-level categorical supervision. Previous works use the appearance and m... 详细信息
来源: 评论