咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2431-2440 订阅
排序:
Dynamic Spatial-Temporal Imputation network With Missing Features for Traffic Data Imputation
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Hao Han, Shiyuan Yang, Min Liu, Jie Zhou, Jin Zhang, Tong Chen, C. L. Philip Shandong Women’s University School of Artificial Intelligence Jinan250399 China University of Jinan Shandong Provincial Key Laboratory of Network-Based Intelligent Computing Jinan250022 China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
Missing traffic data caused by sensor failures or communication errors significantly hinders the efficiency of downstream tasks in Intelligent Transportation Systems (ITS), such as the critical functions of traffic mo... 详细信息
来源: 评论
Energy-Efficient Virtual Machine Placement in Data Centers Via Accelerated Genetic Algorithm with Improved Fitness Computation
SSRN
收藏 引用
SSRN 2021年
作者: Hormozi, Elham Hu, Shuwen Ding, Zhe Tian, Yu-Chu Wang, You-Gan Yu, Zu-Guo Zhang, Weizhe School of Computer Science Queensland University of Technology GPO Box 2434 BrisbaneQLD4001 Australia School of Mathematical Sciences Queensland University of Technology GPO Box 2434 BrisbaneQLD4001 Australia Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Hunan Key Laboratory for Computation and Simulation in Science and Engineering Xiangtan University Hunan Xiangtan411105 China School of Cyberspace Science Harbin Institute of Technology Harbin China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen China Queensland University of Technology
Energy efficiency basically refers to how effectively energy can be utilised or consumed by any virtualised data centre giving cloud administrations. Since Genetic Algorithm (GA) is an acceptable method to solve ... 详细信息
来源: 评论
Fully secure decentralized ciphertext-policy attribute-based encryption in standard model  14th
Fully secure decentralized ciphertext-policy attribute-based...
收藏 引用
14th International Conference on Information security and Cryptology, Inscrypt 2018
作者: Ma, Chuangui Ge, Aijun Zhang, Jie Army Aviation Institute Beijing China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, we introduce a new multi-authority ciphertext policy attribute-based encryption (MA-CP-ABE) system. In our system, there are multiple central authorities (CAs) and attribute authorities (AAs). The CAs w... 详细信息
来源: 评论
OSAF_e: One-Stage Anchor Free Object Detection Method Considering Effective Area  9th
OSAF_e: One-Stage Anchor Free Object Detection Method Consid...
收藏 引用
9th International Conference on Artificial Intelligence and Mobile Services, AIMS 2020, held as part of the Services Conference Federation, SCF 2020
作者: Zhang, Yong Zhang, Lizong Rao, Zhihong Duan, Guiduo Wang, Chunyu School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China China Electronic Technology Cyber Security Co. Ltd. Chengdu610000 China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu611731 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China
The task of object detection is to identify the bounding box of the object and its corresponding category in images. In this paper, we propose a new one-stage anchor free object detection algorithm OSAF_e, with the co... 详细信息
来源: 评论
Sustainable Wireless networks via Reconfigurable Intelligent Surfaces (RISs): Overview of the ETSI ISG RIS
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Ruiqi Zheng, Shuang Wu, Qingqing Jiang, Yifan Zhang, Nan Liu, Yuanwei Di Renzo, Marco Alexandropoulos, George C. The State Key Laboratory of Mobile Network and Mobile Multimedia Technology Shenzhen China Wireless and Computing Research Institute ZTE Corporation Shenzhen China The Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China The School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom Université Paris-Saclay CNRS CentraleSupélec Laboratoire des Signaux et Systèmes 3 Rue Joliot-Curie Gif-sur-Yvette91192 France The Department of Informatics and Telecommunications National and Kapodistrian University of Athens Panepistimiopolis Ilissia Athens15784 Greece
Reconfigurable Intelligent Surfaces (RISs) are a novel form of ultra-low power devices that are capable to increase the communication data rates as well as the cell coverage in a cost- and energy-efficient way. This i... 详细信息
来源: 评论
A local descriptor with physiological characteristic for finger vein recognition
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Liping Li, Weijun Ning, Xin Institute of Semiconductors Chinese Academy of Sciences Beijing Key Laboratory of Semiconductor Neural Network Intelligent Sensing and Computing Technology School of Microelectronics University of Chinese Academy of Sciences Cognitive Computing Technology Joint Laboratory Wave Group Beijing China
Local feature descriptors exhibit great superiority in finger vein recognition due to their stability and robustness against local changes in images. However, most of these are methods use general-purpose descriptors ... 详细信息
来源: 评论
On the Relation between Quality-Diversity Evaluation and Distribution-Fitting Goal in Text Generation
arXiv
收藏 引用
arXiv 2020年
作者: Li, Jianing Lan, Yanyan Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
The goal of text generation models is to fit the underlying real probability distribution of text. For performance evaluation, quality and diversity metrics are usually applied. However, it is still not clear to what ... 详细信息
来源: 评论
Attention-Based Interaction Trajectory Prediction  9th
Attention-Based Interaction Trajectory Prediction
收藏 引用
9th International Conference on Artificial Intelligence and Mobile Services, AIMS 2020, held as part of the Services Conference Federation, SCF 2020
作者: Liu, Zhe Zhang, Lizong Rao, Zhihong Liu, Guisong School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China China Electronic Technology Cyber Security Co. Ltd. Chengdu610000 China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu611731 China School of Computer Science Zhongshan Institute University of Electronic Science and Technology of China Zhongshan528402 China
Trajectory prediction is a hot topic in the field of computer vision and has a wide range of applications. Trajectory prediction refers to predicting the future trajectory of a target based on its past trajectory. Thi... 详细信息
来源: 评论
ICT at TREC 2019: Fair Ranking Track  28
ICT at TREC 2019: Fair Ranking Track
收藏 引用
28th Text REtrieval Conference, TREC 2019
作者: Wang, Meng Zhang, Haopeng Liang, Fuhuai Feng, Bin Zhao, Di CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
In this paper, we will introduce our work in the 2019 TREC fair ranking task. In temporal academic search, more and more people choose to pay attention to the fairness constraints of ranking. The purpose of this task ...
来源: 评论
Peripheral-free device pairing by randomly switching power
arXiv
收藏 引用
arXiv 2020年
作者: Shao, Zhijian Weng, Jian Zhang, Yue Wu, Yongdong Li, Ming Weng, Jiasi Luo, Weiqi Yu, Shui College of Informatin Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China University of Technology Sydney UltimoNSW Australia
The popularity of Internet-of-Things (IoT) comes with security concerns. Attacks against wireless communication venues of IoT (e.g., Man-in-the-Middle attacks) have grown at an alarming rate over the past decade. Pair... 详细信息
来源: 评论