咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2451-2460 订阅
排序:
A comparative analysis of risk factors in taxi-related crashes using XGBoost and SHAP
收藏 引用
International Journal for Consumer and Product Safety 2024年 第3期31卷
作者: Zhipeng Peng Jingping Zuo Hao Ji Yuan RengTeng Yonggang Wang a School of Economics and Management Xi’an Technological University Xi’an China b Jiangsu Key Laboratory of Urban ITS School of Transportation Southeast University Nanjing China c College of Transportation Engineering Chang’an University Xi’an Chinad Key Laboratory of Transport Industry of Management Control and Cycle Repair Technology for Traffic Network Facilities in Ecological Security Barrier Area Xi’an China
Taxis play a crucial role in urban public transportation, but the traffic safety situation of taxi drivers is far from optimistic, especially considering the introduction of ride-hailing services into the taxi industr... 详细信息
来源: 评论
Learning discrete representations via constrained clustering for effective and efficient dense retrieval
arXiv
收藏 引用
arXiv 2021年
作者: Zhan, Jingtao Mao, Jiaxin Liu, Yiqun Guo, Jiafeng Zhang, Min Ma, Shaoping Department of Computer Science and Technology Institute for Artificial Intelligence Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China Beijing Key Laboratory of Big Data Management and Analysis Methods Gaoling School of Artificial Intelligence Renmin University of China Beijing100872 China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
Dense Retrieval (DR) has achieved state-of-the-art first-stage ranking effectiveness. However, the efficiency of most existing DR models is limited by the large memory cost of storing dense vectors and the time-consum... 详细信息
来源: 评论
An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems
收藏 引用
International Journal of Wireless and Mobile computing 2019年 第1期16卷 41-49页
作者: Ye, Tao Cai, Yongquan Zhao, Xu Yang, Yongli Wang, Wei Zhu, Yi Faculty of Information Technology Beijing University of Technology Beijing China College of Computer Qinghai Nationalities University Xining China Faculty of Information Technology Beijing University of Technology Beijing Key Laboratory of Trusted Computing Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China College of Applied Sciences Beijing University of Technology Beijing100124 China
The CP-ABE-based access control scheme, which can better realise the access control of many-to-multi-ciphertext shared in the cloud storage architecture, is still facing the problems that the system cost is too large,... 详细信息
来源: 评论
Model-Based Reinforcement Learning for Quantized Federated Learning Performance Optimization
Model-Based Reinforcement Learning for Quantized Federated L...
收藏 引用
GLOBECOM 2022 - 2022 IEEE Global Communications Conference
作者: Nuocheng Yang Sihua Wang Mingzhe Chen Christopher G. Brinton Changchuan Yin Walid Saad Shuguang Cui Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing China State Key Laboratory Of Networking And Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral Gables FL USA School of Electrical and Computer Engineering Purdue University West Lafayette IN USA Bradley Department of Electrical and Computer Engineering Virginia Tech Arlington VA USA Shenzhen Research Institute of Big Data (SRIBD) and the Future Network of Intelligence Institute (FNii) Chinese University of Hong Kong Shenzhen China
This paper considers improving wireless communication and computation efficiency in federated learning (FL) via model quantization. In the proposed bitwidth FL scheme, edge devices train and transmit quantized version... 详细信息
来源: 评论
6G Enabled Advanced Transportation Systems
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Ruiqi Hua, Meng Guan, Ke Wang, Xiping Zhang, Leyi Mao, Tianqi Zhang, Di Wu, Qingqing Jamalipour, Abbas The State Key Laboratory of Mobile Network and Mobile Multimedia Technology Shenzhen518055 China The Wireless and Computing Research Institute ZTE Corporation Beijing100029 China The Department of Electrical Engineering City University of Hong Kong 999077 Hong Kong The State Key Laboratory of Advanced Rail Autonomous Operation The School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China The Advanced Research Institute of Multidisciplinary Science Beijing Institute of Technology Beijing100081 China The School of Electrical and Information Engineering Zhengzhou University Zhengzhou450001 China The School of Electrical Engineering Korea University Seoul02841 Korea Republic of Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China School of Electrical and Information Engineering University of Sydney CamperdownNSW2006 Australia
With the emergence of communication services with stringent requirements such as autonomous driving or on-flight Internet, the sixth-generation (6G) wireless network is envisaged to become an enabling technology for f... 详细信息
来源: 评论
Interpretation-enabled software reuse detection based on a multi-level birthmark model
arXiv
收藏 引用
arXiv 2021年
作者: Xu, Xi Zheng, Qinghua Yan, Zheng Fan, Ming Jia, Ang Liu, Ting Key Laboratory of Intelligent Networks and Network Security Ministry of Education China School of Computer Science and Technology Xi'an Jiaotong University China School of Cyber Science and Engineering Xi'an Jiaotong University China State Key Lab on Integrated Services Networks School of Cyber Engineering Xidian University China Department of Communications and Networking Aalto University Finland
Software reuse, especially partial reuse, poses legal and security threats to software development. Since its source codes are usually unavailable, software reuse is hard to be detected with interpretation. On the oth... 详细信息
来源: 评论
Interpretation-Enabled Software Reuse Detection Based on a Multi-level Birthmark Model
Interpretation-Enabled Software Reuse Detection Based on a M...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Xi Xu Qinghua Zheng Zheng Yan Ming Fan Ang Jia Ting Liu Key Laboratory of Intelligent Networks and Network Security Ministry of Education China School of Computer Science and Technology Xi’an Jiaotong University China State Key Lab on Integrated Services Networks School of Cyber Engineering Xidian University China Department of Communications and Networking Aalto University Finland School of Cyber Science and Engineering Xi’an Jiaotong University China
Software reuse, especially partial reuse, poses legal and security threats to software development. Since its source codes are usually unavailable, software reuse is hard to be detected with interpretation. On the oth... 详细信息
来源: 评论
Upper security Bounds for Coherent-One-Way Quantum key Distribution
收藏 引用
Physical Review Letters 2020年 第26期125卷 260510-260510页
作者: Javier González-Payo Róbert Trényi Weilong Wang Marcos Curty Escuela de Ingeniería de Telecomunicación Department of Signal Theory and Communications University of Vigo Vigo E-36310 Spain State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan 450001 China
The performance of quantum key distribution (QKD) is severely limited by multiphoton pulses emitted by laser sources due to the photon-number splitting attack. Coherent-one-way (COW) QKD has been introduced as a promi... 详细信息
来源: 评论
New constructions of MDS self-dual and self-orthogonal codes via GRS codes
arXiv
收藏 引用
arXiv 2021年
作者: Huang, Ziteng Fang, Weijun Fu, Fang-Wei Chern Institute of Mathematics and LPMC Nankai University Tianjin300071 China Shenzhen International Graduate School Tsinghua University PCL Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen518055 China Chern Institute of Mathematics and LPMC Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China
Recently, the construction of new MDS Euclidean self-dual codes has been widely investigated. In this paper, for square q, we utilize generalized Reed-Solomon (GRS) codes and their extended codes to provide four gener... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China University of Texas at Dallas Dallas United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论