咨询与建议

限定检索结果

文献类型

  • 2,101 篇 会议
  • 1,612 篇 期刊文献

馆藏范围

  • 3,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,413 篇 工学
    • 1,834 篇 计算机科学与技术...
    • 1,467 篇 软件工程
    • 603 篇 信息与通信工程
    • 346 篇 电气工程
    • 275 篇 控制科学与工程
    • 240 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 182 篇 网络空间安全
    • 141 篇 机械工程
    • 113 篇 光学工程
    • 94 篇 生物医学工程(可授...
    • 94 篇 安全科学与工程
    • 89 篇 交通运输工程
    • 88 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 66 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,089 篇 理学
    • 623 篇 数学
    • 263 篇 物理学
    • 250 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 90 篇 化学
  • 606 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 306 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 125 篇 accuracy
  • 109 篇 training
  • 106 篇 computational mo...
  • 102 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 72 篇 data models
  • 68 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 59 篇 data privacy
  • 59 篇 robustness
  • 58 篇 protocols
  • 53 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 optimization

机构

  • 271 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 97 篇 university of ch...
  • 83 篇 school of comput...
  • 83 篇 key laboratory o...
  • 66 篇 school of cyber ...
  • 65 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 60 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 52 篇 tianjin key labo...
  • 50 篇 network and data...
  • 50 篇 shandong fundame...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 institute of inf...

作者

  • 100 篇 cheng xueqi
  • 49 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 wang yichuan
  • 20 篇 yang zhiyong

语言

  • 2,977 篇 英文
  • 661 篇 其他
  • 87 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3713 条 记 录,以下是2471-2480 订阅
排序:
TVIDS: Trusted Virtual IDS With SGX
收藏 引用
China Communications 2019年 第10期16卷 133-150页
作者: Juan Wang Shirong Hao Yi Li Zhi Hong Fei Yan Bo Zhao Jing Ma Huanguo Zhang Key Laboratory of Aerospace Information Security and Trust Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072HubeiChina School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China Science and Technology on Information Assurance Laboratory Beijing 100072China
network functions such as intrusion detection systems (IDS) have been increasingly deployed as virtual network functions or outsourced to cloud service providers so as to achieve the scalability and agility, and reduc... 详细信息
来源: 评论
A Dynamic Collaborative Filtering Algorithm based on Convolutional Neural networks and Multi-layer Perceptron
A Dynamic Collaborative Filtering Algorithm based on Convolu...
收藏 引用
International Conference on Ubiquitous computing and Communications and International Symposium on Cyberspace and security (IUCC-CSS)
作者: Qiang Sun Lei-lei Shi Lu Liu Zi-xuan Han Liang Jiang Yao Lu John Panneerselvam School of Computer Science and Telecommunication Engineering Jiangsu University China Jiangsu Key Laboratory of Security Tech. for Industrial Cyberspace Jiangsu University China School of Computing and Mathematical Sciences University of Leicester UK School of Computer Jiangsu University of science and technology China
In the current information era of enormous amount of data generation, recommendation systems are increasingly used as an efficient way to mitigate information overload in networks. The recommendation systems are used ... 详细信息
来源: 评论
Sentiment Analysis of Web Text Based on Deep Learning with a Attention Mechanism
Sentiment Analysis of Web Text Based on Deep Learning with a...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)
作者: Qing Yu Hui Zhao Kaiwen Jiang Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
The sentiment analysis of online commentary is a hot research topic in the field of network information mining. Traditional text sentiment analysis methods are mainly based on emotional dictionaries or machine learnin...
来源: 评论
ON THE OPPORTUNITIES OF GREEN computing: A SURVEY
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, You Lin, Xiujing Zhang, Xiang Wang, Maolin Jiang, Gangwei Lu, Huakang Wu, Yupeng Zhang, Kai Yang, Zhe Wang, Kehang Sui, Yongduo Jia, Fengwei Tang, Zuoli Zhao, Yao Zhang, Hongxuan Yang, Tiannuo Chen, Weibo Mao, Yunong Li, Yi Bao, De Li, Yu Liao, Hongrui Liu, Ting Liu, Jingwen Guo, Jinchi Zhao, Xiangyu Wei, Ying Qian, Hong Liu, Qi Wang, Xiang Chan, Wai Kin Li, Chenliang Li, Yusen Yang, Shiyu Yan, Jining Mou, Chao Han, Shuai Jin, Wuxia Zhang, Guannan Zeng, Xiaodong Tsinghua University China Shanghai Jiaotong University China University of Science and Technology of China China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Huazhong University of Science and Technology China Shanghai Institute of AI for Education School of Computer Science and Technology East China Normal University China Xi’an Jiaotong University China College of Computer Science Nankai University China School of Computer Science China University of Geosciences China School of Information Science and Technology Beijing Forestry University China Engineering Research Center for Forestry-Oriented Intelligent Information Processing National Forestry and Grassland Administration China Guangzhou University China Nanyang Technological University Singapore City University of Hong Kong Hong Kong Wuhan University China State Key Laboratory for Novel Software Technology Nanjing University China Ant Group China
Artificial Intelligence (AI) has achieved significant advancements in technology and research with the development over several decades, and is widely used in many areas including computing vision, natural language pr... 详细信息
来源: 评论
Passive beamforming design for intelligent reflecting surface assisted MIMO systems
arXiv
收藏 引用
arXiv 2021年
作者: Feng, Chenghao Shen, Wenqian Gao, Xinyu An, Jianping School of Information and Electronics Beijing Institute of Technology Beijing100081 China Shaanxi Key Laboratory of Information Communication Network and Security Xian University of Posts and Telecommunications Shaanxi Xian710121 China Huawei Technologies Co. Ltd. Beijing100085 China
Intelligent reflecting surfaces (IRSs) constitute passive devices, which are capable of adjusting the phase shifts of their reflected signals, and hence they are suitable for passive beamforming. In this paper, we con... 详细信息
来源: 评论
Velocity-Driven Particle Swarm Optimization  19
Velocity-Driven Particle Swarm Optimization
收藏 引用
Proceedings of the 2019 8th International Conference on computing and Pattern Recognition
作者: Wei Li Yaochi Fan Qiaoyong Jiang Qingzheng Xu School of Computer Science and Engineering Xi'an University of Technology and Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China College of Information and Communication National University of Defense Technology Xi'an China
Particle swarm optimization (PSO) is an efficient nature-inspired optimization algorithm, which has been widely applied in many engineering fields. The performance of particle swarm optimization (PSO) has been signifi... 详细信息
来源: 评论
Research on machine learning prediction of air quality index based on SPSS  3
Research on machine learning prediction of air quality index...
收藏 引用
3rd International Conference on Computer network, Electronic and Automation, ICCNEA 2020
作者: Ma, Limei Gao, Yijun Zhao, Chen College of Information Technology Hebei Normal University Shijiazhuang China School of Information Studies Dominican University River Forest United States Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China School of Information Studies Dominican University River Forest River ForestIN United States
Air From autumn to winter, air pollution in North China is very serious. If we can make effective prediction, we can achieve effective prevention. In this paper, SPSS is used to associate a phenomenon with multiple fa... 详细信息
来源: 评论
A Semantic-based Replacement for Event Image Privacy
A Semantic-based Replacement for Event Image Privacy
收藏 引用
IEEE International Conference on Computational Science and Engineering, CSE
作者: Zhenfei Chen Zhu Tianqing Bing Tian Yu Wang Wei Ren School of Computer Science China University of Geosciences Wuhan P.R. China Institute of Artificial Intelligence and Blockchain Guangzhou University Guangzhou P.R. China School of Computer Science China University of Geosciences Guangxi Key Laboratory of Cryptography and Information Security Key Laboratory of Network Assessment Technology CAS Beijing P.R. China
Thanks to the continuous development of deep learning and the updating of deep neural networks, the accuracy of various computer vision tasks continue improving. On the one hand, the accuracy of image recognition is s... 详细信息
来源: 评论
Two-phases detection scheme: Detecting android malware in android markets
Two-phases detection scheme: Detecting android malware in an...
收藏 引用
International Conference on Applications and Techniques in Cyber Intelligence, ATCI 2018
作者: Su, Xin Lin, Jiuchuan Shen, Fuhui Zheng, Yi Hunan Provincial Key Laboratory of Network Investigational Technology Hunan Police Academy Changsha China Department of Information Technology Hunan Police Academy Changsha China Key Lab of Information Network Security of Ministry of Public Security The Third Research Institute of Ministry of Public Security Shanghai China Zhejiang Economic Information Center Hangzhou China
Recently, Android application becomes popular and important in human’s daily work, life, entertainment. However, because of open source of Android application, more and more malware aim to this platform and launch va... 详细信息
来源: 评论
OPEN: orthogonal propagation with ego-network modeling  22
OPEN: orthogonal propagation with ego-network modeling
收藏 引用
Proceedings of the 36th International Conference on Neural Information Processing Systems
作者: Liang Yang Lina Kang Qiuliang Zhang Mengzhe Li Bingxin Niu Dongxiao He Zhen Wang Chuan Wang Xiaochun Cao Yuanfang Guo School of Artificial Intelligence Hebei University of Technology Tianjin China College of Intelligence and Computing Tianjin University Tianjin China School of Artificial Intelligence OPtics and ElectroNics (iOPEN) Northwestern Polytechnical University Xi'an China and School of Cybersecurity Northwestern Polytechnical University Xi'an China State Key Laboratory of Information Security IIE CAS Beijing China School of Cyber Science and Technology Sun Yat-sen University Shenzhen China School of Computer Science and Engineering Beihang University Beijing China and Zhongguancun Laboratory Beijing China
To alleviate the unfavorable effect of noisy topology in Graph Neural networks (GNNs), some efforts perform the local topology refinement through the pairwise propagation weight learning and the multi-channel extensio...
来源: 评论