咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2501-2510 订阅
排序:
Research of Association Rules Mining based on Fuzzy Alarm Extraction
Research of Association Rules Mining based on Fuzzy Alarm Ex...
收藏 引用
作者: Li tongyan Lei dong Qin Zhiguang Chengdu University of Information Technology Dept.of Communication Engineering Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu University of Information Technology Dept.of Communication Engineering
In communication alarm correlation analysis, original alarm data often have problems about information redundancy, data incompleteness, time synchronization and "sharp boundary". This paper proposed a novel ... 详细信息
来源: 评论
AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain
收藏 引用
Computers and security 2020年 99卷
作者: Shao, Wei Jia, Chunfu Xu, Yunkai Qiu, Kefan Gao, Yan He, Yituo College of Cyber Sciences Nankai University Tianjin300350 China School of Cyber Security and Computer Hebei University Tianjin China Bell Honors School Nanjing University of Posts and Telecommunications Nanjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
In this paper, we propose a framework named AttriChain that supports transactions with anonymous sender identity and threshold traceability in permissioned blockchain. AttriChain realizes on-chain access control and d... 详细信息
来源: 评论
Mapping Genome Variants Sheds Light on Genetic and Phenotypic Differentiation in Chinese
收藏 引用
Genomics, Proteomics & Bioinformatics 2019年 第3期17卷 226-228页
作者: Li Guo Kai Ye MOE Key Laboratory for Intelligent Networks and Network Security Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China The School of Life Science and Technology Xi’an Jiaotong UniversityXi’an 710049China The First Affiliated Hospital of Xi’an Jiaotong University Xi’an 710061China
Every human being looks different in one way or the ***’s the work of genetic variations,the ultimate driving force for evolution as well as the cause for many human *** human genetic variants reveals global genetic ... 详细信息
来源: 评论
A Secure Beamforming Design: When Fluid Antenna Meets NOMA
arXiv
收藏 引用
arXiv 2024年
作者: Mai, Lifeng Yao, Junteng Tang, Jie Wu, Tuo Wong, Kai-Kit Shin, Hyundong Adachi, Fumiyuki The Electric Power Research Institute China Southern Power Grid Guangzhou510663 China The Guangdong Provincial Key Laboratory of Power System Network Security Guangdong Guangzhou China The Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo315211 China The School of Electronic and Information Engineering South China University of Technology Guangzhou510006 China The School of Electrical and Electronic Engineering Nanyang Technological University 639798 Singapore The Department of Electronic and Electrical Engineering University College London Torrington Place WC1E 7JE United Kingdom The Department of Electronic Engineering Kyung Hee University Gyeonggi-do Yongin-si17104 Korea Republic of Tohoku University Sendai Japan
This letter proposes a secure beamforming design for downlink non-orthogonal multiple access (NOMA) systems utilizing fluid antenna systems (FAS). We consider a setup where a base station (BS) with M fluid antennas (F... 详细信息
来源: 评论
Univariate Forecasting of time series data Based on Seq2Seq Model  20
Univariate Forecasting of time series data Based on Seq2Seq ...
收藏 引用
Proceedings of the 2020 4th International Conference on Electronic Information technology and Computer Engineering
作者: Yanwen Guo Tao Wu Yanbing Liu Yixin Jiang Department of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China Chongqing Engineering Laboratory of Internet and Information Sccurity Chongqing University of Posts and Telecommunications Chongqing China Electric Power Research Institute CSG Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
With the release of country's 2020 new infrastructure projects, the increasing demand for electricity in various projects has further promoted the intelligent upgrade of the power grid. The processing of grid data... 详细信息
来源: 评论
A Distributed Dynamic Adaptive and Fast Balancing SDN Controller Management  6
A Distributed Dynamic Adaptive and Fast Balancing SDN Contro...
收藏 引用
6th Annual 2018 International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2018
作者: Liu, Yang He, Qian Li, Xiongying Zhou, Shuiming Guangxi Transportation Research and Consulting Co. Ltd Nanning530007 China Guangxi Key Laboratory of Cryptograph and Information Security Guangxi University Key Laboratory of Cloud Computing and Complex System Guilin University of Electronic Technology Guilin541004 China
Tradition Software Defined network (SDN) suffers from single point failure and uneven load distribution problems. Multiple SDN controllers work together to construct a distributed dynamic adaptive cluster with dynamic... 详细信息
来源: 评论
Modelling universal order book dynamics in bitcoin market
arXiv
收藏 引用
arXiv 2021年
作者: Shi, Fabin Aden, Nathan Huang, Shengda Johnson, Neil Sun, Xiaoqian Gao, Jinhua Xu, Li Shen, Huawei Cheng, Xueqi Song, Chaoming CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing100049 China Department of Physics University of Miami Coral GablesFL33142 United States Physics Department George Washington University WashingtonD.C.20052 United States
Understanding the emergence of universal features such as the stylized facts in markets is a longstanding challenge that has drawn much attention from economists and physicists. Most existing models, such as stochasti... 详细信息
来源: 评论
Provably Robust Node Classification via Low-Pass Message Passing
Provably Robust Node Classification via Low-Pass Message Pas...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Yiwei Wang Shenghua Liu Minji Yoon Hemank Lamba Wei Wang Christos Faloutsos Bryan Hooi School of Computing National University of Singapore Singapore Institute of Computing Technology Chinese Academy of Sciences China CAS Key Laboratory of Network Data Science & Technology CAS and University of Chinese Academy of Sciences Beijing China Carnegie Mellon University United States
Graph Convolutional networks (GCNs) have achieved state-of-the-art performance on node classification. However, recent works have shown that GCNs are vulnerable to adversarial attacks, such as additions or deletions o... 详细信息
来源: 评论
Verifiable and Privacy-Preserving Outsourcing of Matrix Multiplications
Verifiable and Privacy-Preserving Outsourcing of Matrix Mult...
收藏 引用
International Conference on Cyber-Enabled Distributed computing and Knowledge Discovery, CyberC
作者: Meng Zhao Yong Ding Yujue Wang Huiyong Wang Bo Han School of Mechanical and Electrical Engineering Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China
Matrix operation is a type of basic operations in many application scenarios. Especially, in the server-assisted applications, the user may need to delegate remote server to perform matrix operations to accomplish the... 详细信息
来源: 评论
GraphEdge: Dynamic graph partition and task scheduling for GNNs computing in edge network
收藏 引用
Information Fusion 2025年 124卷
作者: Wenjing Xiao Chenglong Shi Miaojiang Chen Zhiquan Liu Min Chen H. Herbert Song School of Computer Electronics and Information Guangxi University Nanning 530004 China Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning 530004 China College of Cyber Security Jinan University Guangzhou 510632 China School of Computer Science and Engineering South China University of Technology Guangzhou 510006 China Pazhou Laboratory Guangzhou 510330 China Department of Information Systems University of Maryland Baltimore County (UMBC) Baltimore MD 21250 USA
With the exponential growth of Internet of Things (IoT) devices, edge computing (EC) is gradually playing an important role in providing cost-effective services. However, existing approaches struggle to perform well i...
来源: 评论