咨询与建议

限定检索结果

文献类型

  • 2,101 篇 会议
  • 1,612 篇 期刊文献

馆藏范围

  • 3,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,413 篇 工学
    • 1,834 篇 计算机科学与技术...
    • 1,467 篇 软件工程
    • 603 篇 信息与通信工程
    • 346 篇 电气工程
    • 275 篇 控制科学与工程
    • 240 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 182 篇 网络空间安全
    • 141 篇 机械工程
    • 113 篇 光学工程
    • 94 篇 生物医学工程(可授...
    • 94 篇 安全科学与工程
    • 89 篇 交通运输工程
    • 88 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 66 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,089 篇 理学
    • 623 篇 数学
    • 263 篇 物理学
    • 250 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 90 篇 化学
  • 606 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 306 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 125 篇 accuracy
  • 109 篇 training
  • 106 篇 computational mo...
  • 102 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 72 篇 data models
  • 68 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 59 篇 data privacy
  • 59 篇 robustness
  • 58 篇 protocols
  • 53 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 optimization

机构

  • 271 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 97 篇 university of ch...
  • 83 篇 school of comput...
  • 83 篇 key laboratory o...
  • 66 篇 school of cyber ...
  • 65 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 60 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 52 篇 tianjin key labo...
  • 50 篇 network and data...
  • 50 篇 shandong fundame...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 institute of inf...

作者

  • 100 篇 cheng xueqi
  • 49 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 wang yichuan
  • 20 篇 yang zhiyong

语言

  • 2,977 篇 英文
  • 661 篇 其他
  • 87 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3713 条 记 录,以下是2531-2540 订阅
排序:
Analysis of Stock Market Based on Machine Learning  2
Analysis of Stock Market Based on Machine Learning
收藏 引用
2nd International Conference on Computer network, Electronic and Automation, ICCNEA 2019
作者: Tianma, Wang Wang, Fangwei Stuart School of Business Illinois Institute of Technology Chicago United States College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Key Laboratory of Network and Information Security Hebei Province Shijiazhuang China
This paper uses SPSS tools and factor analysis theory to make a comprehensive evaluation of the company's stock performance. Data come from 10 representative listed companies in different industries. Because of th... 详细信息
来源: 评论
Cross Project Defect Prediction via Balanced Distribution Adaptation Based Transfer Learning
收藏 引用
Journal of Computer Science & technology 2019年 第5期34卷 1039-1062页
作者: Zhou Xu Shuai Pang Tao Zhang Xia-Pu Luo Jin Liu Yu-Tian Tang Xiao Yu Lei Xue College of Computer Science and Technology Harbin Engineering UniversityHarbin 150001China School of Computer Science Wuhan UniversityWuhan 430072China Department of Computing The Hong Kong Polytechnic UniversityHong Kong 999077China Department of ComputingThe Hong Kong Polytechnic UniversityHong Kong 999077China Key Laboratory of Network Assessment Technology Institute of Information EngineeringChinese Academy of Sciences Beijing 100190China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin 541004China Department of Computer Science City University of Hong KongHong Kong 999077China
Defect prediction assists the rational allocation of testing resources by detecting the potentially defective software modules before releasing products. When a project has no historical labeled defect data, cross pro... 详细信息
来源: 评论
Label-consistency based graph neural networks for semi-supervised node classification
arXiv
收藏 引用
arXiv 2020年
作者: Xu, Bingbing Huang, Junjie Hou, Liang Shen, Huawei Gao, Jinhua Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China School of Computer and Control Engineering University of Chinese Academy of Sciences China
Graph neural networks (GNNs) achieve remarkable success in graph-based semi-supervised node classification, leveraging the information from neighboring nodes to improve the representation learning of target node. The ... 详细信息
来源: 评论
Enhancing security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi
收藏 引用
Chinese Journal of Electronics 2018年 第3期27卷 625-633页
作者: LIU Dong CHEN Jing DU Ruiying ZHANG Huanguo Key Laboratory of Aerospace Information Security and the Trusted Computing Ministry of Education School of ComputerWuhan University Science and Technology on Communication Security Laboratory North Automatic Control Technique Research Institute Collaborative Innovation Center of Geospatial Technology
Recently several reduced-operation two Factor authentication(2FA) methods have been proposed to improve the usability of traditional 2FA. The existing works cannot protect the user's password from online guessing ... 详细信息
来源: 评论
Improving fast segmentation with teacher-student learning  29
Improving fast segmentation with teacher-student learning
收藏 引用
29th British Machine Vision Conference, BMVC 2018
作者: Xie, Jiafeng Shuai, Bing Hu, Jian-Fang Lin, Jingyang Zheng, Wei-Shi School of Data and Computer Science Sun Yat-sen University China Nanyang Technological University Singapore Guangdong Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing MOE Hong Kong
Recently, segmentation neural networks have been significantly improved by demonstrating very promising accuracies on public benchmarks. However, these models are very heavy and generally suffer from low inference spe... 详细信息
来源: 评论
CarfRCNN: A Two-stage Effective Model For Instance Segmentation
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1884卷
作者: Yujie Chen Pengbiao Zhao Julin Chen Network and Data Security Key Laboratory of Sichuan Province University of Electr onic Science and Technology of China
With the rapid development of deep learning, many instance segmentation models have achieved good results in accuracy and time. But here are still many problems. In this paper, we proposed a two-stage model CarfRCNN. ...
来源: 评论
A security scheme for intelligent substation communications considering real-time performance
收藏 引用
Journal of Modern Power Systems and Clean Energy 2019年 第4期7卷 948-961页
作者: Jie ZHANG Jun’e LI Xiong CHEN Ming NI Ting WANG Jianbo LUO Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China NARI Group Corporation(State Grid Electric Power Research Institute) Nanjing 211106China NARI Technology Co.Ltd. Nanjing 211106China State Key Laboratory of Smart Grid Protection and Control Nanjing 211106China
Tampering,forgery and theft of the measurement and control messages in a smart grid could cause one breakdown in the power ***,no security measures are employed for communications in intelligent *** services in an int... 详细信息
来源: 评论
DLEDNet: A deep learning-based image encryption and decryption network for internet of medical things
arXiv
收藏 引用
arXiv 2020年
作者: Ding, Yi Wu, Guozheng Chen, Dajiang Zhang, Ning Gong, Linpeng Cao, Mingsheng Qin, Zhiguang Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu Sichuan610054 China Institute of Electronic and Information Engineering of UESTC in Guangdong Dongwan Guangdong China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu Sichuan610054 China National Natural Science Foundation of China Beijing China Department of Computing Science Texas A&M University-Corpus Christi Corpus ChristiTX78412 United States
With the rapid development of Internet of Medical Things (IoMT) technology, many medical imaging equipments are connected to the medical information network to facilitate the process of diagnosing and treating for doc... 详细信息
来源: 评论
A lightweight isolation mechanism for secure branch predictors
arXiv
收藏 引用
arXiv 2020年
作者: Zhao, Lutan Li, Peinan Hou, Rui Huang, Michael C. Li, Jiazhen Zhang, Lixin Qian, Xuehai Meng, Dan State Key Laboratory of Information Security Institute of Information Engineering CAS and University of Chinese Academy of Sciences University of Rochester Institute of Computing Technology CAS University of Southern California
Recently exposed vulnerabilities reveal the necessity to improve the security of branch predictors. Branch predictors record history about the execution of different programs, and such information from different proce... 详细信息
来源: 评论
Tile-based Multi-source Adaptive Streaming for 360-degree Ultra-High-Definition Videos
Tile-based Multi-source Adaptive Streaming for 360-degree Ul...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Xinjing Yuan Lingjun Pu Ruilin Yun Jingdong Xu Institute of Systems and Networks College of Computer Science Nankai University Tianjin China State Key Laboratory of Integrated Services Networks (Xidian University) Xi’an China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
360° UHD videos have absorbed great attention in recent years. However, as they are of significant size and usually watched from a close range, they require extremely high bandwidth for a good immersive experienc... 详细信息
来源: 评论