咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2571-2580 订阅
排序:
Improving preparation and luminescence properties of Eu and dy doped Sr2MgSi2O7 phosphors by adding excess silica
收藏 引用
Scientific Reports 2025年 第1期15卷 1-14页
作者: Zhang, Chi Wei, Liuming Liu, Qin Cui, Ruirui Deng, Chaoyong Li, Jingyu College of Electrical Engineering Henan University of Technology Zhengzhou 450001 China Department of Network Security Henan Police College Zhengzhou 450046 China Spallation Neutron Source Science Center Dongguan 523803 China Key Laboratory of Functional Composite Materials of Guizhou Province College of Big Data and Information Engineering Guizhou University Guiyang 550025 China Anqiu Qingyun Bilingual School Weifang China
Solid state reaction method is most commonly used to synthesize Sr2MgSi2O7: Eu2+, Dy3+ phosphors. In order to avoid the energy waste caused by high sintering temperature, we systematically studied and optimized the pr... 详细信息
来源: 评论
Spin-induced orbital frustration in a hexagonal optical lattice
arXiv
收藏 引用
arXiv 2021年
作者: Li, Yongqiang Yuan, Jianmin Zhou, Xiaoji Li, Xiaopeng Department of Physics National University of Defense Technology Changsha410073 China Department of Physics Graduate School of China Academy of Engineering Physics Beijing100193 China State Key Laboratory of Advanced Optical Communication System and Network Department of Electronics Peking University Beijing100871 China State Key Laboratory of Surface Physics Institute of Nanoelectronics and Quantum Computing Department of Physics Fudan University Shanghai200438 China Shanghai Qi Zhi Institute AI Tower Xuhui District Shanghai200232 China
Complex lattices provide a versatile ground for fascinating quantum many-body physics. Here, we propose an exotic mechanics for generating orbital frustration in hexagonal lattices. We study two-component (pseudospin-... 详细信息
来源: 评论
Global context aware RCNN for object detection
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Wenchao Fu, Chong Xie, Haoyu Zhu, Mai Tie, Ming Chen, Junxin School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Science and Technology on Space Physics Laboratory Beijing100076 China College of Medicine and Biological Information Engineering Northeastern University Shenyang110819 China
RoIPool/RoIAlign is an indispensable process for the typical two-stage object detection algorithm, it is used to rescale the object proposal cropped from the feature pyramid to generate a fixed size feature map. Howev... 详细信息
来源: 评论
An improved RL-based framework for multiple biomedical event extraction via self-supervised learning
An improved RL-based framework for multiple biomedical event...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yao Zhao Weizhong Zhao Xingpeng Jiang Tingting He Bianping Su Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Central China Normal University Wuhan Hubei PR China School of Computer Central China Normal University Wuhan Hubei PR China National Language Resources Monitoring & Research Center for Network Media Central China Normal University Wuhan Hubei PR China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin PR China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin PR China Xi’an University of Architecture and Technology Xi’an Shanxi PR China
The main goal of biomedical event extraction is to structurally extract biomedical events from texts, however, the specificity of the domain makes both text modeling and data annotation very difficult. We propose a se... 详细信息
来源: 评论
DQ-RM: Deep Reinforcement Learning-based Route Mutation Scheme for Multimedia Services
DQ-RM: Deep Reinforcement Learning-based Route Mutation Sche...
收藏 引用
International Wireless Communications and Mobile computing Conference, IWCMC
作者: Tao Zhang Changqiao Xu Bingchi Zhang Xiaohui Kuang Yue Wang Shujie Yang Gabriel-Miro Muntean State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China School of International Beijing University of Posts and Telecommunications Beijing China State key Laboratory of Science and Technology on Information System Security Beijing China Beijing Key Laboratory of Network System Architecture and Convergence Beijing China Performance Engineering Lab. School of Electronic Engineering Dublin City University Dublin Ireland
Increasingly growing various multimedia services (e.g., interactive live video and so on) have brought tremendous pressure on existing static defense techniques. To cope with inherent drawback of static defense techni... 详细信息
来源: 评论
A novel Image security Protection Method Based on DCT Compression Theory and Hyper-chaotic Mapping
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2066卷
作者: Xianglian Xue Haiyan Jin School of Computer Science and Engineering Xi'an University of Technology Xi'an 710077Shaanxi China Shaanxi University of Chinese Medicine Xianyang712046Shaanxi China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an710077Shaanxi China
This paper studies the current situation of image compression encryption and analyzes the influence of low frequency (DC coefficient) and high frequency (AC coefficient) on image structure in DCT transformation. Based...
来源: 评论
Average Channel Capacity Analysis for Visible Light Communications with Random Receivers
Average Channel Capacity Analysis for Visible Light Communic...
收藏 引用
International Conference on Wireless Communications and Signal Processing (WCSP)
作者: Xian-Tao Fu Rong-Rong Lu Sheng-Hong Lin Jin-Yuan Wang Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing China Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Key Laboratory of Opto-technology and Intelligent Control Ministry of Education Lanzhou Jiaotong University Lanzhou China National Local Joint Engineering Research Center for Communication and Network Technologies Nanjing University of Posts and Telecommunications Nanjing China
For indoor visible light communications (VLC), the receivers are usually set to be fixed ones in previous studies. However, the locations and orientations of receivers are affected by random factors in practical VLC s... 详细信息
来源: 评论
Predicting Internet of Things Data Traffic Through LSTM and Autoregressive Spectrum Analysis
Predicting Internet of Things Data Traffic Through LSTM and ...
收藏 引用
IEEE Symposium on network Operations and Management
作者: Yuhong Li Di Jin Bailin Wang Xiang Su Jukka Riekki Chao Sun Hanyu Wei Hao Wang Lei Han State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Computer Science University of Helsinki Helsinki Finland Center for Ubiquitous Computing University of Oulu Oulu Finland Network Technology Laboratory Huawei Technologies Co. Ltd Nanjing China
The rapid increase of Internet of Things (IoT) applications and services has led to massive amounts of heterogeneous data. Hence, we need to re-think how IoT data influences the network. In this paper, we study the ch...
来源: 评论
Modulation Recognition based on Incremental Deep Learning
Modulation Recognition based on Incremental Deep Learning
收藏 引用
International Conference on Mechanical, Control and Computer Engineering (ICMCCE)
作者: Yong Yang Menghan Chen XiaoYa Wang Piming Ma The 54th Research Institute of CETC Shijiazhuang China School of Information Science and Engineering Shandong University Qingdao China School of Information and Communication Engineering National Engineering Laboratory for Mobile Network Security Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications line Beijing China
Incremental learning has emerged to solve the problem of incrementally updating the classification model as the number of data classes grows. There are many challenges in incremental learning such as catastrophic forg... 详细信息
来源: 评论
A Joint Operation Method of Fuzzy Test and Dynamic Symbol Execution
A Joint Operation Method of Fuzzy Test and Dynamic Symbol Ex...
收藏 引用
International Conference on Intelligent Computation technology and Automation, ICICTA
作者: Zesheng Xi Gongxuan Zhang Bo Zhang School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China Institute of Information and Communication Global Energy Interconnection Research Institute Nanjing China State Grid Key Laboratory of Information & Network Security Nanjing China
Fuzzy testing and symbol execution are the main methods of vulnerability mining for binary programs. Among them, fuzzy testing is time-consuming due to randomness, while symbol execution is limited by path explosion d... 详细信息
来源: 评论