咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2601-2610 订阅
排序:
Numerical Study of Heating Structure in Cold-Wall MOCVD Reactor by Induction Heating  2
Numerical Study of Heating Structure in Cold-Wall MOCVD Reac...
收藏 引用
2nd International Symposium on Application of Materials Science and Energy Materials, SAMSE 2018
作者: Zhao, Lili Li, Zhiming Zhang, Jincheng Lu, Ligen Guo, Yunqiu Feng, Lansheng Shandong Provincial Key Laboratory of Network Based Intelligent Computing School of Information Science and Engineering University of Jinan Jinan China State Key Discipline Laboratory of Wide Band-Gap Semiconductor Technology School of Microelectronics Xidian University Xi'an China School of Mechano-Electronic Engineering Xidian University Xi'an China
on the traditional heating structure of MOCVD reactor, the temperature distribution of substrate is nonuniform, which goes against the film growth. This paper focuses on the numerical calculation of the heating struct... 详细信息
来源: 评论
Non-structured Pruning for Deep-learning based Steganalytic Frameworks
Non-structured Pruning for Deep-learning based Steganalytic ...
收藏 引用
Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)
作者: Qiushi Li Zilong Shao Shunquan Tan Jishen Zeng Bin Li Shenzhen Key Laboratory of Media Security Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen China
Image steganalysis aims to discriminate innocent cover images and those suspected stego images embedded with secret message. Recently, increasing advanced deep neural networks have been proposed and used in image steg... 详细信息
来源: 评论
[Retracted] Defending Privacy Inference Attacks to Federated Learning for Intelligent IoT with Parameter Compression
收藏 引用
security and Communication networks 2023年 第1期2023卷
作者: Yongsheng Zhu Hongbo Cao Yuange Ren Wanqi Wang Bin Wang Mingqing Hu Baigen Cai Wei Wang School of Electronic and Information Engineering Beijing Jiaotong University No. 3 Shangyuancun Beijing 100044 *** Institute of Computing Technologies China Academy of Railway Sciences Corporation Limited Beijing 100081 *** Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University No. 3 Shangyuancun Beijing 100044 *** Zhejiang Key Laboratory of Multi-Dimensional Perception Technology Application and Cybersecurity Hangzhou 310053 China iFLYTEK Co. Ltd. Hefei China
Federated learning has been popularly studied with people’s increasing awareness of privacy protection. It solves the problem of privacy leakage by its ability that allows many clients to train a collaborative model ...
来源: 评论
Intelligent recommendation of related items based on naive bayes and collaborative filtering combination model
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1682卷
作者: Wei Wei Zhuo Wang Changlong Fu Robertas Damaševičius Rafal Scherer Marcin Wožniak School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 Shaanxi Key Laboratory for Network Computing and Security Technology China.
Nowadays, data plays a unique role in various fields. Based on the background of the era of big data, this paper collects user evaluations of certain commodities and labels the evaluations into positive emotions and n...
来源: 评论
Train energy-efficient speed profile generation under various track alignments: a quantum evolutionary algorithm with cosine annealing
收藏 引用
Swarm and Evolutionary Computation 2025年 97卷
作者: Qin, Yang Guo, Jingwei Xu, Peijuan Li, Duo Wang, Yonggang School of Transportation Engineering Chang'an University Shaanxi Xi'an710018 China Key Laboratory of Transport Industry of Management Control and Cycle Repair Technology for Traffic Network Facilities in Ecological Security Barrier Area Chang'an University Shaanxi Xi'an710018 China Faculty of Business City University of Macau 999078 China School of Engineering Newcastle University Newcastle Upon TyneNE1 7RU United Kingdom
The optimization of train speed profiles is an effective method for reducing energy consumption and operating costs for urban rail transit (URT). In recent years, numerous intelligent optimization algorithms have been... 详细信息
来源: 评论
A security Reinforcement Model for Edge computing Facilities in 5G Power network
A Security Reinforcement Model for Edge Computing Facilities...
收藏 引用
第五届无线通信与应用国际会议
作者: Nige Li Peng Zhou Zhipeng Shao Xiaoxiao Chen Power Grid Digitizing Technology Department State Grid Smart Grid Research Institute Co. Ltd. State Grid Key Laboratory of Information and Network Security State Grid Zhejiang Electric Power Corporation Information and Telecommunication Branch
5G network has attracted much attention from the vertical industry since its commercial use. Compared with previous generations of mobile communication technologies, 5G bandwidth, delay and other communication KPI ind... 详细信息
来源: 评论
STS-GAN: Can We Synthesize Solid Texture with High Fidelity from Arbitrary 2D Exemplar?
arXiv
收藏 引用
arXiv 2021年
作者: Zhao, Xin Guo, Jifeng Wang, Lin Li, Fanqi Li, Jiahao Zheng, Junteng Yang, Bo Shandong Provincial Key Laboratory of Preparation and Measurement of Building Materials University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China Quan Cheng Laboratory Jinan250100 China School of Computer Science and Engineering South China University of Technology Guangzhou510641 China David R. Cheriton School of Computer Science University of Waterloo WaterlooONN2L 3G1 Canada Shandong Qiuqi Analysis Instrument Co. Ltd. Jinan250024 China
Solid texture synthesis (STS), an effective way to extend a 2D exemplar to a 3D solid volume, exhibits advantages in computational photography. However, existing methods generally fail to accurately learn arbitrary te... 详细信息
来源: 评论
A two-phase approach for locally differentially private fuzzy co-clustering
收藏 引用
Information Sciences 2025年 718卷
作者: Zhang, Pengfei An, Jianlong Cheng, Xiang Zhu, Youwen Zhang, Ji Zhang, Zhikun State Key Laboratory of Digital Intelligent Technology for Unmanned Coal Mining No. 168 Shungeng Road Tianjiaan District Huainan232001 China School of Computer Science and Engineering Anhui University of Science and Technology No. 168 Shungeng Road Tianjiaan District Huainan232001 China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics No. 237 Longquan Road Yunnan Kunming650221 China No. 3501 Daxue Road Shandong Jinan255020 China Key Laboratory of Equipment Data Security and Guarantee Technology Guilin University of Electronic Technology No. 1 Jinji Road Guangxi Guilin541010 China State Key Laboratory of Networking and Switching Technology No. 10 Xitucheng Road Haidian District Beijing100876 China Beijing University of Posts and Telecommunications No. 10 Xitucheng Road Haidian District Beijing100876 China College of Computer and Data Science Nanjing University of Aeronautics and Astronautics No. 29 Yudao Street Qinhuai District Jiangsu Nanjing210016 China School of Mathematics Physics and Computing University of Southern Queensland West Street ToowoombaQLD4350 Australia College of Computer Science and Technology Zhejiang University No. 38 Zheda Road Xihu District Hangzhou310027 China
Clustering analysis is important for providing personalized services across various user experience optimization. As an advanced clustering technique, Fuzzy Co-Clustering (FCC) excels at handling high-dimensional data... 详细信息
来源: 评论
Secrecy capacity bounds for visible light communications with signal-dependent noise
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Jin-Yuan Fu, Xian-Tao Wang, Jun-Bo Lin, Min Cheng, Julian Alouini, Mohamed-Slim Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing210003 China Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China College of Telecommunications & Information Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China National Mobile Communications Research Laboratory Southeast University Nanjing211111 China School of Engineering The University of British Columbia KelownaBCV1V 1V7 Canada Computer Electrical and Mathematical Science and Engineering Division King Abdullah University of Science and Technology Thuwal23955-6900 Saudi Arabia
In physical-layer security, one of the most fundamental issues is the secrecy capacity. The objective of this paper is to determine the secrecy capacity for an indoor visible light communication system consisting of a... 详细信息
来源: 评论
Decoherence effects in a three-level system under Gaussian process
arXiv
收藏 引用
arXiv 2021年
作者: Zangi, Sultan Mahmood Rahman, Atta ur Ji, Zhao-Xo Ali, Hazrat Zhang, Huan-Guo School of Physics and Astronomy Yunnan University P.O. Box Kunming650500 China School of Physics University of Chinese Academy of Science Yuquan Road 19A Beijing100049 China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Abbottabad University of Science and Technology P.O. Box 22500 KP Havellian Pakistan
When subjected to a classical fluctuating field characterized by a Gaussian process, we examine the purity and coherence protection in a three-level quantum system. This symmetry of the three-level system is examined ... 详细信息
来源: 评论