咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,571 篇 期刊文献

馆藏范围

  • 3,652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,792 篇 计算机科学与技术...
    • 1,441 篇 软件工程
    • 579 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 167 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 591 篇 管理学
    • 324 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 70 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 58 篇 protocols
  • 57 篇 data privacy
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 263 篇 key laboratory o...
  • 205 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 27 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,095 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3652 条 记 录,以下是2611-2620 订阅
排序:
Trading Based Service-Oriented Spectrum-Aware RAN-Slicing Under Spectrum Sharing
Trading Based Service-Oriented Spectrum-Aware RAN-Slicing Un...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Kajia Jiao Xuanheng Li Miao Pan Fan Jiang Ming Li School of Information and Communication Engineering Dalian University of Technology Dalian China Department of Electrical and Computer Engineering University of Houston Houston TX USA Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xian Shaanxi China
The fast development on emerging services makes our telecommunications networks witness two key problems. One is the flexibility to fulfill the diverse service requests and the other is the shortage on spectrum. Netwo...
来源: 评论
Multiple Spatial Information Weighted Fuzzy Clustering for Image Segmentation
Multiple Spatial Information Weighted Fuzzy Clustering for I...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Xiangdao Liu Jin Zhou Hui Jiang C. L. Philip Chen Tong Zhang Lin Wang Shiyuan Han Yuehui Chen Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Jinan China Development and Test Center Chinabond Fintech Information Technology Co. Ltd. Beijing China School of Computer Science and Engineering South China University of Technology Guangzhou China
For image segmentation, fuzzy clustering methods with single spatial information cannot ensure robustness to the image corrupted by different noises. In this paper, to figure out this problem, we propose a multiple sp... 详细信息
来源: 评论
Revisiting Recent and Current Anomaly Detection based on Machine Learning in Ad-Hoc networks  5
Revisiting Recent and Current Anomaly Detection based on Mac...
收藏 引用
5th Annual International Conference on network and Information Systems for Computers, ICNISC 2019
作者: Wang, Zhixiao Chen, Mingyu Yan, Wenyao Wang, Wendong Gao, Ang Nie, Gaoyang Wang, Feng Yang, Shaobo Xi'An University of Technology Xi'an710048 China Goettingen University Goettingen37077 Germany Xi'An Jiaotong University Xi'an710049 China Shaanxi Provincial Key Laboratory of Network Computing and Security Technology Xi'an710048 China College of xi'An Innovation Yan'An University Xi'an710100 China Yan'An University Yan'an716000 China National Satellite Meteorological Center China Meteorological Administration Beijing100081 China
Ad-Hoc network which is one kind of self-organized networks is much more vulnerable than the infrastructural network with the properties of highly changeable linkage, dynamic structure, and wireless connections so tha... 详细信息
来源: 评论
Beatgan: Anomalous rhythm detection using adversarially generated time series  28
Beatgan: Anomalous rhythm detection using adversarially gene...
收藏 引用
28th International Joint Conference on Artificial Intelligence, IJCAI 2019
作者: Zhou, Bin Liu, Shenghua Hooi, Bryan Cheng, Xueqi Ye, Jing Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science National University of Singapore Singapore Department of Anesthesiology Nanfang Hospital Southern Medical University China CAS Key Laboratory of Network Data Science and Technology University of Chinese Academy of Sciences Beijing China
Given a large-scale rhythmic time series containing mostly normal data segments (or 'beats'), can we learn how to detect anomalous beats in an effective yet efficient way? For example, how can we detect anomal...
来源: 评论
Joint object contour points and semantics for instance segmentation
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Wenchao Fu, Chong Zhu, Mai Cao, Lin Tie, Ming Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China Science and Technology on Space Physics Laboratory Beijing100076 China School of Computer Science University of Auckland New Zealand
The attributes of object contours has great significance for instance segmentation task. However, most of the current popular deep neural networks do not pay much attention to the object edge information. Inspired by ...
来源: 评论
An improved method of cache prefetching for small files in ceph system  5th
An improved method of cache prefetching for small files in c...
收藏 引用
5th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2018
作者: Fan, Ya Wang, Yong Ye, Miao Lu, Xiaoxia Huan, YiMing School of Computer Science and Information Security Guilin University of Electronic Technology GuilinGuangxi541004 China School of Information and Communication Guilin University of Electronic Technology GuilinGuangxi541004 China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology GuilinGuangxi541004 China
To improve the inefficiency of file access for massive small files in the distributed file system, prefetching the small files into the cache is the most conventional method to be adopted. As the number of cached file... 详细信息
来源: 评论
Optimization Space Exploration of Hardware Design for CRYSTALS-KYBER
Optimization Space Exploration of Hardware Design for CRYSTA...
收藏 引用
Asian Test Symposium (ATS)
作者: Yixuan Zhao Zhiteng Chao Jing Ye Wen Wang Yuan Cao Shuai Chen Xiaowei Li Huawei Li State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Yale University US Hohai University China Rock Solid Security Lab FiberHome Co. Ltd. China
Public key cryptography is important in the global communication digital infrastructure. However, the emergence of quantum computer and Shor algorithm has greatly threatened the security of public key cryptography. Th... 详细信息
来源: 评论
Short Text Topic Recognition and Optimization Method for University Online Community  1
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Wu, Xu Wu, Haitao Xie, Xiaqing Xu, Jin Zhang, Tianle Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Cyberspace Security BUPT Beijing China Beijing University of Posts and Telecommunications Library Beijing100876 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
The university online community mainly records what happens in target areas and groups of people. It has the characteristics of timeliness, regional strong and clear target groups. Compared with Weibo and post-bar, un... 详细信息
来源: 评论
DPNet: Dynamic Pooling network for Accurate and Efficient Size-Aware Tiny Object Detection
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Gong, Luqi Chen, Haotian Chen, Yikun Yao, Tianliang Li, Chao Zhao, Shuai Han, Guangjie Beijing University of Posts and Telecommunications School of Computer Science Beijing China Zhejiang Lab Research Center for Space Computing System Hangzhou China Southwest Jiaotong University SWJTU-LEEDS Joint School Chengdu China LTD Guangdong Zhiyun City construction Technology Co Zhuhai China Tongji University College of Electronic and Information Engineering Department of Control Science and Engineering Shanghai China Hohai University Key Laboratory of Maritime Intelligent Network Information Technology Ministry of Education China
In unmanned aerial systems, especially in complex environments, accurately detecting tiny objects is crucial. Resizing images is a common strategy to improve detection accuracy, particularly for small objects. However... 详细信息
来源: 评论
Energy efficiency evaluation based on QoS parameter specification for cloud systems
Energy efficiency evaluation based on QoS parameter specific...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Saiqin Long Hao Yu Zhetao Li Shujuan Tian Yun Li Key Laboratory of Hunan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent network School of Computer Science Xiangtan University Xiangtan China School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China
Energy efficiency evaluation (EEE) is a research difficulty in the field of cloud computing. The current research mainly considers the relevant energy efficiency indicators of cloud systems and weights the interrelati... 详细信息
来源: 评论