咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,571 篇 期刊文献

馆藏范围

  • 3,652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,792 篇 计算机科学与技术...
    • 1,441 篇 软件工程
    • 579 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 167 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 591 篇 管理学
    • 324 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 70 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 58 篇 protocols
  • 57 篇 data privacy
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 263 篇 key laboratory o...
  • 205 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 27 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,095 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3652 条 记 录,以下是2621-2630 订阅
排序:
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks
arXiv
收藏 引用
arXiv 2020年
作者: Sun, Lijun Yang, Qian Chen, Xiao Chen, Zhenxiang College of Information Science and Technology Qingdao University of Science & Technology Qingdao266061 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan 250022 China School of Informatics University of Edinburgh EdinburghEH8 9AB United Kingdom
As the commercial use of 5G technologies has grown more prevalent, smart vehicles have become an efficient platform for delivering a wide array of services directly to customers. The vehicular crowdsourcing service (V... 详细信息
来源: 评论
A lithium-ion battery health state assessment and remaining useful life prediction method based on multi slope features
收藏 引用
Journal of Energy Storage 2025年 130卷
作者: Gaige Chen Siqi Zhong Yahong Yang Xiaoshen Zhang Wei Deng Jinsong Liu School of Communications and Information Engineering & School of Artificial Intelligence Xi'an University of Posts and Telecommunications Xi'an Shaanxi 710121 China Shaanxi Union Research Center of University and Enterprise for 5G+ Industrial Internet Communication Terminal Technology Xi'an University of Posts and Telecommunications Xi'an Shaanxi 710121 China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications Xi'an Shaanxi 710121 China State Key Laboratory of Space Power Sources Shanghai Institute of Space Power-sources Shanghai 200245 China Xi'an Aviation Brake Technology Co. Ltd Xi'an Shaanxi 710065 China Contemporary Amperex Technology Co. Ltd. Ningde Fujian 352107 China
In the field of battery management, accurately predicting the remaining useful life (RUL) of lithium-ion batteries is critical to safeguard the safety of batteries and devices. However, current prediction methods are ...
来源: 评论
DPNet: Dynamic Pooling network for Tiny Object Detection
arXiv
收藏 引用
arXiv 2025年
作者: Gong, Luqi Chen, Haotian Chen, Yikun Yao, Tianliang Li, Chao Zhao, Shuai Han, Guangjie School of Computer Science Beijing University of Posts and Telecommunications Beijing China Research Center for Space Computing System Zhejiang Lab Hangzhou China SWJTU-LEEDS Joint School Southwest Jiaotong University Chengdu China Guangdong Zhiyun City construction Technology Co. LTD Zhuhai China Department of Control Science and Engineering College of Electronic and Information Engineering Tongji University Shanghai China Key Laboratory of Maritime Intelligent Network Information Technology Ministry of Education Hohai University China
In unmanned aerial systems, especially in complex environments, accurately detecting tiny objects is crucial. Resizing images is a common strategy to improve detection accuracy, particularly for small objects. However... 详细信息
来源: 评论
Traffic Off-Loading over Uncertain Shared Spectrums with End-to-End Session Guarantee
Traffic Off-Loading over Uncertain Shared Spectrums with End...
收藏 引用
IEEE Conference on Vehicular technology (VTC)
作者: Ruyi Xiao Xuanheng Li Miao Pan Nan Zhao Fan Jiang Xianbin Wang School of Information and Communication Engineering Dalian University of Technology Dalian China University of Houston Houston TX USA Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xian Shaanxi China University of Western Ontario London ON Canada
As a promising solution of spectrum shortage, spectrum sharing has received tremendous interests recently. However, under different sharing policies of different licensees, the shared spectrum is heterogeneous both te... 详细信息
来源: 评论
Application of Blockchain and Internet of Things to Ensure Tamper-Proof Data Availability for Food Safety
arXiv
收藏 引用
arXiv 2020年
作者: Iftekhar, Adnan Cui, Xiaohui Hassan, Mir Afzal, Wasif Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Wuhan China University of Glasgow Glasgow United Kingdom Mälardalen University Västerås Sweden
Food supply chain plays a vital role in human health and food prices. Food supply chain inefficiencies in terms of unfair competition and lack of regulations directly affect the quality of human life and increase food... 详细信息
来源: 评论
Generalized association and deep understanding method for big video data processing
Generalized association and deep understanding method for bi...
收藏 引用
2019 IEEE International Conferences on Ubiquitous computing and Communications and Data Science and Computational Intelligence and Smart computing, networking and Services, IUCC/DSCI/SmartCNS 2019
作者: Xu, Lin Wu, Wei Lv, Wanghan Wang, Dong Science and Technology in Information System Engineering Lab Nanjing Research Institute of Electronic Engineering Nanjing China School of Information Science and Engineering University of Jinan China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China
In Big Data Era, it is becoming more and more important to timely and efficient processing of massive videos, and mining of the value information contained in them. This paper studies chaotic compressed sensing theory... 详细信息
来源: 评论
Cyber security monitoring and data analysis at IHEP
Cyber security monitoring and data analysis at IHEP
收藏 引用
2019 International Symposium on Grids and Clouds, ISGC 2019
作者: Yan, Tian Hu, Hao An, Dehai Qi, Fazhi Jiang, Chen Computing Center Institute of High Energy Physics Chinese Academy of Sciences Beijing100049 China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Inc. Beijing100085 China
Recently, cyber security threats becomes a noticeable challenge for academic institutes. In this paper, we present the security risk control model and the cyber security detection and monitoring system designed and de... 详细信息
来源: 评论
UR: A User-Based Collaborative Filtering Recommendation System Based on Trust Mechanism and Time Weighting
UR: A User-Based Collaborative Filtering Recommendation Syst...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Lei Zhang Zhijun Zhang Jufang He Zhenyu Zhang College of Intelligence and Computing Tianjin Key Laboratory of Advanced Network Technology and Application Tianjin China Key Laboratory of Grain Information Processing and Control Henan University of Technology Tianjin China
The technology of personalized recommendation is aimed at studying the behaviors of users, analyzing what they may be interested in and recommending suitable items to them. In other words, the personalized recommendat... 详细信息
来源: 评论
FLBench: A Benchmark suite for federated learning
arXiv
收藏 引用
arXiv 2020年
作者: Liang, Yuan Guo, Yange Gong, Yanxia Luo, Chunjie Zhan, Jianfeng Huang, Yunyou Guangxi Key Lab of Multi-Source Information Mining & Security Department of Computer Science Guangxi Normal University Guilin541004 China Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China BenchCouncil R&D Lab - Guilin Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China
Federated learning is a new machine learning paradigm. The goal is to build a machine learning model from the data sets distributed on multiple devices-so-called an isolated data island-while keeping their data secure... 详细信息
来源: 评论
Study on the Digitalization Method of Intelligent Emergency Plan of Power System
Study on the Digitalization Method of Intelligent Emergency ...
收藏 引用
Artificial Intelligence and Computer Engineering (ICAICE), International Conference on
作者: Zehao Zhang Zhen Yu Wei Weng Cheng Guan State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute co. Ltd Research Institute of Information Technology &Communicatioon Beijing China Fujian Electric Power Emergency Technology Center State Grid FuJian Electric Power co. LTD Fuzhou China
This paper puts forward a formalized method of emergency plan based on ontology, sums up the main concepts such as system, event, rule, measure, constraint and resource, and analyzes the logical relationship among con... 详细信息
来源: 评论