咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,571 篇 期刊文献

馆藏范围

  • 3,652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,792 篇 计算机科学与技术...
    • 1,441 篇 软件工程
    • 579 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 167 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 591 篇 管理学
    • 324 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 70 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 58 篇 protocols
  • 57 篇 data privacy
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 263 篇 key laboratory o...
  • 205 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 27 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,095 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3652 条 记 录,以下是2641-2650 订阅
排序:
NoViSec: Novel Virtual network Mapping Framework for Secure Software-Defined networking
NoViSec: Novel Virtual Network Mapping Framework for Secure ...
收藏 引用
IEEE Wireless Communications and networking Conference Workshops (WCNCW)
作者: Haotong Cao Yue Hu Shengchen Wu Jianbo Du Feng Tian Gagangeet Singh Aujla Longxiang Yang College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China Department of Key Accounts China Mobile Group Jiangsu Co. Ltd. Nanjing China Shanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Xi'an China School of Computing Newcastle University Newcastle upon Tyne U.K
network softwarization technologies, such as software defined networking (SDN), network virtualization (NV), and network function virtualization (NFV), emerge and have been greatly promoted by their supporters. This s...
来源: 评论
Remote Healthcare Monitoring System for Aging Population Based on IoT and Big Data Analysis
Remote Healthcare Monitoring System for Aging Population Bas...
收藏 引用
IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB)
作者: Qiang Liu Songlin Sun Liang Gong Zhongle Wu Mohamed Cheriet Michel Kadoch National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Academy of Broadcasting Planning NRTA China ETS University of Quebec Montreal Canada
As the population ages, this will put tremendous pressure on pensions and the medical system. Health insurance for the elderly poses a major challenge to the allocation of limited medical resources. The Internet of Th... 详细信息
来源: 评论
Measurement-Device-Independent Quantum key Distribution with Leaky Sources
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Weilong Tamaki, Kiyoshi Curty, Marcos EI Telecomunicación Department of Signal Theory and Communications University of Vigo VigoE-36310 Spain State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China Henan Key Laboratory of Network Cryptography Technology ZhengzhouHenan450001 China Faculty of engineering University of Toyama Gofuku 3190 Toyama930-8555 Japan
Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the source... 详细信息
来源: 评论
Spatiotemporal Differences of COVID-19 Infection among Healthcare Workers and Patients in China from January to March 2020
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Peixiao Zhu, Xinyan Guo, Wei Ren, Hui Hu, Tao Center for Geographic Analysis Harvard University CambridgeMA02138 United States Collaborative Innovation Center of Geospatial Technology Wuhan430079 China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University Wuhan430079 China State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University Wuhan430079 China
Studying the spatiotemporal differences in coronavirus disease (COVID-19) between social groups such as healthcare workers (HCWs) and patients can aid in formulating epidemic containment policies. Most previous studie... 详细信息
来源: 评论
A Novel 3D Video Fingerprinting Algorithm Based on Local Feature Points
收藏 引用
Chinese Journal of Electronics 2018年 第6期27卷 1192-1199页
作者: SUN Ziqiang ZHU Yuesheng LIU Xiyao Shenzhen Key Lab of Information Theory & Future Network Arch Communication and Information Security LaboratoryShenzhen Graduate School Peking University Nanjing Research Institute of Electronics Technology School of Information Science and Engineering Central South University
Digital rights management of the 3 D contents is a crucial open issue in the 3 D video industry. A novel robust fingerprinting algorithm is proposed for protecting the copyright of the 3 D video. Unlike the existing a... 详细信息
来源: 评论
Numerical Investigation of Pallet Structure with Annular Slot in MOVPE Chamber
Numerical Investigation of Pallet Structure with Annular Slo...
收藏 引用
2019 International Conference on Civil Engineering, Environment Resources and Energy Materials, CCESEM 2019
作者: Li, Zhiming Lu, Ligen Li, Hailing Guo, Runqiu Feng, Lansheng Shandong Provincial Key Laboratory of Network Based Intelligent Computing School of Information Science and Engineering University of Jinan Jinan250022 China Shandong College of Electronic Technology Jinan250022 China School of Mechano-Electronic Engineering Xidian University Xi'an710071 China
A pallet structure with an annular slot is proposed in the perpendicular MOVPE chamber by electromagnetic heating Compared with the conventional pallet, the shape of the slot changes the directions of the thermal cond... 详细信息
来源: 评论
XTQA: Span-Level Explanations for Textbook Question Answering
arXiv
收藏 引用
arXiv 2020年
作者: Ma, Jie Chai, Qi Liu, Jun Yin, Qingyu Wang, Pinghui Zheng, Qinghua Ministry of Education of Key Lab for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China Shaanxi Provincial Key Laboratory of Big Data Knowledge Engineering The School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an710049 China Amazon United States
Textbook Question Answering (TQA) is the task of correctly answering diagram or non-diagram questions given large multi-modal contexts consisting of abundant essays and diagrams. In real-world scenarios, an explainabl... 详细信息
来源: 评论
Defence Against Adversarial Attacks Using Clustering Algorithm
Defence Against Adversarial Attacks Using Clustering Algorit...
收藏 引用
2019国际计算机前沿大会
作者: Yanbin Zheng Hongxu Yun Fu Wang Yong Ding Yongzhong Huang Wenfen Liu Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology School of Computer Science and Engineering South China University of Technology School of Computer Science and Network Security Dongguan University of Technology
Deep learning model is vulnerable to adversarial examples in the task of image *** this paper,a cluster-based method for defending against adversarial examples is *** adversarial example before attacking a classifier ...
来源: 评论
Emergency analysis based on affective computing in universities forum  5th
Emergency analysis based on affective computing in universit...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Zhang, Lu Wu, Xu Xie, Xiaqing Xu, Jin Zhang, Tianle Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China School of Cyberspace Security BUPT Beijing100876 China Beijing University of Posts and Telecommunications Library Beijing100876 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
Emergency analysis for social networking sites have gained increased attention. In order to detect emergencies in University Forums, we present an emergency analysis method based on affective computing. The method det... 详细信息
来源: 评论
Correlation-Aware Virtual Machine Placement in Data Center networks  7th
Correlation-Aware Virtual Machine Placement in Data Center N...
收藏 引用
7th EAI International Conference on Cloud computing, CloudComp 2016 and 1st EAI International Conference on security and Privacy in New computing Environments, SPNCE 2016
作者: Chen, Tao Zhu, Yaoming Gao, Xiaofeng Kong, Linghe Chen, Guihai Wang, Yongjian Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China Key Laboratory of Information Network Security of Ministry of Public Security The Third Research Institute of Ministry of Public Security Shanghai China
The resource utilization (CPU, memory) is a key performance metric in data center networks. The goal of the cloud platform supported by data center networks is achieving high average resource utilization while guarant... 详细信息
来源: 评论