咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,571 篇 期刊文献

馆藏范围

  • 3,652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,792 篇 计算机科学与技术...
    • 1,441 篇 软件工程
    • 579 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 167 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 591 篇 管理学
    • 324 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 70 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 58 篇 protocols
  • 57 篇 data privacy
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 263 篇 key laboratory o...
  • 205 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 27 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,095 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3652 条 记 录,以下是2651-2660 订阅
排序:
computing Sparse GCD of Multivariate Polynomials via Polynomial Interpolation
收藏 引用
Journal of Systems Science & Complexity 2018年 第2期31卷 552-568页
作者: TANG Min LI Bingyu ZENG Zhenbing School of Mathematics and Computing Science Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin 541004 China Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai 200062 China. Email: ***@***. School of Mathematics and Statistics Northeast Normal University Changchun 130024 China. Department of Mathematics Shanghai University Shanghai 200444 China
The problem of computing the greatest common divisor(GCD) of multivariate polynomials, as one of the most important tasks of computer algebra and symbolic computation in more general scope, has been studied extensiv... 详细信息
来源: 评论
Onionchain: Towards balancing privacy and traceability of blockchain-based applications
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Yue Weng, Jian Weng, Jiasi Li, Ming Luo, Weiqi College of Informatin Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China
With the popularity of Blockchain comes grave security related concerns. Achieving privacy and traceability simultaneously remains an open question. Efforts have been made to address the issues, while they may subject... 详细信息
来源: 评论
Monitoring an untrusted light source with single-photon detectors in measurement-device-independent quantum key distribution
收藏 引用
Physical Review A 2019年 第5期99卷 052302-052302页
作者: Yucheng Qiao Gan Wang Zhengyu Li Bingjie Xu Hong Guo State Key Laboratory of Advanced Optical Communication System and Network School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu 610041 China
Measurement-device-independent quantum key distribution (MDI-QKD) is proposed to close the loopholes of the detection part in QKD systems, while it still requires the light source to be trusted. This assumption is not... 详细信息
来源: 评论
Fixed-state Log-MAP detection for intensity-modulation and direct-detection optical systems over dispersion-uncompensated links
arXiv
收藏 引用
arXiv 2020年
作者: Shuangyue, L.I.U. Zhou, Ji Wang, Haide Mengqi, G.U.O. Xuekai, X.U. Yueming, L.U. Qiao, Yaojun State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Department of Electronic Engineering College of Information Science and Technology Jinan University Guangzhou510632 China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School ofCyberspace Security Beijing University of Posts and Telecommunications Beijing100876 China
In this paper, an optimized detection using log-maximum a posteriori estimation with a fixed number of surviving states (fixed-state Log-MAP) is proposed for a C-band 64-Gbit/s intensity-modulation and direct-detectio... 详细信息
来源: 评论
Optimizing Multi-Dimensional Packet Classification for Multi-Core Systems
收藏 引用
Journal of Computer Science & technology 2018年 第5期33卷 1056-1071页
作者: Tong Shen Da-Fang Zhang Gao-Gang Xie Xin-Yi Zhang College of Computer Science and Electronic Engineering Hunan University Changsha 410082 China Network Technology Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China University of Chinese Academy of Sciences Beijing 100049 China
Packet classification has been studied for decades; it classifies packets into specific flows based on a given rule set. As software-defined network was proposed, a recent trend of packet classification is to scale th... 详细信息
来源: 评论
GmFace: A mathematical model for face image representation using multi-gaussian
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Liping Li, Weijun Yu, Lina Dong, Xiaoli Sun, Linjun Ning, Xin Xu, Jian Qin, Hong Institute of Semiconductors Chinese Academy of Sciences Beijing100083 China Center of Materials Science and Optoelectronics Engineering School of Microelectronics University of Chinese Academy of Sciences Beijing100049 China Beijing Key Laboratory of Semiconductor Neural Network Intelligent Sensing and Computing Technology Beijing100083 China
Establishing mathematical models is a ubiquitous and effective method to understand the objective world. Due to complex physiological structures and dynamic behaviors, mathematical representation of the human face is ... 详细信息
来源: 评论
Construction of MDS Euclidean self-dual codes via two subsets
arXiv
收藏 引用
arXiv 2020年
作者: Fang, Weijun Xia, Shu-Tao Fu, Fang-Wei Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen518055 China PCL Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen518055 China Chern Institute of Mathematics and LPMC Nankai University Tianjin300071 China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China
The parameters of a q-ary MDS Euclidean self-dual codes are completely determined by its length and the construction of MDS Euclidean self-dual codes with new length has been widely investigated in recent years. In th... 详细信息
来源: 评论
End-to-End AI-Based Point-of-Care Diagnosis System for Classifying Respiratory Illnesses and Early Detection of COVID-19
arXiv
收藏 引用
arXiv 2020年
作者: Belkacem, Abdelkader Nasreddine Ouhbi, Sofia Lakas, Abderrahmane Benkhelifa, Elhadj Chen, Chao Department of Computer and Network Engineering CIT UAEU UAE Department of Computer Science and Software Engineering CIT UAEU UAE Cloud Computing and Applications Reseach Lab Staffordshire University United Kingdom Key Laboratory of Complex System Control Theory and Application Tianjin University of Technology China
Respiratory symptoms can be a caused by different underlying conditions, and are often caused by viral infections, such as Influenza-like illnesses or other emerging viruses like the Coronavirus. These respiratory vir... 详细信息
来源: 评论
A Hole Repairing Method Based on Edge-Preserving Projection  12th
A Hole Repairing Method Based on Edge-Preserving Projection
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Wang, Yinghui Zhao, Yanni Wang, Ningna Ning, Xiaojuan Shi, Zhenghao Zhao, Minghua Lv, Ke Huang, Liangyi Institute of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an China Department of Computer Science Shannxi Vocational and Technical College Xi’an China Booking B.V. Herengracht 597 Amsterdam1017 CE Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington D.C. United States
A point cloud hole repairing method based on edge-preserving projection is proposed in order to maintain sharp features of holes. First, the hole boundary points are acquired by quadrants and angles, then connections ... 详细信息
来源: 评论
A Hole Repairing Method Based on Slicing  12th
A Hole Repairing Method Based on Slicing
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Zhao, Yanni Wang, Yinghui Wang, Ningna Ning, Xiaojuan Shi, Zhenghao Zhao, Minghua Lv, Ke Huang, Liangyi Institute of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an China Department of Computer Science Shannxi Vocational and Technical College Xi’an China Booking B.V. Herengracht 597 Amsterdam1017 CE Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington D.C. United States
The repairing of 3D point cloud holes has an important meaning to ensure the integrity of cloud data. We present a slice-based repairing method for 3D point cloud in this paper. Firstly, the model is horizontal sliced... 详细信息
来源: 评论