咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,571 篇 期刊文献

馆藏范围

  • 3,652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,792 篇 计算机科学与技术...
    • 1,441 篇 软件工程
    • 579 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 167 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 591 篇 管理学
    • 324 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 70 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 58 篇 protocols
  • 57 篇 data privacy
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 263 篇 key laboratory o...
  • 205 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 27 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,095 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3652 条 记 录,以下是2661-2670 订阅
排序:
Building an efficient intrusion detection system based on feature selection and ensemble classifier
arXiv
收藏 引用
arXiv 2019年
作者: Zhou, Yuyang Cheng, Guang Jiang, Shanqing Dai, Mian School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Jiangsu Provincial Key Laboratory of Computer Network Technology Southeast University Nanjing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in the protected systems. Although many supervised and unsup... 详细信息
来源: 评论
Research on security Protocol Analysis Tool SmartVerif
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2132卷
作者: Siqi Lu Qingdi Han Xuyang Miao Yubo Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450000 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan 450000 China Department of Information Science and Engineering Ocean University of China Qingdao Shandong 266100 China
security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol...
来源: 评论
Batch face alignment using a low-rank Gan
arXiv
收藏 引用
arXiv 2019年
作者: Huang, Jiabo Xie, Xiaohua Zheng, Wei-Shi School of Data and Computer Science Sun Yat-sen University China Guangdong Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
This paper studies the problem of aligning a set of face images of the same individual into a normalized image while removing the outliers like partial occlusion, extreme facial expression as well as significant illum... 详细信息
来源: 评论
Depthwise Separable Convolution Feature Learning for Ihomogeneous Rock Image Classification  1
收藏 引用
4th International Conference on Cognitive Systems and Information Processing, ICCSIP 2018
作者: Zhu, Yueqin Bai, Lin Peng, Weihang Zhang, Xinyang Luo, Xiong Development and Research Center China Geological Survey Beijing100037 China Key Laboratory of Geological Information Technology Ministry of Natural Resources Beijing100037 China Geomathematics Key Laboratory of Sichuan Province Chengdu University of Technology Chengdu610059 China College of Geophysics Chengdu University of Technology Chengdu610059 China College of Management Science Chengdu University of Technology Chengdu610059 China College of Network Security Chengdu University of Technology Chengdu610059 China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China
The issue of classifying rock images is one of most important problems in geological detection and analysis. In order to improve rock recognition performance, we use convolution neural network (CNN) based deep learnin... 详细信息
来源: 评论
Allocating limited resources to protect a massive number of targets using a game theoretic model
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Xu Di, Xiaoqiang Li, Jinqing Wang, Huan Zhao, Jianping Yang, Huamin Cong, Ligang Jiang, Yuming School of Computer Science and Technology Changchun University of Science and Technology Changchun China Jilin Province Key Laboratory of Network and Information Security Changchun China Department of Information Security and Communication Technology Norwegian University of Science and Technology Trondheim Norway
Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging. This paper addresses th... 详细信息
来源: 评论
Spatiotemporal characteristics and factor analysis of SARS-CoV-2 infections among healthcare workers in Wuhan, China
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Peixiao Ren, Hui Zhu, Xinyan Fu, Xiaokang Liu, Hongqiang Hu, Tao State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University Wuhan430079 China Center for Geographic Analysis Harvard University CambridgeMA02138 United States College of Geodesy and Geomatics Shandong University of Science and Technology Qingdao266590 China Collaborative Innovation Center of Geospatial Technology Wuhan430079 China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University Wuhan430079 China
Studying the spatiotemporal distribution of SARS-CoV-2 infections among healthcare workers (HCWs) can aid in protecting them from exposure. In this study, an open-source dataset of HCW diagnoses was provided, and the ... 详细信息
来源: 评论
Provably Secure APK Redevelopment Authorization Scheme in the Standard Model
收藏 引用
Computers, Materials & Continua 2018年 第9期56卷 447-465页
作者: Daofeng Li Mingxing Luo Bowen Zhao Xiangdong Che School of Computer Electrical and informationGuang Xi UniversityNanning530004China Information Security and National Computing Grid Laboratory Southwest Jiaotong UniversityChengdu610031China Guangxi Colleges and Universities Key Laboratory of Multimedia Communications and Information Processing Guangxi UniversityNanning530004China School of Information Security&Applied Computing College of TechnologyEastern Michigan UniversityMichigan48197USA
The secure issues of APK are very important in Android *** order to solve potential secure problems and copyrights issues in redevelopment of APK files,in this paper we propose a new APK redevelopment mechanism(APK-SA... 详细信息
来源: 评论
Faking photon number on a transition-edge sensor
arXiv
收藏 引用
arXiv 2021年
作者: Chaiwongkhot, Poompong Zhong, Jiaqiang Huang, Anqi Qin, Hao Shi, Sheng-Cai Makarov, Vadim Institute for Quantum Computing University of Waterloo WaterlooONN2L 3G1 Canada Department of Physics and Astronomy University of Waterloo WaterlooONN2L 3G1 Canada Department of Physics Faculty of Science Mahidol University Bangkok10400 Thailand Bangkok10110 Thailand Purple Mountain Observatory and Key Laboratory of Radio Astronomy Chinese Academy of Sciences 10 Yuanhua road Nanjing210033 China Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer National University of Defense Technology Changsha410073 China CAS Quantum Network Co. Ltd. 99 Xiupu road Shanghai201315 China Russian Quantum Center Skolkovo Moscow121205 Russia Shanghai Branch National Laboratory for Physical Sciences at Microscale CAS Center for Excellence in Quantum Information University of Science and Technology of China Shanghai201315 China NTI Center for Quantum Communications National University of Science and Technology MISiS Moscow119049 Russia
We study potential security vulnerabilities of a single-photon detector based on superconducting transition-edge sensor. In a simple experiment, we show that an adversary could fake a photon number result at a certain... 详细信息
来源: 评论
Front Cover: International Journal of Intelligent Systems, Volume 37 Issue 11 November 2022
收藏 引用
International Journal of Intelligent Systems 2022年 第11期37卷
作者: Xianjia Meng Yong Yang Ximeng Liu Nan Jiang School of Information Science and Technology Northwest University Xi'an People's Republic of China Fujian Province Key Laboratory of Information Security of Network System and College of Computer and Data Science Fuzhou University Fuzhou People's Republic of China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen People's Republic of China Department of Internet of Things School of Information Engineering East China Jiao Tong University Nanchang People's Republic of China
来源: 评论
Using Reduced Graphene Oxide to Generate Q-Switched Pulses in Er-Doped Fiber Laser
收藏 引用
Chinese Physics Letters 2018年 第11期35卷 32-34页
作者: Lu Li Rui-Dong Lv Si-Cong Liu Zhen-Dong Chen Jiang Wang Yong-Gang Wang Wei Ren School of Science Xi'an University of Posts and TelecommunicationsXi'an 710121 School of Physics and information Technology Shaanxi Normal UniversityXi'an 710119 Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and TelecommunicationsXi'an 710121
Using the reduced graphene oxide(rGO) as a saturable absorber(SA) in an Er-doped fiber(EDF) laser cavity,we obtain the Q-switching operation. The rGO SA is prepared by depositing the GO on fluorine mica(FM) us... 详细信息
来源: 评论