咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,571 篇 期刊文献

馆藏范围

  • 3,652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,792 篇 计算机科学与技术...
    • 1,441 篇 软件工程
    • 579 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 167 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 591 篇 管理学
    • 324 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 70 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 58 篇 protocols
  • 57 篇 data privacy
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 263 篇 key laboratory o...
  • 205 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 27 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,095 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3652 条 记 录,以下是2671-2680 订阅
排序:
A Memory-efficient Simulation Method of Grover’s Search Algorithm
收藏 引用
Computers, Materials & Continua 2018年 第11期57卷 307-319页
作者: Xuwei Tang Juan Xu Bojia Duan College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjingChina Institute for Quantum Computing University of WaterlooCanada Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationChina
Grover’s search algorithm is one of the most significant quantum algorithms,which can obtain quadratic speedup of the extensive search *** Grover's search algorithm cannot be implemented on a real quantum compute... 详细信息
来源: 评论
Is AI Robust Enough for Scientific Research?
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Jun-Jie Song, Jiahao Wang, Xiu-Cheng Li, Fu-Peng Liu, Zehan Chen, Jian-Nan Dang, Haoning Wang, Shiyao Zhang, Yiyan Xu, Jianhui Shi, Chunxiang Wang, Fei Pang, Long-Gang Cheng, Nan Zhang, Weiwei Zhang, Duo Meng, Deyu Northwest Institute of Nuclear Technology No. 28 Pingyu Road Shaanxi Xi’an710024 China School of Telecommunications Engineering Xidian University No. 2 South Taibai Road Shaanxi Xi’an710071 China State Key Laboratory of ISN No. 2 South Taibai Road Shaanxi Xi’an710071 China Institute of Particle Physics Central China Normal University No. 152 Luoyu Road Hubei Wuhan30079 China School of Computer Science and Technology Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China Guangzhou Institute of Geography Academy of Sciences No. 100 Xianlie Road Guangdong Guangzhou510070 China National Meteorological Information Center Beijing100044 China MDX Research Center for Element Strategy Institute of Integrated Research Institute of Science Tokyo Midori-ku Yokohama226-8503 Japan School of Physics and Information Technology Shaanxi Normal University No. 620 West Chang’an Avenue Shaanxi Xi’an710119 China School of Aeronautics Northwestern Polytechnical University No. 127 West Youyi Road Shaanxi Xi’an710072 China AI for Science Institute Beijing100080 China DP Technology Beijing100080 China Academy for Advanced Interdisciplinary Studies Peking University Beijing100871 China School of Mathematics and Statistics Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China
We uncover a phenomenon largely overlooked by the scientific community utilizing AI: neural networks exhibit high susceptibility to minute perturbations, resulting in significant deviations in their outputs. Through a... 详细信息
来源: 评论
Analysis of Stock Market Based on Machine Learning
Analysis of Stock Market Based on Machine Learning
收藏 引用
International Conference on Computer network, Electronic and Automation (ICCNEA)
作者: Wang Tianma Fangwei Wang Illinois Institute of Technology Chicago IL USA College of Computer and Cyber Security Hebei Normal University Shijiazhuang CHINA Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang CHINA
This paper uses SPSS tools and factor analysis theory to make a comprehensive evaluation of the company's stock performance. Data come from 10 representative listed companies in different industries. Because of th... 详细信息
来源: 评论
Clustering-based codebook design for MIMO communication system
arXiv
收藏 引用
arXiv 2019年
作者: Jiang, Jing Wang, Xiaojing Sidhu, Guftaar Ahmad Sardar Zhen, Li Gao, Runchen Shaanxi Key Laboratory of Information Communication Network and Security Xi'An University of Posts and Telecommunications Xi'an China COMSATS Institute of Information Technology Islamabad Pakistan
Codebook design is one of the core technologies in limited feedback multi-input multi-output (MIMO) communication systems. However, the conventional codebook designs usually assume MIMO vectors are uniformly distribut... 详细信息
来源: 评论
LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF
收藏 引用
Science China(Information Sciences) 2018年 第5期61卷 291-305页
作者: Huige WANG Kefei CHEN Baodong QIN Ziyuan HU Department of Network Engineering Anhui Science and Technology University Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Mathematics Hangzhou Normal University Westone Cryptologic Research Center National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications State Key Laboratory of Cryptology
Original public-key encryption is viewed as a tool to encrypt point-to-point *** data is aimed at a particular user,where a sender encrypts a message x under a specified public key P *** this case,only the owner of th... 详细信息
来源: 评论
FedCM: A real-time contribution measurement method for participants in federated learning
arXiv
收藏 引用
arXiv 2020年
作者: Yan, Bingjie Liu, Boyi Zhou, Yize Liang, Zhixuan Xu, Cheng-Zhong School of Compute Science and Cyberspace Security Hainan University Haikou China State Key Laboratory of Internet of Things for Smart City University of Macao China School of Science Hainan University Haikou China Department of Computing The Hong Kong Polytechnic University Hong Kong Faculty of Science and Technology University of Macao China
Federated Learning (FL) creates an ecosystem for multiple agents to collaborate on building models with data privacy consideration. The method for contribution measurement of each agent in the FL system is critical fo... 详细信息
来源: 评论
A similarity clustering-based deduplication strategy in cloud storage systems
A similarity clustering-based deduplication strategy in clou...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Saiqin Long Zhetao Li Zihao Liu Qingyong Deng Sangyoon Oh Nobuyoshi Komuro Key Laboratory of Hunan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent network School of Computer Science Xiangtan University Xiangtan China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) National University of Defense Technology Changsha China Ajou University Suwon South Korea Graduate School of Advanced Integration Science Chiba University Chiba Japan
Deduplication is a data redundancy elimination technique, designed to save system storage resources by reducing redundant data in cloud storage systems. With the development of cloud computing technology, deduplicatio... 详细信息
来源: 评论
TCPModel: A short-term traffic congestion prediction model based on deep learning  1
收藏 引用
2nd CCF International Conference on Artificial Intelligence, CCF-ICAI 2019
作者: Xu, Xiujuan Gao, Xiaobo Xu, Zhenzhen Zhao, Xiaowei Pang, Wei Zhou, Hongmei School of Software Dalian University of Technology Dalian116620 China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian116620 China School of Natural and Computing Sciences University of Aberdeen AberdeenAB24 3UE United Kingdom School of Transportation and Logistics Dalian University of Technology Dalian116024 China
With the progress of the urbanization, a series of traffic problems have occurred because of the growing urban population and the far lower growth rate of roads than that of cars. One of the most prominent problems is... 详细信息
来源: 评论
Competition on Dynamic Optimization Problems Generated by Generalized Moving Peaks Benchmark (GMPB)
arXiv
收藏 引用
arXiv 2021年
作者: Yazdani, Danial Mavrovouniotis, Michalis Li, Changhe Chen, Guoyu Luo, Wenjian Omidvar, Mohammad Nabi Branke, Jürgen Yang, Shengxiang Yao, Xin The Business Intelligence Team WINC Australia Cyprus University of Technology Lemesos Cyprus ERATOSTHENES Centre of Excellence Cyprus The School of Artificial Intelligence Anhui University of Sciences & Technology Hefei China The Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and Technology Harbin Institute of Technology Peng Cheng Laboratory Shenzhen518055 China The School of Computing University of Leeds Leeds University Business School LeedsLS2 9JT United Kingdom The Operational Research and Management Sciences Group at Warwick Business school University of Warwick CoventryCV4 7AL United Kingdom School of Computer Science and Informatics De Montfort University LeicesterLE1 9BH United Kingdom The Department of Computing and Decision Sciences Lingnan University Hong Kong The CERCIA School of Computer Science BirminghamB15 2TT United Kingdom
The Generalized Moving Peaks Benchmark (GMPB) [1] is a tool for generating continuous dynamic optimization problem instances with controllable dynamic and morphological characteristics. GMPB has been used in recent Co... 详细信息
来源: 评论
Signed graph attention networks
arXiv
收藏 引用
arXiv 2019年
作者: Huang, Junjie Shen, Huawei Hou, Liang Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Graph or network data is ubiquitous in the real world, including social networks, information networks, traffic networks, biological networks and various technical networks. The non-Euclidean nature of graph data pose... 详细信息
来源: 评论