咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2681-2690 订阅
排序:
Analysis of Stock Market Based on Machine Learning
Analysis of Stock Market Based on Machine Learning
收藏 引用
International Conference on Computer network, Electronic and Automation (ICCNEA)
作者: Wang Tianma Fangwei Wang Illinois Institute of Technology Chicago IL USA College of Computer and Cyber Security Hebei Normal University Shijiazhuang CHINA Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang CHINA
This paper uses SPSS tools and factor analysis theory to make a comprehensive evaluation of the company's stock performance. Data come from 10 representative listed companies in different industries. Because of th... 详细信息
来源: 评论
Clustering-based codebook design for MIMO communication system
arXiv
收藏 引用
arXiv 2019年
作者: Jiang, Jing Wang, Xiaojing Sidhu, Guftaar Ahmad Sardar Zhen, Li Gao, Runchen Shaanxi Key Laboratory of Information Communication Network and Security Xi'An University of Posts and Telecommunications Xi'an China COMSATS Institute of Information Technology Islamabad Pakistan
Codebook design is one of the core technologies in limited feedback multi-input multi-output (MIMO) communication systems. However, the conventional codebook designs usually assume MIMO vectors are uniformly distribut... 详细信息
来源: 评论
LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF
收藏 引用
Science China(Information Sciences) 2018年 第5期61卷 291-305页
作者: Huige WANG Kefei CHEN Baodong QIN Ziyuan HU Department of Network Engineering Anhui Science and Technology University Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Mathematics Hangzhou Normal University Westone Cryptologic Research Center National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications State Key Laboratory of Cryptology
Original public-key encryption is viewed as a tool to encrypt point-to-point *** data is aimed at a particular user,where a sender encrypts a message x under a specified public key P *** this case,only the owner of th... 详细信息
来源: 评论
FedCM: A real-time contribution measurement method for participants in federated learning
arXiv
收藏 引用
arXiv 2020年
作者: Yan, Bingjie Liu, Boyi Zhou, Yize Liang, Zhixuan Xu, Cheng-Zhong School of Compute Science and Cyberspace Security Hainan University Haikou China State Key Laboratory of Internet of Things for Smart City University of Macao China School of Science Hainan University Haikou China Department of Computing The Hong Kong Polytechnic University Hong Kong Faculty of Science and Technology University of Macao China
Federated Learning (FL) creates an ecosystem for multiple agents to collaborate on building models with data privacy consideration. The method for contribution measurement of each agent in the FL system is critical fo... 详细信息
来源: 评论
A similarity clustering-based deduplication strategy in cloud storage systems
A similarity clustering-based deduplication strategy in clou...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Saiqin Long Zhetao Li Zihao Liu Qingyong Deng Sangyoon Oh Nobuyoshi Komuro Key Laboratory of Hunan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent network School of Computer Science Xiangtan University Xiangtan China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) National University of Defense Technology Changsha China Ajou University Suwon South Korea Graduate School of Advanced Integration Science Chiba University Chiba Japan
Deduplication is a data redundancy elimination technique, designed to save system storage resources by reducing redundant data in cloud storage systems. With the development of cloud computing technology, deduplicatio... 详细信息
来源: 评论
TCPModel: A short-term traffic congestion prediction model based on deep learning  1
收藏 引用
2nd CCF International Conference on Artificial Intelligence, CCF-ICAI 2019
作者: Xu, Xiujuan Gao, Xiaobo Xu, Zhenzhen Zhao, Xiaowei Pang, Wei Zhou, Hongmei School of Software Dalian University of Technology Dalian116620 China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian116620 China School of Natural and Computing Sciences University of Aberdeen AberdeenAB24 3UE United Kingdom School of Transportation and Logistics Dalian University of Technology Dalian116024 China
With the progress of the urbanization, a series of traffic problems have occurred because of the growing urban population and the far lower growth rate of roads than that of cars. One of the most prominent problems is... 详细信息
来源: 评论
Competition on Dynamic Optimization Problems Generated by Generalized Moving Peaks Benchmark (GMPB)
arXiv
收藏 引用
arXiv 2021年
作者: Yazdani, Danial Mavrovouniotis, Michalis Li, Changhe Chen, Guoyu Luo, Wenjian Omidvar, Mohammad Nabi Branke, Jürgen Yang, Shengxiang Yao, Xin The Business Intelligence Team WINC Australia Cyprus University of Technology Lemesos Cyprus ERATOSTHENES Centre of Excellence Cyprus The School of Artificial Intelligence Anhui University of Sciences & Technology Hefei China The Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and Technology Harbin Institute of Technology Peng Cheng Laboratory Shenzhen518055 China The School of Computing University of Leeds Leeds University Business School LeedsLS2 9JT United Kingdom The Operational Research and Management Sciences Group at Warwick Business school University of Warwick CoventryCV4 7AL United Kingdom School of Computer Science and Informatics De Montfort University LeicesterLE1 9BH United Kingdom The Department of Computing and Decision Sciences Lingnan University Hong Kong The CERCIA School of Computer Science BirminghamB15 2TT United Kingdom
The Generalized Moving Peaks Benchmark (GMPB) [1] is a tool for generating continuous dynamic optimization problem instances with controllable dynamic and morphological characteristics. GMPB has been used in recent Co... 详细信息
来源: 评论
Signed graph attention networks
arXiv
收藏 引用
arXiv 2019年
作者: Huang, Junjie Shen, Huawei Hou, Liang Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Graph or network data is ubiquitous in the real world, including social networks, information networks, traffic networks, biological networks and various technical networks. The non-Euclidean nature of graph data pose... 详细信息
来源: 评论
A Reinforcement Learning-Based Virtual Machine Placement Strategy in Cloud Data Centers
A Reinforcement Learning-Based Virtual Machine Placement Str...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Saiqin Long Zhetao Li Yun Xing Shujuan Tian Dongsheng Li Rong Yu Key Laboratory of Hunan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent network School of Computer Science Xiangtan University Xiangtan China School of Computer Science Xiangtan University Xiangtan China College of Computer National University of Defense Technology Changsha China School of Automation Guangdong University of Technology Guangzhou China
With the widespread use of cloud computing, energy consumption of cloud data centers is increasing which mainly comes from IT equipment and cooling equipment. This paper argues that once the number of virtual machines... 详细信息
来源: 评论
Fuzzy C-mean clustering based: LEO satellite handover  4th
Fuzzy C-mean clustering based: LEO satellite handover
收藏 引用
4th International Conference of Pioneer Computer Scientists, Engineers and Educators, ICPCSEE 2018
作者: Bukhari, Syed Umer Yu, Liwei Di, Xiao Qiang Chen, Chunyi Liu, Xu School of Computer Science and Technology Changchun University of Science and Technology Changchun China Jilin Province Key Laboratory of Network and Information Security Changchun China
Satellite networks are better alternatives to terrestrial networks because of their global coverage. Different satellite networks like GEO, MEO, and LEO can be used for the purpose of global communication. Especially,... 详细信息
来源: 评论