咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2691-2700 订阅
排序:
A vulnerability test method for speech recognition systems based on frequency signal processing  3
A vulnerability test method for speech recognition systems b...
收藏 引用
3rd IEEE International Conference on Data Science in Cyberspace, DSC 2018
作者: Yang, Honghao Liang, Dong Kuang, Xiaohui Xu, Changqiao Institute of Network Technology Beijing University of Posts and Telecommunications Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
With the development of information technology and the popularity of smart devices, voice recognition system, which is installed in many devices such as smartphones and automatic control equipment, is playing an incre... 详细信息
来源: 评论
A Slice-Guided Method of Indoor Scene Structure Retrieving  12th
A Slice-Guided Method of Indoor Scene Structure Retrieving
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Wang, Lijuan Wang, Yinghui Wang, Ningna Ning, Xiaojuan Lv, Ke Huang, Liangyi Xi’an University of Technology South Jinhua Road no. 5 Xi’an710032 China Xi’an Technology University Mid Xuefu Road no. 2 Xi’an710021 China Shaanxi Key Laboratory of Network Computing and Security Technology South Jinhua Road no. 5 Xi’an710032 China *** B.V. Vijzelstraat 66-80 Amsterdam1017HL Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington DC20052 United States
The structure information of indoor scene is necessary for a robot who works in a room. In order to achieve structure of an indoor scene, a slice-guided method of indoor scene structure retrieving is proposed in this ... 详细信息
来源: 评论
A Privacy-Preserving TPA-aided Remote Data Integrity Auditing Scheme in Clouds
A Privacy-Preserving TPA-aided Remote Data Integrity Auditin...
收藏 引用
2019国际计算机前沿大会
作者: Meng Zhao Yong Ding Yujue Wang Huiyong Wang Bingyao Wang Lingang Liu School of Mechanical and Electrical Engineering Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information SecurityGuilin University of Electronic Technology School of Mathematics and Computing Science Guilin University of Electronic Technology
The remote data integrity auditing technology can guarantee the integrity of outsourced data in *** can periodically run an integrity auditing protocol by interacting with cloud server,to verify the latest status of o...
来源: 评论
Learning from context: a mutual reinforcement model for Chinese microblog opinion retrieval
收藏 引用
Frontiers of Computer Science 2018年 第4期12卷 714-724页
作者: Jingjing WEI Xiangwen LIAO Houdong ZHENG Guolong CHEN Xueqi CHENG College of Mathematics and Computer Science Fuzhou University Fuzhou 350108 China College of Electronics and Information Science Fujian Jiangxia University Fuzhou 350108 China Fujian Provincial Key Laboratory of Network Computing and Intelligence Processing Fuzhou University Fuzhou 350108 China Institute of Computing Technology Chinese Academic of Sciences Beijing 100190 China
This study addresses the problem of Chinese microblog opinion retrieval, which aims to retrieve opinionated Chinese microblog posts relevant to a target specified by a user query. Existing studies have shown that lexi... 详细信息
来源: 评论
CPicker: Leveraging Performance-Equivalent Configurations to Improve Data Center Energy Efficiency
收藏 引用
Journal of Computer Science & technology 2018年 第1期33卷 131-144页
作者: Fa-Qiang Sun Gui-Hai Yan Xin He Hua-Wei Li Yin-He Han State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China National Computer Network Emergency Response Technical Team of China Beijing 100029 China University of Chinese Academy of Sciences Beijing 100049 China
The poor energy proportionality of server is seen as the principal source for low energy efficiency of modern data centers. We find that different resource configurations of an application lead to similar performance,... 详细信息
来源: 评论
Dynamic MCMC sampling
arXiv
收藏 引用
arXiv 2019年
作者: Feng, Weiming He, Kun Sun, Xiaoming Yin, Yitong State Key Laboratory for Novel Software Technology Nanjing University CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing China
The Markov chain Monte Carlo (MCMC) methods are the primary tools for sampling from Gibbs distributions arising by various graphical models, e.g. Markov random fields (MRF). Traditional MCMC sampling algorithms are fo... 详细信息
来源: 评论
MAC-AC: A Novel Distributed MAC Protocol for Accessing Channel in Vehicular Ad Hoc networks
MAC-AC: A Novel Distributed MAC Protocol for Accessing Chann...
收藏 引用
IEEE Conference on Vehicular technology (VTC)
作者: Baozhu Li Fen Hou Changyue Zhang Shaohua Li Shujuan Ji Shanzhi Chen School of Information Science and Engineering University of Jinan Jinan China Shandong Provincial Key Laboratory of Network-based Intelligent Computing Jinan China Faculty of Science and Technology University of Macau Macau China Automotive Research Institute China National Heavy Duty Truck Group Co. Ltd Jinan China Shandong Key Laboratory of Wisdom Mine Information Technology Qingdao China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China State Key Lab of Wireless Mobile Communication Beijing China China Academy of Telecommunication Technology Beijing China
As a promising paradigm, VANET has been attracting more and more attention from the industry and academia recently. However, due to rapid movement of vehicles and highly dynamic topology, designing efficient MAC proto... 详细信息
来源: 评论
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting
arXiv
收藏 引用
arXiv 2019年
作者: Jia, Yujie Yin, Zhaoxia Zhang, Xinpeng Luo, Yonglong Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei230601 China School of Computer Science Fudan University Shanghai201203 China Anhui Provincial Key Laboratory of Network and Information Security Wuhu Anhui240002 China
In recent years, reversible data hiding (RDH), a new research hotspot in the field of information security, has been paid more and more attention by researchers. Most of the existing RDH schemes do not fully take it i... 详细信息
来源: 评论
DPANet: Depth potentiality-aware gated attention network for RGB-D salient object detection
arXiv
收藏 引用
arXiv 2020年
作者: Chen, Zuyao Cong, Runmin Xu, Qianqian Huang, Qingming The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100190 China The Institute of Information Science Beijing Jiaotong University Beijing100044 China The Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China The Department of Computer Science City University of Hong Kong Hong Kong Hong Kong The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing101408 China Peng Cheng Laboratory Shenzhen518055 China
There are two main issues in RGB-D salient object detection: (1) how to effectively integrate the complementarity from the cross-modal RGB-D data;(2) how to prevent the contamination effect from the unreliable depth m... 详细信息
来源: 评论
Localization of Deep Inpainting Using High-Pass Fully Convolutional network
Localization of Deep Inpainting Using High-Pass Fully Convol...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Haodong Li Jiwu Huang Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Image inpainting has been substantially improved with deep learning in the past years. Deep inpainting can fill image regions with plausible contents, which are not visually apparent. Although inpainting is originally... 详细信息
来源: 评论