咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2701-2710 订阅
排序:
An improved TPSN algorithm based on doze mechanism  2
An improved TPSN algorithm based on doze mechanism
收藏 引用
2nd IEEE International Conference on Energy Internet, ICEI 2018
作者: Cui, Wenpeng Zheng, Zhe Qiao, Lei Zhang, Weilong Wang, Liang Research Department of Smart Chip Global Energy Interconnection Research Institute Co. Ltd Beijing China State Grid Key Laboratory of Information and Network Security State Grid Laboratory of Electric Power Communication Network Technology Beijing China
With the rapid development of wireless sensor networks, the precision of time synchronization between nodes is becoming increasingly attractive. However, low cost, low power, low technology and other requirements rest... 详细信息
来源: 评论
The role of positive and negative citations in scientific evaluation
arXiv
收藏 引用
arXiv 2020年
作者: Bai, Xiaomei Lee, Ivan Ning, Zhaolong Tolba, Amr Xia, Feng Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian116620 China Computing Center Anshan Normal University Anshan114007 China School of Information Technology and Mathematical Sciences University of South Australia Australia Riyadh Community College King Saud University Riyadh11437 Saudi Arabia Mathematics and Computer Science Department Faculty of Science Menoufia University Egypt
Quantifying the impact of scientific papers objectively is crucial for research output assessment, which subsequently affects institution and country rankings, research funding allocations, academic recruitment and na...
来源: 评论
Exploiting Gabor Feature Extraction Method for Chinese Character Writing Quality Evaluation
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1575卷
作者: Zhixiao Wang Wenyao Yan Mingtao Guo Jiulong Zhang School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Shaanxi Key Laboratory Xi'an of Network Computing and Security Technology China School of Data Science and Computer Xi'an innovation college of Yan'an University Xi'an 710100 China
The automatic evaluation of Chinese character writing quality has a wide application prospect. Most of the existing evaluation methods of Chinese character writing quality are based on radical segmentation and feature...
来源: 评论
iSplit LBI: Individualized partial ranking with ties via split LBI
arXiv
收藏 引用
arXiv 2019年
作者: Xu, Qianqian Sun, Xinwei Yang, Zhiyong Cao, Xiaochun Huang, Qingming Yao, Yuan Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Microsoft Research Asia State Key Laboratory of Information Security Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Tech. University of Chinese Academy of Sciences Key Laboratory of Big Data Mining and Knowledge Management CAS Peng Cheng Laboratory Department of Mathematics Hong Kong University of Science and Technology Hong Kong
Due to the inherent uncertainty of data, the problem of predicting partial ranking from pairwise comparison data with ties has attracted increasing interest in recent years. However, in real-world scenarios, different... 详细信息
来源: 评论
Unsupervised Person Re-Identification by Camera-Aware Similarity Consistency Learning
Unsupervised Person Re-Identification by Camera-Aware Simila...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Ancong Wu Wei-Shi Zheng Jian-Huang Lai School of Electronics and Information Technology Sun Yat-sen University China School of Data and Computer Science Sun Yat-sen University China Peng Cheng Laboratory China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Province Key Laboratory of Information Security China
For matching pedestrians across disjoint camera views in surveillance, person re-identification (Re-ID) has made great progress in supervised learning. However, it is infeasible to label data in a number of new scenes... 详细信息
来源: 评论
Numerical Study of Heating Structure in Cold-Wall MOCVD Reactor by Induction Heating
Numerical Study of Heating Structure in Cold-Wall MOCVD Reac...
收藏 引用
第二届材料科学应用与能源材料国际研讨会
作者: Lili Zhao Zhiming Li Jincheng Zhang Ligen Lu Yunqiu Guo Lansheng Feng Shandong Provincial Key Laboratory of Network based Intelligent Computing School of Information Science and EngineeringUniversity of Jinan State Key Discipline Laboratory of Wide Band-Gap Semiconductor Technology School of MicroelectronicsXidian University School of Mechano-Electronic Engineering Xidian University
On the traditional heating structure of MOCVD reactor,the temperature distribution of substrate is nonuniform,which goes against the film *** paper focuses on the numerical calculation of the heating structure,by usin... 详细信息
来源: 评论
Whether android applications broadcast your private information: A naive Bayesian-based analysis approach  30
Whether android applications broadcast your private informat...
收藏 引用
30th International Conference on Software Engineering and Knowledge Engineering, SEKE 2018
作者: Lin, Li Ni, Jian Mao, Xinya Zhang, Jianbiao College of Computer Science Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China National Engineering Laboratory for Classified Information Security Protection Beijing100124 China
With the rapid development of android smart terminals, android applications are exhibiting explosive growth. However, there remains a challenging issue facing android system, a malicious application may broadcast user... 详细信息
来源: 评论
Cryptanalysis of a Cryptosystem with Non- Commutative Platform Groups
收藏 引用
China Communications 2018年 第2期15卷 67-73页
作者: Jinhui Liu Jianwei Jia Huanguo Zhang Rongwei Yu Yong Yu Wangqing Wu College of Computer Science Shaanxi Normal University Xi'an Shanxi China Computer School of Wuhan University Wuhan Hubei China Key Laboratory of Aerospace Information security and trusted computing Ministry of Education Wuhan University Wuhan Hubei China School of Computer Science and Technology Hebei University Baoding China
A cryptosystem with non-commutative platform groups based on conjugator search problem was recently introduced at Neural computing and Applications 2016. Its versatility was illustrated by building a public-key encryp... 详细信息
来源: 评论
An Overview of Schema Extraction and Matching Techniques  2
An Overview of Schema Extraction and Matching Techniques
收藏 引用
2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2018
作者: Hassan, Muhammad Umair Shankat, Kamran Niu, Dongmie Mahreen, Sundas Ma, Yingjun Haider, Fatima Mubashir, Muhammad Zhao, Xiuyang University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan250022 China Department of Information Technology University of the Punjab Jhelum Campus Jhelum Pakistan
W383 contains huge amount of data both in structured and unstructured form. One of the forms for the structured data is HTML tables for which metadata are not explicitly stored/available. As a result, data in such tab... 详细信息
来源: 评论
Device-independent quantum private query protocol without the assumption of perfect detectors
arXiv
收藏 引用
arXiv 2019年
作者: Li, Dan-Dan Huang, Xiao-Hong Huang, Wei Gao, Fei Institute of Network Technology Beijing University of Posts and Telecommunications Beijing100876 China State Key Laboratory of Cryptology P. O. Box 5159 Beijing100878 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China
The first device-independent quantum private query protocol (MRT17) which is proposed by Maitra et al. [Phys. Rev. A 95, 042344 (2017)] to enhance the security through the certification of the states and measurements....
来源: 评论