咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2711-2720 订阅
排序:
Web-Logs Prediction with Web Mining  2
Web-Logs Prediction with Web Mining
收藏 引用
2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2018
作者: Hassan, Muhammad Umair Shaukat, Kamran Niu, Dongmie Mahreen, Sundas Ma, Yingjun Zhao, Xiuyang Shabir, Muhammad Ahmad University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan250022 China Department of Information Technology University of the Punjab Jhelum Campus Jhelum Pakistan
W384 Mining is defined as the use of Data Mining techniques to extract information from web, automatically. Web Mining techniques are widely used to observe user patterns accessing the web server logs. Web logs are th... 详细信息
来源: 评论
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs
Exploiting Meta-Path with Attention Mechanism for Fine-Grain...
收藏 引用
2019 3rd International Conference on Data Mining, Communications and Information technology (DMCIT 2019)
作者: Zhixiao Wang Wenyao Yan Wendong Wang Ang Gao Lei Yu Shaobo Yang GaoYang Nie School of Computer Science and Engineering Xi'an University of Technology Telematics Group the University of Goettingen Shaanxi Key Laboratory of Network Computing and Security School of Electronic and Information Engineering Xi'an Jiaotong University College of Xi'an Innovation Yan'an University Yan'an University National Satellite Meteorological Center China Meteorological Administration
Based on the huge volumes of user check-in data in LBSNs,users’ intrinsic mobility patterns can be well explored,which is fundamental for predicting where a user will visit next given his/her historical check-in *** ...
来源: 评论
Multi-criteria collaborative filtering based on matrix filling  4
Multi-criteria collaborative filtering based on matrix filli...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Ye, Li Wu, Chunming Qiang, Baohua Xie, Wu College of Computer Information Science Southwest University Chongqing China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex System Guilin University of Electronic Technology Guilin China
In multi-criteria collaborative filtering, the data sparsity is a critical factor affecting the effectiveness of the algorithm. Existing solutions generally remove low-efficiency data through dimensionality reduction,... 详细信息
来源: 评论
Beam-Domain Secret key Generation for Multi-User Massive MIMO networks
arXiv
收藏 引用
arXiv 2020年
作者: Chen, You Li, Guyue Sun, Chen Zhang, Junqing Jorswieck, Eduard Xiao, Bin School of Cyber Science and Engineering Southeast University Nanjing210096 China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Purple Mountain Laboratories for Network and Communication Security Nanjing210096 China Department of Electrical Engineering and Electronics University of Liverpool LiverpoolL69 3GJ United Kingdom Institute for Communications Technology Technische Universität Braunschweig Germany Department of Computing Hong Kong Polytechnic University Hong Kong
Physical-layer key generation (PKG) in multi-user massive MIMO networks faces great challenges due to the large length of pilots and the high dimension of channel matrix. To tackle these problems, we propose a novel m... 详细信息
来源: 评论
An attribute-based encryption scheme with LSSS key-policy from lattices
Advances in Intelligent Systems and Computing
收藏 引用
Advances in Intelligent Systems and computing 2018年 613卷 217-230页
作者: Liu, Lihua Wang, Shangping Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an710054 China School of Mathematics and Computer Science Shaanxi University of Technology HanzhongShaanxi723001 China
A new attribute-based encryption scheme (ABE) from lattices with Linear Secret Sharing Scheme (LSSS) key-policy is presented. In the new scheme, the key of an attribute under an access policy represented by LSSS is ge... 详细信息
来源: 评论
On self-duality and hulls of cyclic codes over 2m[u]huki with oddly even length
arXiv
收藏 引用
arXiv 2019年
作者: Cao, Yonglin Cao, Yuan Fu, Fang-Wei School of Mathematics and Statistics Shandong University of Technology Zibo Shandong255091 China Hunan Provincial Key Laboratory of Mathematical Modeling and Analysis in Engineering Changsha University of Science and Technology Changsha Hunan410114 Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan430062 Chern Institute of Mathematics and Lpmc Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China
Let F2m be a finite field of 2m elements, and R = F2m[u]/huki = 2m + u2m + . . . + uk-1F2m (uk = 0) where k is an integer satisfying k ≥ 2. For any odd positive integer n, an explicit representation for every self-du...
来源: 评论
Multidimensional particle swarm optimization based long short-term memory method for human activity recognition  4
Multidimensional particle swarm optimization based long shor...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Zuo, Peiliang Li, Haoliang Zhang, Yuanli Yang, Tao Ministry of Education Beijing University of Posts and Telecommunications Key Laboratory of Universal Wireless Communication Beijing China Department of Network Space Security Beijing Electronic Science and Technology Institute Beijing China
Human activity recognition (HAR) is indispensable for human-machine interaction. Related applications in many fields, e.g. medical, military, and security, facilitate and even change the lives of human beings. However... 详细信息
来源: 评论
Quantum and classical query complexities for generalized Simon’s problem
arXiv
收藏 引用
arXiv 2019年
作者: Wu, Zhenggang Qiu, Daowen Tan, Jiawei Li, Hao Cai, Guangya Institute of Quantum Computing and Computer Theory School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China The Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University 510006 China
Simon’s problem is an essential example demonstrating the faster speed of quantum computers than classical computers for solving some problems. The optimal separation between exact quantum and classical query complex... 详细信息
来源: 评论
On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 84-95页
作者: Yupeng JIANG Qun-Xiong ZHENG Dongdai LIN State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
Let Z/(p;) be the integer residue ring modulo pewith p an odd prime and e 2. We consider the suniform property of compressing sequences derived from primitive sequences over Z/(p;). We give necessary and sufficien... 详细信息
来源: 评论
Overlapping Community Detection Based on Influence and Seeds Extension
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2019年 第1期47卷 153-160页
作者: Yu, Zhi-Yong Chen, Ji-Jie Guo, Kun Chen, Yu-Zhong Xu, Qian College of Mathematics and Computer Sciences Fuzhou University FuzhouFujian350116 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing FuzhouFujian350116 China Ministry of Education Key Laboratory of Spatial Data Mining & Information Sharing FuzhouFujian350116 China State Grid Info-Telecom Great Power Science and Technology Co. Ltd. FuzhouFujian350003 China
Community detection is a significant research direction in the research of social networks. To improve the quality of seeds selection and expansion, we propose an influence seeds extension overlapping community detect... 详细信息
来源: 评论