咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2731-2740 订阅
排序:
On privacy protection of latent dirichlet allocation model training
arXiv
收藏 引用
arXiv 2019年
作者: Zhao, Fangyuan Ren, Xuebin Yang, Shusen Yang, Xinyu School of Computer Science and Technology Xi'an Jiaotong University China National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University China Ministry of Education Key Lab For Intelligent Networks and Network Security Xi'an Jiaotong University China
Latent Dirichlet Allocation (LDA) is a popular topic modeling technique for discovery of hidden semantic architecture of text datasets, and plays a fundamental role in many machine learning applications. However, like... 详细信息
来源: 评论
Robust unsupervised feature selection by nonnegative sparse subspace learning
收藏 引用
Neurocomputing 2019年 334卷 156-171页
作者: Wei Zheng Hui Yan Jian Yang School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China School of Computer Engineering Jinling Institute of Technology Nanjing PR China PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing Xiaozhuang University Nanjing PR China
Sparse subspace learning has been demonstrated to be effective in data mining and machine learning. In this paper, we cast the unsupervised feature selection scenario as a matrix factorization problem from the viewpoi... 详细信息
来源: 评论
SELWasm: A Code Protection Mechanism for WebAssembly
SELWasm: A Code Protection Mechanism for WebAssembly
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Jian Sun DingYuan Cao XiMing Liu ZiYi Zhao WenWen Wang XiaoLi Gong Jin Zhang College of Computer Science Nankai University Tianjin China College of Cyber Science Nankai University Tianjin China Department of Computer Science University of Georgia Athens GA USA Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
WebAssembly is a novel front-end programming technology that has been wildly supported by most web browsers. The high-level language can be compiled into WebAssembly binary code, and executed by the browser at almost ... 详细信息
来源: 评论
Multi-Agent Deep Reinforcement Learning for HVAC Control in Commercial Buildings
arXiv
收藏 引用
arXiv 2020年
作者: Yu, Liang Sun, Yi Xu, Zhanbo Shen, Chao Yue, Dong Jiang, Tao Guan, Xiaohong College of Automation & College of Artificial Intelligence Nanjing University of Posts and Telecommunications Nanjing210003 China Systems Engineering Institute Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China college of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210003 China Institute of Advanced Technology Nanjing University of Posts and Telecommunications Nanjing210003 China Wuhan National Laboratory for Optoelectronics School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan430074 China
In commercial buildings, about 40%-50% of the total electricity consumption is attributed to Heating, Ventilation, and Air Conditioning (HVAC) systems, which places an economic burden on building operators. In this pa... 详细信息
来源: 评论
Efficient attribute-based encryption with blackbox traceability  12th
Efficient attribute-based encryption with blackbox traceabil...
收藏 引用
12th International Conference on Provable security, ProvSec 2018
作者: Xu, Shengmin Yang, Guomin Mu, Yi Liu, Ximeng Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong Wollongong Australia School of Information Systems Singapore Management University Singapore Singapore College of Mathematics and Computer Science Fuzhou University FuzhouFujian China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceability w... 详细信息
来源: 评论
Towards Privacy-preserving Incentive for Mobile Crowdsensing Under An Untrusted Platform
Towards Privacy-preserving Incentive for Mobile Crowdsensing...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Zhibo Wang Jingxin Li Jiahui Hu Ju Ren Zhetao Li Yanjun Li State Key Laboratory for Novel Software Technology Nanjing University P. R. China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University P. R. China School of Information Science and Engineering Central South University P. R. China Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education College of Information Engineering Xiangtan University P. R. China School of Computer Science and Technology Zhejiang University of Technology P. R. China
Reverse auction-based incentive mechanisms have been commonly proposed to stimulate mobile users to participate in crowdsensing, where users submit bids to the platform to compete for tasks. Recent works pointed out t... 详细信息
来源: 评论
A data glove-based KEM dynamic gesture recognition algorithm
收藏 引用
International Journal of Performability Engineering 2018年 第11期14卷 2589-2600页
作者: Han, Rui Feng, Zhiquan Ai, Changsheng Xie, Wei Wang, Kang School of Information Science and Engineering University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan250022 China School of Mechanical Engineering University of Jinan Jinan250022 China School of Information and Electrical Engineering Harbin Institute of Technology at Weihai WeiHai264209 China
Data gloves-based gesture recognition plays a very important role in the virtual reality interaction system. A new dynamic gesture recognition method, that is, K-means clustering dimensionality reduction and Euclidean... 详细信息
来源: 评论
Dual Graph-Laplacian PCA: A closed-form solution for bi-clustering to find "checkerboard" structures on gene expression data
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Jin-Xing Feng, Chun-Mei Kong, Xiang-Zhen Xu, Yong School of Information Science and Engineering Qufu Normal University Rizhao Shandong276826 China Bio-Computing Research Center Shenzhen Graduate School Harbin Institute of Technology Key Laboratory of Network Oriented Intelligent Computation Shenzhen Guangdong518055 China
In the context of cancer, internal "checkerboard" structures are normally found in the matrices of gene expression data, which correspond to genes that are significantly up- or down-regulated in patients wit... 详细信息
来源: 评论
network Traffic Outlier Detection Based on Full Convolutional network
Network Traffic Outlier Detection Based on Full Convolutiona...
收藏 引用
International Conference on Computational Intelligence and security
作者: Jingrong Mo Yong Wang Miao Ye School of Computer Science and Information Security Guilin University of Electronic Technology Guilin Guangxi China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi China
network traffic flow can be represented as time series. Outliers of these time series is important for the computer network security. The existing methods for the time series anomaly detection mainly operate on the en... 详细信息
来源: 评论
Fake Colorized Image Detection with Channel-wise Convolution based Deep-learning Framework
Fake Colorized Image Detection with Channel-wise Convolution...
收藏 引用
Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)
作者: Long Zhuo Shunquan Tan Jishen Zeng Bin Lit Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology Shenzhen China
Colorization is one remarkable emerging image manipulating technique, which maybe potentially used for illegal purpose. In this paper, we introduce WISERNet (Wider Separate-then-reunion network), a recently proposed d... 详细信息
来源: 评论