咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2741-2750 订阅
排序:
Improved SDA-ss algorithm for nonsymmetric algebraic Riccati equations
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1592卷 012049-012049页
作者: Runsheng Wu Bo Tang College of Mathematics and Computing Science Guilin University of Electronic Technology Guilin P. R. China Guangxi Key Laboratory of Cryptography and Information Security P. R. China
It is well known that nonsymmetric algebraic Riccati equation can be efficiently solved by using the structure-preserving doubling algorithm (SDA) with the shift-and-shrink transformation and the corresponding doublin...
来源: 评论
Robust classification with sparse representation fusion on diverse data subsets
arXiv
收藏 引用
arXiv 2019年
作者: Feng, Chun-Mei Xu, Yong Li, Zuoyong Yang, Jian Bio-Computing Research Center Harbin Institute of Technology Shenzhen Guangdong518055 China Key Laboratory of Network Oriented Intelligent Computation Shenzhen Guangdong518055 China Fuzhou350121 China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing Jiangsu210094 China
Sparse Representation (SR) techniques encode the test samples into a sparse linear combination of all training samples and then classify the test samples into the class with the minimum residual. The classification of... 详细信息
来源: 评论
Relative influence maximization in competitive social networks
收藏 引用
Science China(Information Sciences) 2017年 第10期60卷 252-254页
作者: Dingda YANG Xiangwen LIAO Huawei SHEN Xueqi CHENG Guolong CHEN College of Physics and Information Engineering Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing College of Mathematics and Computer Science Fuzhou University Institute of Computing Technology Chinese Academy of Sciences
In many realistic scenarios,such as political election and viral marketing,two opposite opinions,i.e.,positive opinion and negative opinion,spread simultaneously in the same social networks[1,2].Consequently,to achiev... 详细信息
来源: 评论
A Novel Method for ECG Signal Classification via One-Dimensional Convolutional Neural network
arXiv
收藏 引用
arXiv 2020年
作者: Hua, Xuan Han, Jungang Zhao, Chen Tang, Haipeng He, Zhuo Tang, Jinshan Chen, Qing-Hui Tang, Shaojie Zhou, Weihua College of Electronic Engineering Xi’an University of Posts and Telecommunications Xi’an710121 China Key Laboratory of Network Data Analysis and Intelligent Processing in Shaanxi Xi’an710121 China College of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an710121 China College of Computing Michigan Technological University HoughtonMI49931 United States School of Computing University of Southern Mississippi Long Beach39560 United States Deprtment of Kinesiology and Integrative Physiology Michigan Technological University HoughtonMI49931 United States School of Automation Xi’an University of Posts and Telecommunications Xi’an710121 China
This paper presents an end-to-end ECG signal classification method based on a novel segmentation strategy via 1D Convolutional Neural networks (CNN) to aid the classification of ECG signals. The ECG segmentation strat... 详细信息
来源: 评论
An application of insurance mechanism in risk management for energy internet
收藏 引用
High technology Letters 2018年 第2期24卷 196-202页
作者: Yang Yunxue Zhang Qin Zhang Libo CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 P. R. China College of Economics and Management Nanjing University of Aeronautics and Astronautics Nanjing 210016 P. R. China Business College Yantai Nanshan University Yantai 265713 P. R. China
As a completely new residential distribution infrastructure,energy internet facilitates transactions of equipment,energy and services. However,there is security risk under all the *** paper proposes an electricity pri... 详细信息
来源: 评论
Author Correction: Orbital-selective effect of spin reorientation on the Dirac fermions in a non-charge-ordered kagome ferromagnet Fe3Ge
收藏 引用
Nature communications 2024年 第1期15卷 10655页
作者: Rui Lou Liqin Zhou Wenhua Song Alexander Fedorov Zhijun Tu Bei Jiang Qi Wang Man Li Zhonghao Liu Xuezhi Chen Oliver Rader Bernd Büchner Yujie Sun Hongming Weng Hechang Lei Shancai Wang Leibniz Institute for Solid State and Materials Research IFW Dresden 01069 Dresden Sachsen Germany. lourui09@***. Helmholtz-Zentrum Berlin für Materialien und Energie Albert-Einstein-Straße 15 12489 Berlin Germany. lourui09@***. Joint Laboratory "Functional Quantum Materials" at BESSY II 12489 Berlin Germany. lourui09@***. Beijing National Laboratory for Condensed Matter Physics and Institute of Physics Chinese Academy of Sciences Beijing 100190 China. University of Chinese Academy of Sciences Beijing 100049 China. Department of Physics Key Laboratory of Quantum State Construction and Manipulation (Ministry of Education) and Beijing Key Laboratory of Opto-electronic Functional Materials & Micro-nano Devices Renmin University of China Beijing 100872 China. Leibniz Institute for Solid State and Materials Research IFW Dresden 01069 Dresden Sachsen Germany. Helmholtz-Zentrum Berlin für Materialien und Energie Albert-Einstein-Straße 15 12489 Berlin Germany. Joint Laboratory "Functional Quantum Materials" at BESSY II 12489 Berlin Germany. School of Physical Science and Technology ShanghaiTech University Shanghai 201210 China. ShanghaiTech Laboratory for Topological Physics ShanghaiTech University Shanghai 201210 China. School of Information Network Security People's Public Security University of China Beijing 100038 China. Institute of High-Pressure Physics and School of Physical Science and Technology Ningbo University Ningbo 315211 China. Shanghai Institute of Applied Physics Chinese Academy of Sciences Shanghai 201800 China. Institute of Solid State and Materials Physics TU Dresden 01062 Dresden Sachsen Germany. Department of Physics and Guangdong Basic Research Center of Excellence for Quantum Science Southern University of Science and Technology (SUSTech) Shenzhen 518055 China. Quantum Science Center of Guangdong-Hong Kong-Macao Greater Bay Area (Guangdong) Shenzhen 518045 China. Institute of Advanced Science Facilities Shenzhen Guangdong 5181
来源: 评论
Traffic sign classification base on latent dirichlet allocation  1
收藏 引用
6th International Conference on Frontier computing, FC 2017
作者: Song, Lei Liu, Zheyuan Zhang, Xiaoteng Duan, Huixian Liu, Na Dai, Jie The Third Research Institute of the Ministry of Public Security Shanghai China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Shanghai International Technology and Trade United Co. Ltd Shanghai China
Traffic sign classification is a significant issue in the intelligent vehicle domain, which helps vehicles to follow the traffic rules and ensure the safety. Feature selection and description are very important and di... 详细信息
来源: 评论
Abnormal event detection based on in vehicle monitoring system
Abnormal event detection based on in vehicle monitoring syst...
收藏 引用
International Conference on Applications and Techniques in Cyber security and Intelligence, ATCSI 2017
作者: Song, Lei Dai, Jie Duan, Huixian Liu, Zheyuan Liu, Na The Third Research Institute of the Ministry of Public Security Shanghai China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Shanghai International Technology & Trade United Co. Ltd Shanghai China
Nowadays, the cameras of traffic monitoring systems are mounted toward roads or interactions. The views are fixed and limited. To extend the monitoring area, a novel onboard abnormal event detection system is proposed... 详细信息
来源: 评论
Local unitary classification for sets of generalized Bell states
收藏 引用
Physical Review A 2018年 第2期98卷 022304-022304页
作者: Bujiao Wu Jiaqing Jiang Jialin Zhang Guojing Tian Xiaoming Sun Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China University of Chinese Academy of Sciences Beijing 100049 China
In this paper, we study the local unitary (LU) classification for pairs (triples) of generalized Bell states, based on the local unitary equivalence of two sets. In detail, we first introduce some general unitary oper... 详细信息
来源: 评论
Phishing detection research based on LSTM recurrent neural network  4th
Phishing detection research based on LSTM recurrent neural n...
收藏 引用
4th International Conference of Pioneer Computer Scientists, Engineers and Educators, ICPCSEE 2018
作者: Chen, Wenwu Zhang, Wei Su, Yang Key Laboratory for Network and Information Security of Chinese Armed Police Force Engineering University of Chinese Armed Police Force Xi’anShaanxi China Department of Electronic Technology Engineering University of the Chinese Armed Police Force Xi’anShaanxi China
In order to effectively detect phishing attacks, this paper designed a new detection system for phishing websites using LSTM Recurrent neural networks. LSTM has the advantage of capturing data timing and long-term dep... 详细信息
来源: 评论