咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2761-2770 订阅
排序:
Chinese Herbal Medicine Classification Using Convolutional Neural network with Multiscale Images and Data Augmentation
Chinese Herbal Medicine Classification Using Convolutional N...
收藏 引用
2018 International Conference on security, Pattern Analysis, and Cybernetics, SPAC 2018
作者: Li, Tianhao Sun, Fengyang Sun, Runyuan Wang, Lin Li, Meihui Yang, Huawei University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan250022 China Shandong University Jinan Shandong Provincial Key Laboratory of Oral Tissue Regeneration Department of Human Microbiome Jinan Shandong250012 China Jinan Kingmon Information Technology Co. Ltd. Jinan250022 China
Correct use of Chinese herbal medicines is vital to life safety of the patients. Chinese herbal medicine classification is very important for the correct use of Chinese herbal medicines. Traditional methods like micro... 详细信息
来源: 评论
Load Feedback-Based Resource Scheduling and Dynamic Migration-Based Data Locality for Virtual Hadoop Clusters in OpenStack-Based Clouds
收藏 引用
Tsinghua Science and technology 2017年 第2期22卷 149-159页
作者: Dan Tao Zhaowen Lin Bingxu Wang School of Electronic and Information Engineering Beijing Jiaotong UniversityBeijing 100044China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003China Network and Information Center Institute of Network TechnologyScience and Technology on Information Transmission and Dissemination in Communication Networks LaboratoryNational Engineering Laboratory for Mobile Network SecurityBeijing University of Posts and TelecommunicationsBeijing 100876China
With cloud computing technology becoming more mature, it is essential to combine the big data processing tool Hadoop with the Infrastructure as a Service(Iaa S) cloud platform. In this study, we first propose a new ... 详细信息
来源: 评论
Research on System Dynamics and Agent Hybrid Modeling Method for Multi-Energy Collaborative Control Under Ubiquitous Power Internet
Research on System Dynamics and Agent Hybrid Modeling Method...
收藏 引用
IEEE Conference on Energy Internet and Energy System Integration (EI2)
作者: Fuxing Zhang Yingjie Zhang Xiong Zhan Juan Luo Honglei Miao Yonghua Gui College of Computer Science and Electronic Engineering Hunan University Changsha China State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Beijing China Hardware R&D Department HNAC Technology Co. Ltd. Changsha China
In order to promote the study of system dynamics (SD) and multi-agent theory and its wide application in the field of renewable energy, a hybrid modeling method of SD and Agent is proposed in this paper, which is suit... 详细信息
来源: 评论
Accurate Recovery of Internet Traffic Data: A Sequential Tensor Completion Approach
Accurate Recovery of Internet Traffic Data: A Sequential Ten...
收藏 引用
作者: Xie, Kun Wang, Lele Wang, Xin Xie, Gaogang Wen, Jigang Zhang, Guangxing Cao, Jiannong Zhang, Dafang College of Computer Science and Electronics Engineering Hunan University Changsha410006 China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing100864 China Department of Electrical and Computer Engineering State University of New York at Stony Brook Stony BrookNY11794 United States Network Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing100864 China Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
The inference of traffic volume of the whole network from partial traffic measurements becomes increasingly critical for various network engineering tasks, such as capacity planning and anomaly detection. Previous stu... 详细信息
来源: 评论
Time-varying massive MIMO channel estimation: Capturing, reconstruction and restoration
arXiv
收藏 引用
arXiv 2019年
作者: Li, Muye Zhang, Shun Zhao, Nan Zhang, Weile Wang, Xianbin State Key Laboratory of Integrated Services Networks Xidian University Xian710071 China School of Information and Communication Engineering Dalian University of Technology Dalian116024 China MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China Department of Electrical and Computer Engineering Western University LondonON Canada
On the time-varying channel estimation, the traditional downlink (DL) channel restoration schemes usually require the reconstruction for the covariance of downlink process noise vector, which is dependent on DL channe... 详细信息
来源: 评论
Correction to: Underwater image enhancement using an edge-preserving filtering Retinex algorithm
收藏 引用
Multimedia Tools and Applications 2020年 第25期79卷 17279-17279页
作者: Peixian Zhuang Xinghao Ding Jiangsu Key Laboratory of Meteorological Observation and Information Processing Jiangsu Technology and Engineering Center of Meteorological Sensor Network School of Electronic and Information Engineering Nanjing University of Information Science and Technology Nanjing China Fujian Key Laboratory of Sensing and Computing for Smart City School of Information Science and Engineering Xiamen University Xiamen China
In the original publication, Equations were incorrectly presented. The original article has been corrected.
来源: 评论
A Study on Influential User Identification in Online Social networks
收藏 引用
Chinese Journal of Electronics 2016年 第3期25卷 467-473页
作者: WANG Nan SUN Qindong ZHOU Yadong SHEN Si Shaanxi Key Laboratory of Network Computing and Security Xi'an University of Technology Ministry of Education Key Laboratory For Intelligent Network and Network Security Xi'an Jiaotong University
Influential user evaluation is great importance in many application areas of online social *** order to identify influential users in a more adequate and practical way, we propose a Dynamic regional interaction model(... 详细信息
来源: 评论
MFPR: A Personalized Ranking Recommendation with Multiple Feedback
收藏 引用
ACM Transactions on Social computing 2018年 第2期1卷 1–22页
作者: Shi, Chuan Liu, Jian Zhang, Yiding Hu, Binbin Liu, Shenghua Yu, Philip S. Beijing Key Lab of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications No. 10 Xi Tu Cheng Road Beijing China Cas Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences No.6 Kexueyuan South Road Zhongguancun Beijing China Department of Computer Science University of Illinois at Chicago 851 South Morgan Street Chicago United States
Recently, recommender systems have played an important role in improving web user experiences and increasing profits. Recommender systems exploit users' behavioral history (i.e., feedback on items) to build models... 详细信息
来源: 评论
Coherence-based automated essay scoring using self-attention  17th
Coherence-based automated essay scoring using self-attention
收藏 引用
17th China National Conference on Computational Linguistics, CCL 2018 and 6th International Symposium on Natural Language Processing Based on Naturally Annotated Big Data, NLP-NABD 2018
作者: Li, Xia Chen, Minping Nie, Jianyun Liu, Zhenxing Feng, Ziheng Cai, Yingdan Key Laboratory of Language Engineering and Computing Guangdong University of Foreign Studies Guangzhou China School of Information Science and Technology/School of Cyber Security Guangdong University of Foreign Studies Guangzhou China Department of Computer Science and Operations Research University of Montreal Montreal Canada
Automated essay scoring aims to score an essay automatically without any human assistance. Traditional methods heavily rely on manual feature engineering, making it expensive to extract the features. Some recent studi... 详细信息
来源: 评论
AClog: Attack Chain Construction Based on Log Correlation
AClog: Attack Chain Construction Based on Log Correlation
收藏 引用
IEEE Global Communications Conference
作者: Teng Li Jianfeng Ma Qingqi Pei Yulong Shen Chi Lin Siqi Ma Mohammad S. Obaidat School of Cyber Engineering Xidian University Shaanxi China Shaanxi Key Laboratory of BlockChain and Security Computing Xidian University Shaanxi China School of Computer Science Xidian University Shaanxi China School of Software Technology Dalian University of Technology Dalian China Commonwealth Scientific and Industrial Research Organisation Sydney Australia College of Computing and Informatics University of Sharjah UAE University of Jordan Jordan Nazarbayev University Kazakhstan University of Science and Technology Beijing China
Before the final attack happens, clandestine attackers conduct sequenced stages for being stealthy and elusive. These attacks can leave clues in several different log files. However existing approaches can only detect... 详细信息
来源: 评论