咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2771-2780 订阅
排序:
Dense small cell networks: From noise-limited to dense interference-limited
Dense small cell networks: From noise-limited to dense inter...
收藏 引用
作者: Yang, Bin Mao, Guoqiang Ding, Ming Ge, Xiaohu Tao, Xiaofeng School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan430074 China School of Computing and Communication University of Technology Sydney UltimoNSW2007 Australia Data61 CSIRO CanberraACT2601 Australia National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing100876 China
Considering both non-line-of-sight (NLoS) and line-of-sight (LoS) transmissions, the transitional behaviors from noise-limited regime to dense interference-limited regime have been investigated for the fifth generatio... 详细信息
来源: 评论
Private keyword-Search for Database Systems Against Insider Attacks
收藏 引用
Journal of Computer Science & technology 2017年 第3期32卷 599-617页
作者: Peng Jiang Yi Mu Fuchun Guo Qiao-Yan Wen State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Centre for Computer and Information Security Research School of Computing and Information Technology University of Wollongong Wollongong NSW 2522 Australia
The notion of searchable encrypted keywords introduced an elegant approach to retrieve encrypted data without the need of decryption. Since the introduction of this notion, there are two main searchable encrypted keyw... 详细信息
来源: 评论
Quantifying the impact of scholarly papers based on higher-order weighted citations
arXiv
收藏 引用
arXiv 2020年
作者: Bai, Xiaomei Zhang, Fuli Hou, Jie Lee, Ivan Kong, Xiangjie Tolba, Amr Xia, Feng Computing Center Anshan Normal University Anshan114007 China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian116620 China Library Anshan Normal University Anshan114007 China School of ITMS University of South Australia Mawson LakesSA5095 Australia Computer Science Department Community College King Saud University Riyadh11437 Saudi Arabia Mathematics Department Faculty of Science Menoufia University Shebin-El-Kom32511 Egypt
Quantifying the impact of a scholarly paper is of great significance, yet the effect of geographical distance of cited papers has not been explored. In this paper, we examine 30,596 papers published in Physical Review...
来源: 评论
Application of BIM coding and example modelling for typical asphalt pavement diseases based on Omni Class
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2044卷
作者: Xian Tong Li Hong Wei Zhang Zhen Zheng Liu Wan Ying Qu Zhao Hui Wu Liang Wang China Academy of Transportation Sciences Beijing 100029 China Inner Mongolia Autonomous Region Traffic Construction Engineering Quality Supervision Bureau Hohhot 0110051 China Key laboratory of Transport Industry of Management Control and Cycle Repair Technology for Traffic Network Facilitates in Ecological Security Barrier Area Hohhot 0110051 China Changchun Municipal Engineering Design & Research Institute Changchun 130000 China
With the widespread application of BIM technology in highway engineering, the practice of coding asphalt pavement diseases and integrating it with BIM models in the highway management and maintenance stage can contrib...
来源: 评论
The theoretical study of Cs/O absorption on Ga0.9375Mg0.0625N (0001) surface: A first principle calculation
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1593卷
作者: S S Ren J Ma X Q Fu M Z Yang H Zhao School of Information Science and Engineering University of Jinan China Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan China School of Physics and Optoelectronic Engineering Nanjing University of Information Science and Technology China
In order to theoretically study the adsorption process of GaN photocathode, the adsorption model on Ga0.9375Mg0.0625N is established. Then, the adsorption energy, work function, mullikeen charge distribution and densi...
来源: 评论
SMOOTHING NEWTON ALGORITHM FOR THE CIRCULAR CONE PROGRAMMING WITH A NONMONOTONE LINE SEARCH
收藏 引用
Acta Mathematica Scientia 2017年 第5期37卷 1262-1280页
作者: 迟晓妮 韦洪锦 万仲平 朱志斌 School of Mathematics and Computing Science Guangxi Key Laboratory of Cryptography and Information SecurityGuilin University of Electronic TechnologyGuilin 541004China School of Mathematics and Computing Science Guangxi Key Laboratory of Automatic Detecting Technology and InstrumentsGuilin University of Electronic TechnologyGuilin 541004China School of Mathematics and Statistics Wuhan UniversityWuhan 430072China School of Mathematics and Computing Science Guangxi Colleges and Universities Key Laboratory of Data Analysis and ComputationGuilin University of Electronic TechnologyGuilin 541004China
In this paper, we present a nonmonotone smoothing Newton algorithm for solving the circular cone programming(CCP) problem in which a linear function is minimized or maximized over the intersection of an affine space w... 详细信息
来源: 评论
Video steganographic algorithm based on intra prediction modification for H.264/AVC
Advances in Intelligent Systems and Computing
收藏 引用
Advances in Intelligent Systems and computing 2018年 613卷 145-155页
作者: Zhang, Yingnan Zhang, Minqing Zhang, Zhen Yang, Haibin Niu, Ke Key Laboratory of Network and Information Security of CAPF Xi’anShaanxi710086 China Electronic Technology Department Engineering University of CAPF Xi’anShaanxi710086 China
To analyze the technique of video steganography, which provides security guarantees for national security and confidential information of government agencies and enterprises, videos may be used to transform secret inf... 详细信息
来源: 评论
A Universal Designated Multi-Verifier Transitive Signature Scheme  13th
A Universal Designated Multi-Verifier Transitive Signature S...
收藏 引用
13th International Conference on Information securityand Cryptology, Inscrypt 2017
作者: Zhu, Fei Zhang, Yuexin Lin, Chao Wu, Wei Meng, Ru Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Informatics Fujian Normal University Fuzhou China School of Software and Electrical Engineering Swinburne University of Technology HawthornVIC3122 Australia School of Computer Science Shaanxi Normal University Xi’an China
A Universal Designated Verifier Transitive Signature (UDVTS) scheme is designed for the graph-based big data system. Specifically, it allows a transitive signature holder to convince the designated verifier with a tra... 详细信息
来源: 评论
An End-to-End Detection Method for WebShell with Deep Learning
An End-to-End Detection Method for WebShell with Deep Learni...
收藏 引用
International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC)
作者: Longchen Qi Rui Kong Yang Lu Honglin Zhuang MOE Key Laboratory of Network and Software Security on Peking University Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China Office 497 of Military Representative Bureau of Chongqing Chongqing China
In this paper, a generic static end-to-end detection framework with deep neural network for WebShell is designed, which is free from human labor and domain knowledge. In this paper, we simultaneously introduce word em... 详细信息
来源: 评论
A review of deep reinforcement learning for smart building energy management
arXiv
收藏 引用
arXiv 2020年
作者: Yu, Liang Qin, Shuqi Zhang, Meng Shen, Chao Jiang, Tao Guan, Xiaohong College of Automation College of Artificial Intelligence Nanjing University of Posts and Telecommunications Nanjing210003 China Xi'an Jiaotong University Xi'an710049 China College of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210003 China Systems Engineering Institute Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China School of Cyber Science and Engineering Xi'an Jiaotong University Xi'an710049 China Wuhan National Laboratory for Optoelectronics School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan430074 China
Global buildings account for about 30% of the total energy consumption and carbon emission, raising severe energy and environmental concerns. Therefore, it is significant and urgent to develop novel smart building ene... 详细信息
来源: 评论