咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2781-2790 订阅
排序:
Real-time network traffic classification based on CDH pattern matching  14
Real-time network traffic classification based on CDH patter...
收藏 引用
14th International Conference on Computational Intelligence and security, CIS 2018
作者: Li, Xunzhang Wang, Yong Ke, Wenlong Feng, Hao School of Computer Science and Information Security Guilin University of Electronic Technology Guilin Guangxi541004 China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi541004 China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi541004 China
In recent years, with the rapid development of the Internet, the data scale of application behavior and application traffic have exploded. How to classify the real-time traffic of network becomes a big challenge. How ... 详细信息
来源: 评论
A Novel Video Encryption Method Based on Faster R-CNN
A Novel Video Encryption Method Based on Faster R-CNN
收藏 引用
2018 International Conference on Computer Science, Electronics and Communication Engineering(CSECE2018)
作者: Lijuan Duan Dongkui Zhang Fan Xu Guoqin Cui Faculty of Information Technology Beijing University of Technology Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection State Key Laboratory of Digital Multi-media Chip Technology Vimicro Corporation
In order to improve the generalization performance of video encryption and reduce the amount of data in video en-cryption, this paper proposes a video encryption on regions of interest(ROI) method based on Faster R-CN... 详细信息
来源: 评论
Robust ordinal embedding from contaminated relative comparisons
arXiv
收藏 引用
arXiv 2018年
作者: Ma, Ke Xu, Qianqian Cao, Xiaochun State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences
Existing ordinal embedding methods usually follow a two-stage routine: outlier detection is first employed to pick out the inconsistent comparisons;then an embedding is learned from the clean data. However, learning i... 详细信息
来源: 评论
Spatial-Temporal Person Re-identification
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Guangcong Lai, Jianhuang Huang, Peigen Xie, Xiaohua School of Data and Computer Science Sun Yat-sen University China Guangdong Key Laboratory of Information Security Technology Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education
Most of current person re-identification (ReID) methods neglect a spatial-temporal constraint. Given a query image, conventional methods compute the feature distances between the query image and all the gallery images... 详细信息
来源: 评论
Less but Better: Generalization enhancement of ordinal embedding via distributional margin
arXiv
收藏 引用
arXiv 2018年
作者: Ma, Ke Xu, Qianqian Yang, Zhiyong Cao, Xiaochun State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences
In the absence of prior knowledge, ordinal embedding methods obtain new representation for items in a low-dimensional Euclidean space via a set of quadruple-wise comparisons. These ordinal comparisons often come from ... 详细信息
来源: 评论
Cryptanalysis of a lattice based key exchange protocol
收藏 引用
Science China(Information Sciences) 2017年 第2期60卷 196-198页
作者: Shaowu MAO Pei ZHANG Houzhen WANG Huanguo ZHANG Wanqing WU Computer School of Wuhan University The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Huawei Technoligies Co. Ltd. School of Computer Science and Technology Hebei University
A lattice is a set of points in n-dimensional space with a periodic ***-based cryptosystem holds a great promise for post-quantum cryptography[1],as they enjoy very strong security proofs based on the worst-case hardn... 详细信息
来源: 评论
JDAS: a software development framework for multidatabases
JDAS: a software development framework for multidatabases
收藏 引用
作者: Xie, Guoqi Chen, Yuekun Liu, Yan Fan, Chunnian Li, Renfa Li, Keqin College of Computer Science and Electronic Engineering Hunan University China Key Laboratory for Embedded and Network Computing of Hunan Province China Nanjing University of Information Science and Technology China Department of Computer Science State University of New York New PaltzNY United States
Modern software development for services computing and cloud computing software systems is no longer based on a single database but on existing multidatabases and this convergence needs new software architecture and f... 详细信息
来源: 评论
Simple Convolutional Neural network on Image Classification  2
Simple Convolutional Neural Network on Image Classification
收藏 引用
2017 IEEE 2nd International Conference on Big Data Analysis(ICBDA 2017)
作者: Tianmei Guo Jiwen Dong Henjian Li Yunxing Gao Department of Computer Science and Technology Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan
In recent years,deep learning has been used inimage classification,object tracking,pose estimation,textdetection and recognition,visual saliency detection,actionrecognition and scene *** Encoder,sparse coding,Restrict... 详细信息
来源: 评论
Power Attack and Protected Implementation on Lightweight Block Cipher SKINNY
Power Attack and Protected Implementation on Lightweight Blo...
收藏 引用
Asia Joint Conference on Information security (Asia JCIS)
作者: Jing Ge Yifan Xu Ruiqian Liu Enze Si Ning Shang An Wang School of Computer Science State Key Laboratory of Cryptology Beijing China School of Computer Science Beijing Institute of Technology Beijing China Network Security Squadron of Public Security Department of Henan Province Zhengzhou China Chinese Academy of Sciences China Key laboratory of network assessment technology & Institute of Information Engineering Beijing China
SKINNY is a new lightweight tweakable block cipher family, which can compete to other lightweight cipher in terms of hardware or software implementations. While its theoretical security has been widely studied, little... 详细信息
来源: 评论
Fast stochastic ordinal embedding with variance reduction and adaptive step size
arXiv
收藏 引用
arXiv 2019年
作者: Ma, Ke Zeng, Jinshan Xiong, Jiechao Xu, Qianqian Cao, Xiaochun Liu, Wei Yao, Yuan School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen518055 China School of Computer Information Engineering Jiangxi Normal University NanchangJiangxi330022 China Tencent AI Lab Shenzhen Guangdong China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China Department of Mathematics and by courtesy Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong
—Learning representation from relative similarity comparisons, often called ordinal embedding, gains rising attention in recent years. Most of the existing methods are based on semi-definite programming (SDP), which ... 详细信息
来源: 评论