咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2791-2800 订阅
排序:
Pixels Matching in No Obvious Feature Area in Binocular Vision Based on Peripheral Feature Points
Pixels Matching in No Obvious Feature Area in Binocular Visi...
收藏 引用
International Conference on security, Pattern Analysis, and Cybernetics (SPAC)
作者: Renlong Chen Mingjun Liu Xueyan Gong Jinping Li School of Information Science and Engineering Shandong Provincial Key Laboratory of Network Based Intelligent Computing (University of Jinan) Shandong College and University Key Laboratory of Information Processing and Cognitive Computing in 13th Five-year Jinan China Qilu Institute of Technology Shandong Provincial Key Laboratory of Network Based Intelligent Computing (University of Jinan) Shandong College and University Key Laboratory of Information Processing and Cognitive Computing in 13th Five-year Jinan China
In binocular vision, the pixel matching of no obvious feature refers to the matching of pixels in the area where the gray value does not change significantly or in the area where there is no significant gradient chang... 详细信息
来源: 评论
Research on SDN Multi Controller Deployment based on K-means++
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1606卷
作者: Li Yue Chen Junyan Liang Chuxin Lei Xiaochun School of computer and information security Guilin University of Electronic Technology Guilin 541004 China Guangxi cloud computing and big data collaborative innovation center Guilin 541001 China Guangxi key laboratory of image and graphic intelligent processing Guilin 541004 China
In large-scale SDN network, a single centralized controller can not meet the demand, and multiple controllers are needed to deal with the problem, which leads to the problem of multi control balanced deployment. In th...
来源: 评论
A robust facial descriptor for face recognition
A robust facial descriptor for face recognition
收藏 引用
International Conference on Applications and Techniques in Cyber security and Intelligence, ATCSI 2017
作者: Liu, Na Duan, Huixian Song, Lei Yan, Zhiguo Cyber Physical System R&D Center The Third Research Institute of Ministry of Public Security Shanghai China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Shanghai International Technology and Trade United Co. Ltd Shanghai China
Illumination, occlusion, pose and expression variations are the most common challenging problems for face recognition in many real-world applications. However, existing face recognition methods are proposed to handle ... 详细信息
来源: 评论
A speed estimation method of vehicles based on road monitoring video-images
A speed estimation method of vehicles based on road monitori...
收藏 引用
International Conference on Applications and Techniques in Cyber security and Intelligence, ATCSI 2017
作者: Huixian, Duan Jun, Wang Lei, Song Yixin, Zhao Liu, Na The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Cyber Physical System R&D Center The Third Research Institute of Ministry of Public Security Shanghai China Shanghai International Technology and Trade United Co. Ltd Shanghai China
In order to reduce traffic accidents and road congestion in many cities, vehicle speed estimation is very critical and important to observe speed limitation law and traffic conditions. In this paper, we present a spee... 详细信息
来源: 评论
A Cortex-M3-Based System-On-Chip Architecture for Wireless Communications in Power Grid
A Cortex-M3-Based System-On-Chip Architecture for Wireless C...
收藏 引用
IEEE Information technology and Mechatronics Engineering Conference (ITOEC)
作者: Yingying Chi Weilong Zhang Zhe Zheng Wenpeng Cui State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Co. Ltd. State Grid Laboratory of Electric Power Communication Network Technology Beijing China
This paper presents a Cortex-M3-based system-on-chip (SoC) architecture designed for power-grid-dedicated wireless communication system based on IEEE 802.11ah protocol. The SoC is integrated with a 32-bit embedded mic... 详细信息
来源: 评论
Research on Electric Micro-Meteorological Monitoring and Early Warning System
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1449卷
作者: Zhang, Zehao Yu, Zhen Xu, Xiyuan Cheng, Guan Zhang, Song Global Energy Interconnection Research Institute co. Ltd Research Institute of Information Technology & Communication Beijing 102206 China. State Grid Key Laboratory of Information & Network Security State Grid FuJian Electric Power co. LTD
This paper studies and analyzes the influence of micro-meteorological disasters on power system, points out the main problems in the establishment of power micro-meteorological monitoring and early warning system, put...
来源: 评论
Minimum length key in MST cryptosystems
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 142-152页
作者: Haibo HONG Licheng WANG Haseeb AHMAD Yixian YANG Zhiguo QU School of Computer Science and Information Engineering Zhejiang Gongshang University Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology
As a special factorization category of finite groups, logarithmic signature(LS) is used as the main component of cryptographic keys that operate within secret key cryptosystems such as PGM and public key cryptosystems... 详细信息
来源: 评论
A Performance Comparison of Big Data Processing Platform Based on Parallel Clustering Algorithms
收藏 引用
Procedia Computer Science 2018年 139卷 127-135页
作者: Mo Hai Yuejing Zhang Haifeng Li School of Information Central University of Finance and Economics Beijing 100081 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu 610054 China
The performance of three typical big data processing platform: Hadoop, Spark and DataMPI are compared based on different parallel clustering algorithms: parallel K-means, parallel fuzzy K-means and parallel Canopy. Ex... 详细信息
来源: 评论
An Improved Convolutional Neural network Algorithm for Multi-Label Classification
An Improved Convolutional Neural Network Algorithm for Multi...
收藏 引用
International Conference on Audio, Language and Image Processing, ICALIP
作者: Xinsheng Wang Lijun Sun Zhihua Wei Department of Computer Science and Technology Tongji University Shanghai China Research Center of Big Data and Network Security Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China
Recent years conventional neural network(CNN) has been applied to different natural language processing(NLP) tasks such as sentence classification, sentence modeling, etc. Some researchers use CNN to do multi-label cl... 详细信息
来源: 评论
Implementing security-Enhanced PHR System in the Cloud using FAME
Implementing Security-Enhanced PHR System in the Cloud using...
收藏 引用
IEEE Global Communications Conference
作者: Zuobin Ying Wenjie Jiang Ximeng Liu Shengmin Xu School of Computer Science & Technology Anhui University Hefei China School of Electrical & Electronic Engineering Nanyang Technological University Singapore College of Mathematics & Computer Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Information Security of Network Systems Fuzhou University Fuzhou China School of Information Systems Singapore Management University Singapore
Personal Health Record (PHR) plays an important role in realizing the exchange and interaction of medical information as well as in managing chronic diseases. In the recent decade, plenty of researches have been carri... 详细信息
来源: 评论