咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2821-2830 订阅
排序:
Relative Importance Sampling for off-Policy Actor-Critic in Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2018年
作者: Humayoo, Mahammad Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100190 China
Off-policy learning is more unstable compared to on-policy learning in reinforcement learning (RL). One of the reasons for instability of off-policy learning is a discrepancy between target (π) and behavior (b) polic... 详细信息
来源: 评论
A note on two constructions of zero-difference balanced functions
arXiv
收藏 引用
arXiv 2018年
作者: Yi, Zongxiang Yu, Yuyin Tang, Chunming Zheng, Yanbin School of Mathematics and Information Science Guangzhou University Guangzhou510006 China Key Laboratory of Information Security School of Mathematics and Information Science Guangzhou University Guangzhou510006 China School of Computer Science and Network Security Dongguan University of Technology Dongguan523808 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China
Notes on two constructions of zero-difference balanced (ZDB) functions are made in this letter. Then ZDB functions over Ze × Îik=0 Fqi are obtained. And it shows that all the known ZDB functions using cyclot... 详细信息
来源: 评论
Secure communication scheme analysis via complex networks
Secure communication scheme analysis via complex networks
收藏 引用
作者: Ding, Yong Xiong, Ning He, En Li, Kezan School of Computer Science and Information Security Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China School of Mathematics and Computing Science Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China
Recently, some existing works have introduced novel way to construct complex networks from embedded time series, which provides new sights into the organizational properties of the time series in phase space. In this ... 详细信息
来源: 评论
Andro-MD: Android malware detection based on convolutional neural networks
收藏 引用
International Journal of Performability Engineering 2018年 第3期14卷 547-558页
作者: Xie, Nannan Di, Xiaoqiang Wang, Xing Zhao, Jianping School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China Jilin Provincial Key Laboratory of Network and Information Security Changchun130022 China School of Computer Science and Information Technology Beijing Jiaotong University Beijing100044 China
Android OS maintains its dominance in smart terminal markets, which brings growing threats of malicious applications (apps). The research on Android malware detection has attracted attention from both academia and ind... 详细信息
来源: 评论
Corrigendum to “Assessment of precipitation extremes and their association with NDVI, monsoon and oceanic indices over Pakistan” [Atmospheric Research 292 (2023) 106873]
收藏 引用
Atmospheric Research 2023年 294卷
作者: Azfar Hussain Ishtiaq Hussain Shaukat Ali Waheed Ullah Firdos Khan Abolfazl Rezaei Safi Ullah Haider Abbas Asima Manzoom Jianhua Cao Jinxing Zhou International Research Center on Karst under the Auspices of UNESCO Institute of Karst Geology Chinese Academy of Geological Sciences Guilin 541004 China Department of Applied Mathematics Chung Yuan Christian University Chung-Li 32023 Taiwan Global Change Impact Study Centre Ministry of Climate Change Islamabad Pakistan Defense and Security Rabdan Academy Abu Dhabi 114646 United Arab Emirates School of Natural Sciences National University of Sciences and Technology H-12 Campus Islamabad 44000 Pakistan Department of Earth Sciences Institute for Advanced Studies in Basic Sciences Zanjan 45137–66731 Iran Department of Atmospheric and Oceanic Sciences and & Institute of Atmospheric Sciences Fudan University Shanghai 200433 China Synthesis Research Centre of Chinese Ecosystem Research Network Key Laboratory of Ecosystem Network Observation and Modelling Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing 100101 China Department of Sociology Fatima Jinnah Women University Rawalpindi 44000 Pakistan Jianshui Research Station School of Soil and Water Conservation Beijing Forestry University Beijing 100083 China
来源: 评论
Spatiotemporal Knowledge Distillation for Efficient Estimation of Aerial Video Saliency
arXiv
收藏 引用
arXiv 2019年
作者: Li, Jia Fu, Kui Zhao, Shengwei Ge, Shiming State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing100191 China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China Institute of Information Engineering Chinese Academy of Sciences Beijing100095 China School of Cyber Security at University of Chinese Academy of Sciences Beijing100095 China
—The performance of video saliency estimation techniques has achieved significant advances along with the rapid development of Convolutional Neural networks (CNNs). However, devices like cameras and drones may have l... 详细信息
来源: 评论
RETRACTED ARTICLE: Cloud enabled robust authenticated key agreement scheme for telecare medical information system
收藏 引用
Connection Science 2021年 第4期33卷 I页
作者: Liu, Tian Liu, Xuchong Li, Xiong Amin, Ruhul Liang, Wei Meng-Yen, Hsieh School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan People's Republic of China Hunan Provincial Key Laboratory of Network Investigational Technology Hunan Police Academy Changsha People's Republic of China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu People's Republic of China Department of Computer Science and Engineering Dr. SPM International Institute of Information Technology Naya Raipur India College of Computer Science and Electronic Engineering Hunan University Changsha People's Republic of China Deptment of Computer Science and Information Engineering Providence University Taichung Taiwan
We, the authors, Editors and Publisher of the journal Connection Science, have retracted the following article:Tian Liu, Xuchong Liu, Xiong Li, Ruhul Amin, Wei Liang & Meng-Yen Hsieh (2021) Cloud enabled robust au...
来源: 评论
A Design of Direct Memory Access Controller for Wireless Communication SoC in Power Grid
A Design of Direct Memory Access Controller for Wireless Com...
收藏 引用
International Conference on Circuits, System and Simulation (ICCSS)
作者: Yingying Chi Zhe Zheng Research Department of Smart Chip Global Energy Interconnection Research Institute Co. Ltd. Beijing China State Grid Key Laboratory of Information & Network Security State Grid Laboratory of Electric Power Communication Network Technology Beijing China
This paper presents a complete Register Transfer Level (RTL) design of Direct Memory Access (DMA) controller which is compliable with the Advanced Highperformance Bus (AHB). The DMA is integrated in Cortex-M3-based sy... 详细信息
来源: 评论
Self-Evolutionary Neuron Model for Fast-Response Spiking Neural networks
TechRxiv
收藏 引用
TechRxiv 2019年
作者: Zhang, Anguo Han, Ying Hu, Jing Niu, Yuzhen Gao, Yueming Chen, Zhizhang Zhao, Kai College of Physics and Information Engineering Fuzhou University Fujian350108 China The Key Laboratory of Medical Instrumentation Pharmaceutical Technology of Fujian Province Fuzhou350116 China Research Institute of Ruijie Ruijie Networks Co. Ltd Fujian350002 China School of Public Health Xiamen University Xiamen361102 China College of Information and Intelligent Transportation Fujian Chuanzheng Communications College Fuzhou350007 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing College of Mathematics and Computer Science Fuzhou University The Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fujian350108 China College of Physics and information Engineering Fuzhou University the Key Laboratory of Medical Instrumentation Pharmaceutical Technology of Fujian Province Fujian350108 China College of Physics and Information Engineering Fuzhou University 350108 China Faculty of Science and Technology University of Macau 999078 China
We propose two simple and effective spiking neuron models to improve the response time of the conventional spiking neural network. The proposed neuron models adaptively tune the presynaptic input current depending on ... 详细信息
来源: 评论
Research on Loophole with Second Distribution of Real Value Detectors
收藏 引用
Chinese Journal of Electronics 2016年 第6期25卷 1141-1150页
作者: WANG Tianbo ZHANG Fengbin XIA Chunhe Beijing Key Laboratory of Network Technology Beihang University Network and Information Security Laboratory Harbin University of Science and Technology
Traditional anomaly detection algorithm has improved to some degree the mechanism of negative selection. There still remain many problems such as the randomness of detector generation, incompleteness of selfset and th... 详细信息
来源: 评论