咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2841-2850 订阅
排序:
Cubic medium field equation public key cryptosystem
收藏 引用
International Journal of network security 2018年 第3期20卷 472-477页
作者: Lu, Gang Xue, Linyuan Nie, Xuyun Qin, Zhiguang Liu, Bo School of Information and Software Engineering University of Electronic Science and Technology of China 4 Jianshe North Rd 2nd Section Chenghua Qu Chengdu610054 China State Key Laboratory of Information Security Institute of Information Engineering Beijing100093 China Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China
Medium Field Equation (MFE) multivariate public key cryptosystems were broken by High Order Linearization Equation (HOLE) attack. In order to avoid HOLE attack, we proposed an improvement of MFE, Cubic MFE public key ... 详细信息
来源: 评论
A design of the common platform of wireless communication based on FPGA
A design of the common platform of wireless communication ba...
收藏 引用
2017 IEEE Conference on Energy Internet and Energy System Integration, EI2 2017
作者: Qiao, Lei Zheng, Zhe Cui, Wenpeng Zhang, Weilong Jiang, Xueping Research Department of Smart Chip Global Energy Interconnection Research Institute Beijing China State Grid Key Laboratory of Information and Network Security State Grid Laboratory of Electric Power Communication Network Technology Beijing China
We present a design of the common platform of wireless communication based on FPGA. The platform, developed by us, allows researchers to modify transport protocols on any layer of an OSI reference model, from physical... 详细信息
来源: 评论
Coarse to fine: Diffusing categories in wikipedia  26
Coarse to fine: Diffusing categories in wikipedia
收藏 引用
26th International World Wide Web Conference, WWW 2017 Companion
作者: Cai, Pengshan Feng, Yansong Jia, Yantao Wang, Yuanzhuo Jin, Xiaolong Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China Institute of Computer Science and Technology Peking University Beijing China
Automatic taxonomy construction aims to build a categorization system without human efforts. Traditional textual pattern based methods extract hyponymy relation in raw texts. However, these methods usually yield low p... 详细信息
来源: 评论
A novel visible-infrared image fusion framework for smart city
收藏 引用
International Journal of Simulation and Process Modelling 2018年 第2期13卷 144-155页
作者: Zhu, Zhiqin Qi, Guanqiu Chai, Yi Yin, Hongpeng Sun, Jian School of Automation Chongqing University Chongqing400044 China State Key Laboratory of Power Transmission Equipment and System Security and New Technology College of Automation Chongqing University Chongqing400044 China School of Computing Informatics and Decision Systems Engineering Arizona State University TempeAZ85287 United States Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing400030 China
Image fusion technology is widely used in different areas and can integrate complementary and relevant information of source images captured by multiple sensors into a unitary synthetic image. Image fusion technology ... 详细信息
来源: 评论
Model inconsistent but correlated noise: Multi-view subspace learning with regularized Mixture of Gaussians
arXiv
收藏 引用
arXiv 2018年
作者: Yong, Hongwei Meng, Deyu Li, Jinxing Zuo, Wangmeng Zhang, Lei Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xian Jiaotong University School of Computer Science and Technology Harbin Institute of Technology Harbin150001 China
Multi-view subspace learning (MSL) aims to find a low-dimensional subspace of the data obtained from multiple views. Different from single view case, MSL should take both common and specific knowledge among different ... 详细信息
来源: 评论
An image encryption algorithm based on compressed sensing and dual-tree complex wavelet transform  17
An image encryption algorithm based on compressed sensing an...
收藏 引用
5th International Conference on Bioinformatics and Computational Biology, ICBCB 2017
作者: Dong, Jiwen Zhao, Ziru Li, Hengjian Department of Computer Science and Technology Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Jinan City Shandong Province China
Combined image encryption with the process of compressed sensing (CS) which based on dual-tree complex wavelet transform, we came up with the image encryption algorithm which based on the theory of CS and double rando... 详细信息
来源: 评论
Palm-print recognition algorithm based on random projection and chaotic system  17
Palm-print recognition algorithm based on random projection ...
收藏 引用
5th International Conference on Bioinformatics and Computational Biology, ICBCB 2017
作者: Dong, Jiwen Zhao, Ziru Li, Hengjian Feng, Guang Department of Computer Science and Technology Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Jinan City Shandong Province China
To improve the efficiency and security of palm-print recognition, we proposed a palm-print algorithm which based on random projection and chaotic system. Using twice random projections based on chaotic system to proce... 详细信息
来源: 评论
Image Classification Based on Quantum KNN Algorithm
arXiv
收藏 引用
arXiv 2018年
作者: Dang, Yijie Jiang, Nan Hu, Hao Ji, Zhuoxiao Zhang, Wenyin Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China School of Information Science and Technology Linyi University Linyi276000 China
Image classification is an important task in the field of machine learning and image processing. However, the usually used classification method — the K Nearest-Neighbor algorithm has high complexity, because its two... 详细信息
来源: 评论
Chinese Herbal Medicine Classification Using Convolutional Neural network with Multiscale Images and Data Augmentation
Chinese Herbal Medicine Classification Using Convolutional N...
收藏 引用
International Conference on security, Pattern Analysis, and Cybernetics (SPAC)
作者: Tianhao Li Fengyang Sun Runyuan Sun Lin Wang Meihui Li Huawei Yang Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Jinan China Shandong Provincial Key Laboratory of of Oral Tissue Regeneration Shandong University Jinan Shandong China Jinan Kingmon Information Technology Co. Ltd. Jinan China
Correct use of Chinese herbal medicines is vital to life safety of the patients. Chinese herbal medicine classification is very important for the correct use of Chinese herbal medicines. Traditional methods like micro... 详细信息
来源: 评论
An Event Timeline Extraction Method Based on News Corpus  2
An Event Timeline Extraction Method Based on News Corpus
收藏 引用
2017 IEEE 2nd International Conference on Big Data Analysis(ICBDA 2017)
作者: Yaguang Wu Haichun Sun Chungang Yan Department of Computer Science and Technology Tongji University The Key Laboratory of Embedded System and Service Computing Tongji University College of Police Information Engineering People's Public Security University of China
Event extraction is an important research point in information extraction area, and news event extraction has a greater practical significance. The existing methods of extracting news event, which starts from the time... 详细信息
来源: 评论