咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2881-2890 订阅
排序:
$\textsf{LoPub}$ : High-Dimensional Crowdsourced Data Publication With Local Differential Privacy
收藏 引用
IEEE Transactions on Information Forensics and security 2018年 第9期13卷 2151-2166页
作者: Xuebin Ren Chia-Mu Yu Weiren Yu Shusen Yang Xinyu Yang Julie A. McCann Philip S. Yu School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Taiwan Information Security Center Taipei Taiwan Department of Computer Science and Engineering National Chung Hsing University Taichung Taiwan Department of Computing Imperial College London London U.K. School of Engineering and Applied Science Aston University Birmingham U.K. Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China Department of Computer Science University of Illinois at Chicago Chicago IL USA
High-dimensional crowdsourced data collected from numerous users produces rich knowledge about our society; however, it also brings unprecedented privacy threats to the participants. Local differential privacy (LDP), ... 详细信息
来源: 评论
TPEFD: an SDN-based efficient elephant flow detection method
收藏 引用
网络与信息安全学报 2017年 第5期3卷 70-76页
作者: TIAN YU LIU Jing LAI Ying-xu BAO Zhen-shan ZHANG Wen-bo Faculty of Information Technology Beijing University of Technology Beijing 100124 China Key Laboratory of Trusted Computing Beijing 100124 China Information Security Rank Protection Key Technology National Engineering Laboratory Beijing 100124 China)
Software-defined networking(SDN) is a new approach to configure and operate programmable switches of the networks(especially the data center networks) through a centralized software controller. Elephant flows normally... 详细信息
来源: 评论
Collaboration Patterns at Scheduling in 10 Years  14th
Collaboration Patterns at Scheduling in 10 Years
收藏 引用
14th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2017
作者: Xu, Xiujuan Liu, Yu Ma, Ruixin Sheng, Quan Z. School of Software Dalian University of Technology Dalian116620 China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian116620 China Department of Computing Macquarie University SydneyNSW2109 Australia
Scheduling analysis, which focuses on the evaluation, testing and verification of the scheduling systems and the algorithms used in real-time operations, is critical to a number of research areas such as databases and... 详细信息
来源: 评论
Capacity optimality of AMP in coded systems
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Lei Liang, Chulong Ma, Junjie Ping, Li Hong Kong SAR China Nomi 923-1292 Japan Department of Electrical Engineering City University of Hong Kong Hong Kong SAR China Algorithm Department ZTE Corporation Shenzhen 518057 China State Key Laboratory of Mobile Network Mobile Multimedia Technology ZTE Corporation Shenzhen 518057 China Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences University of Chinese Academy of Science Beijing China Department of Electronic Engineering City University of Hong Kong Hong Kong SAR China
This paper studies a large random matrix system (LRMS) model involving an arbitrary signal distribution and forward error control (FEC) coding. We establish an area property based on the approximate message passing (A... 详细信息
来源: 评论
Hierarchical taxonomy-aware and attentional graph capsule RCNNs for large-scale multi-label text classification
arXiv
收藏 引用
arXiv 2019年
作者: Peng, Hao Li, Jianxin Gong, Qiran Wang, Senzhang He, Lifang Li, Bo Wang, Lihong Yu, Philip S. Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 State Key Laboratory of Software Development Environment Beihang University Beijing100083 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China Department of Biostatistics and Epidemiology University of Pennsylvania PhiladelphiaPA19104 United States National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China Department of Computer Science University of Illinois at Chicago ChicagoIL60607 United States
CNNs, RNNs, GCNs, and CapsNets have shown significant insights in representation learning and are widely used in various text mining tasks such as large-scale multi-label text classification. However, most existing de... 详细信息
来源: 评论
Detecting Phishing Websites via Aggregation Analysis of Page Layouts
收藏 引用
Procedia Computer Science 2018年 129卷 224-230页
作者: Jian Mao Jingdong Bian Wenqian Tian Shishi Zhu Tao Wei Aili Li Zhenkai Liang School of Electronic and Information Engineering Beihang University Beijing 100183 China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai 200240 China Baidu USA LLC. Sunnyvale CA 94089 USA Information Technology Service Center China National Petroleum Corporation Beijing 100007 China School of Computing National University of Singapore Singapore 117417 Singapore
Phishing websites are typical starting points of online social engineering attacks, including many recent online scams. The attackers develop web pages mimicking legitimate websites, and send the malicious URLs to vic... 详细信息
来源: 评论
Data-Driven Traditional Chinese Medicine Clinical Herb Modeling and Herb Pair Recommendation
Data-Driven Traditional Chinese Medicine Clinical Herb Model...
收藏 引用
International Conference on Digital Home (ICDH)
作者: Gansen Zhao Xutian Zhuang Xinming Wang Weimin Ning Zijing Li Jianfei Wang Qiang Chen Zefeng Mo Bingchuan Chen Huiyan Chen School of Computer Science Guangzhou Key Laboratory of Cloud Computing Security and Assessment Technology Dongguan Hospital of Traditional Chinese Medicine Guangdong University of Education School of Mathematical Sciences South China Normal University School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou Flaming Interactive Information Technology Co. LTD Guangdong China
As an important branch of medical field, Traditional Chinese Medicine(TCM) continues to be explored in data mining research. Taking advantage of machine learning models and deep learning methods, researchers dive into... 详细信息
来源: 评论
Leveraging geometric correlation for input-adaptive facial landmark regression
Leveraging geometric correlation for input-adaptive facial l...
收藏 引用
2017 IEEE International Conference on Multimedia and Expo, ICME 2017
作者: Feng, Yuyao Liu, Risheng Fan, Xin Huyan, Kang Luo, Zhongxuan DUT-RU International School of Information and Software Engineering Dalian University of Technology China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province China Department of Computing Hong Kong Polytechnic University Hong Kong
Facial analysis plays very important role in many vision applications, such as authentication and entertainments. The very early works in the 1990s mostly focus on estimating geometric deformations of facial landmarks... 详细信息
来源: 评论
Revisiting Recent and Current Anomaly Detection based on Machine Learning in Ad-Hoc networks
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1288卷
作者: Zhixiao Wang Mingyu Chen Wenyao Yan Wendong Wang Ang Gao Gaoyang Nie Feng Wang Shaobo Yang Xi'an University of Technology Xi'an 710048 China Goettingen University Goettingen 37077 Germany Xi'an Jiaotong University Xi'an 710049 China Shaanxi Provincial Key Laboratory of Network Computing and Security Technology Xi'an 710048 China College of Xi'an Innovation Yan'an University Xi'an 710100 China Yan'an University Yan'an 716000 China National Satellite Meteorological Center China Meteorological Administration Beijing 100081 China
Ad-Hoc network which is one kind of self-organized networks is much more vulnerable than the infrastructural network with the properties of highly changeable linkage, dynamic structure, and wireless connections so tha...
来源: 评论
An SVEIR defending model with partial immunization for worms
收藏 引用
International Journal of network security 2017年 第1期19卷 20-26页
作者: Wang, Fangwei Gao, Hongfeng Yang, Yong Wang, Changguang College of Information Technology Hebei Normal University No. 20 South ErHuan Road YuHua District Shijiazhuang050024 China Shaanxi Key Laboratory of Network and System Security Xidian University No. 2 TaiBai South Road YanTa District Xi'an710071 China Network and Information Center Guizhou University No. 242 Huaxi Street HuaXi District Guiyang550025 China Network and Information Center Yunnan University No. 2 Cuihu North Road WuHua District Kunming650091 China
Internet worms can propagate across networks horrendously, reduce network security remarkably, and cause economic losses heavily. How to quickly eliminate the Internet worms using partial immunization becomes a big is... 详细信息
来源: 评论