咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2891-2900 订阅
排序:
Learning converged propagations with deep prior ensemble for image enhancement
arXiv
收藏 引用
arXiv 2018年
作者: Liu, Risheng Ma, Long Wang, Yiyang Zhang, Lei DUT-RU International School of Information Science & Engineering Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian University of Technology Dalian China State Key Laboratory of Integrated Services Networks Xidian University Xi'an China Institute of Atmospheric Sciences Fudan University Shanghai Institute of Meteorological Science Shanghai China Department of Computing Hong Kong Polytechnic University Hong Kong
Enhancing visual qualities of images plays very important roles in various vision and learning applications. In the past few years, both knowledge-driven maximum a posterior (MAP) with prior modelings and fully data-d... 详细信息
来源: 评论
Effect of heat shield on the heating efficiency in MOCVD chamber by resistive heating
收藏 引用
Journal of Physics: Conference Series 2019年 第2期1187卷
作者: Lili Zhao Zhiming Li Jincheng Zhang Runqiu Guo Ligen Lu Lansheng Feng Shandong Provincial Key Laboratory of Network based Intelligent Computing School of Information Science and Engineering University of Jinan 250022 Jinan China State Key Discipline Laboratory of Wide Band-Gap Semiconductor Technology School of Microelectronics Xidian University710071 Xi'an China School of Mechano-Electronic Engineering Xidian University 710071 Xi'an China
In the conventional resistive heating systems, the heating efficiency of the resistance heating system is too low. In this work, by adding heat shield in the traditional heating structure. The effects of factors such ...
来源: 评论
A User-Centric Data Secure Creation Scheme in Cloud computing
收藏 引用
Chinese Journal of Electronics 2016年 第4期25卷 753-760页
作者: SU Mang LI Fenghua SHI Guozhen GENG Kui XIONG Jinbo School of Computer Science and Engineering Nanjing University of Science and Technology State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Department of Information Security Beijing Electronic Science and Technology Institute State Key Laboratory of Integrated Services Network Xidian University
Due to the use of the cloud computing technology,the ownership is separated from the administration of the data in cloud and the shared data might be migrated between different clouds,which would bring new challenges ... 详细信息
来源: 评论
Reverse Furthest Neighbors Query in Road networks
收藏 引用
Journal of Computer Science & technology 2017年 第1期32卷 155-167页
作者: Xiao-Jun Xu Jin-Song Bao Bin Yao Jing-Yu Zhou Fei-Long Tang Min-Yi Guo Jian-Qiu Xu School of Software Beijing Institute of Technology Beijing 100081 China First Research Institute of Ministry of Public Security Beijing 100048 China College of Mechanical Engineering Donghua University Shanghai 200051 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China
Given a road network G = (V, E), where V(E) denotes the set of vertices(edges) in G, a set of points of interest P and a query point q residing in G, the reverse furthest neighbors (RFNR) query in road network... 详细信息
来源: 评论
A Vehicular Positioning Enhancement with Connected Vehicle Assistance Using Extended Kalman Filtering  1st
A Vehicular Positioning Enhancement with Connected Vehicle A...
收藏 引用
1st International Conference on 5G for Future Wireless networks, 5GWN 2017
作者: Tian, Daxin Liu, Wenhao Duan, Xuting Rong, Hui Guo, Peng Wang, Wenyang Zhang, Haijun Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University XueYuan Road No. 37 Beijing100191 China China Automotive Technology and Research Center Automotive Engineering Research Institute East Xianfeng Road No. 68 Tianjin300300 China School of Computer and Communication Engineering University of Science and Technology Beijing XueYuan Road No. 30 Beijing100083 China Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control School of Transportation Science and Engineering Beihang University XueYuan Road No. 37 Beijing100191 China Jiangsu Province Collaborative Innovation Center of Modern Urban Traffic Technologies Si Pai Lou. 2 Nanjing210096 China Key Lab of Urban ITS Technology Optimization and Integration The Ministry of Public Security of China Hefei230088 China
In this paper, we consider the problem of vehicular positioning enhancement with emerging connected vehicles (CV) technologies. In order to actually describe the scenario, the Interacting Multiple Model (IMM) filter i... 详细信息
来源: 评论
Modeling and Simulation on Cooperative Movement of Vehicle Group Based on the Behavior of Fish  1st
Modeling and Simulation on Cooperative Movement of Vehicle G...
收藏 引用
1st International Conference on 5G for Future Wireless networks, 5GWN 2017
作者: Tian, Daxin Kang, Lu Zheng, Kunxian Duan, Xuting Rong, Hui Guo, Peng Wang, Wenyang Zhang, Haijun Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University XueYuan Road No.37 Beijing100191 China China Automotive Technology and Research Center Automotive Engineering Research Institute East Xianfeng Road No.68 Tianjin300300 China School of Computer and Communication Engineering University of Science and Technology Beijing XueYuan Road No.30 Beijing100083 China Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control School of Transportation Science and Engineering Beihang University XueYuan Road No.37 Beijing100191 China Jiangsu Province Collaborative Innovation Center of Modern Urban Traffic Technologies Si Pai Lou. 2 Nanjing210096 China Key Lab of Urban ITS Technology Optimization and Integration The Ministry of Public Security of China Hefei230088 China
Fatigue driving might affect the traffic safety when the vehicles are on the cruising state in highway. Trying to solve this problem, this paper uses the movement pattern of the fish to the vehicles fleet, and develop... 详细信息
来源: 评论
REFF: REliable and Fast Forwarding in Vehicular Ad-hoc network  1st
REFF: REliable and Fast Forwarding in Vehicular Ad-hoc Netwo...
收藏 引用
1st International Conference on 5G for Future Wireless networks, 5GWN 2017
作者: Tian, Daxin Dai, Ziyi Zheng, Kunxian Zhou, Jianshan Duan, Xuting Guo, Peng Rong, Hui Wang, Wenyang Zhang, Haijun Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University XueYuan Road No. 37 Beijing100191 China China Automotive Technology and Research Center Automotive Engineering Research Institute East Xianfeng Road No. 68 Tianjin300300 China School of Computer and Communication Engineering University of Science and Technology Beijing XueYuan Road No. 30 Beijing100083 China Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control School of Transportation Science and Engineering Beihang University XueYuan Road No. 37 Beijing100191 China Jiangsu Province Collaborative Innovation Center of Modern Urban Traffic Technologies Si Pai Lou. 2 Nanjing210096 China Key Lab of Urban ITS Technology Optimization and Integration The Ministry of Public Security of China Hefei230088 China
Vehicular Ad-Hoc network (VANET) has emerged as an increasingly dominant technology for future connected vehicle and vehicular networks, where the focus of the development of VANET lies in the standardization of messa... 详细信息
来源: 评论
Web-Logs Prediction with Web Mining
Web-Logs Prediction with Web Mining
收藏 引用
IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference
作者: Muhammad Umair Hassan Kamran Shaukat Dongmie Niu Sundas Mahreen Yingjun Ma Xiuyang Zhao Muhammad Ahmad Shabir Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China Department of Information Technology University of the Punjab Jhelum Pakistan
Web Mining is defined as the use of Data Mining techniques to extract information from web, automatically. Web Mining techniques are widely used to observe user patterns accessing the web server logs. Web logs are the... 详细信息
来源: 评论
Numerical Investigation of Pallet Structure with Annular Slot in MOVPE Chamber
收藏 引用
IOP Conference Series: Earth and Environmental Science 2019年 第2期371卷
作者: Zhiming Li Ligen Lu Hailing Li Runqiu Guo Lansheng Feng Shandong Provincial Key Laboratory of Network based Intelligent Computing School of Information Science and Engineering University of Jinan 250022 Jinan China Shandong College of Electronic Technology 250022 Jinan China School of Mechano-Electronic Engineering Xidian University 710071 Xi'an China
A pallet structure with an annular slot is proposed in the perpendicular MOVPE chamber by electromagnetic heating Compared with the conventional pallet, the shape of the slot changes the directions of the thermal cond...
来源: 评论
Multi-bit leveled homomorphic encryption via ***-based  12th
Multi-bit leveled homomorphic encryption via ***-based
收藏 引用
12th International Conference on Information security and Cryptology, INSCRYPT 2016
作者: Li, Zengpeng Ma, Chunguang Morais, Eduardo Du, Gang College of Computer Science and Technology Harbin Engineering University Harbin15001 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Institute of Computing University of Campinas Campinas13083-050 Brazil
Fully Homomorphic Encryption (FHE) is a cryptographic primitive that allows computing over encrypted data without decrypting the corresponding ciphertexts. In general, existing FHE schemes can be achieved using standa... 详细信息
来源: 评论