咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2901-2910 订阅
排序:
HoloScope: Topology-and-Spike Aware Fraud Detection
arXiv
收藏 引用
arXiv 2017年
作者: Liu, Shenghua Hooi, Bryan Faloutsos, Christos CAS Key Laboratory of Network Data Science & Technology Institute of Computing Technology Chinese Academy of Sciences Carnegie Mellon University
As online fraudsters invest more resources, including purchasing large pools of fake user accounts and dedicated IPs, fraudulent attacks become less obvious and their detection becomes increasingly challenging. Existi... 详细信息
来源: 评论
Mars: New insights and unresolved questions
arXiv
收藏 引用
arXiv 2021年
作者: Changela, Hitesh G. Chatzitheodoridis, Elias Antunes, Andre Beaty, David Bouw, Kristian Bridges, John C. Capova, Klara Anna Cockell, Charles S. Conley, Catharine A. Dadachova, Ekaterina Dallas, Tiffany D. de Mey, Stefaan Dong, Chuanfei Ellery, Alex Ferus, Martin Foing, Bernard Fu, Xiaohui Fujita, Kazuhisa Lin, Yangtin Jheeta, Sohan Hicks, Leon J. Hu, Sen Kereszturi, Akos Krassakis, Alexandros Liu, Yang Oberst, Juergen Michalski, Joe Ranjith, P.M. Rinaldi, Teresa Rothery, David Stavrakakis, Hector A. Selbmann, Laura Sinha, Rishitosh K. Wang, Alian Williford, Ken Vaci, Zoltan Vago, Jorge L. Waltemathe, Michael Hallsworth, John E. Key Laboratory of Earth & Planetary Physics Institute of Geology & Geophysics Chinese Academy of Sciences Beijing China Department of Earth & Planetary Science University of New Mexico New Mexico United States Department of Geological Sciences National Technical University of Athens School of Mining and Metallurgical Engineering Athens Greece Network of Researchers on the Chemical Evolution of Life Leeds United Kingdom China Mars Program Office Jet Propulsion Laboratory California Institute of Technology PasadenaCA United States Creative Division Notion Theory MiamiFL33131 United States Space Research Centre School of Physics and Astronomy University of Leicester LeicesterLE17RH United Kingdom Noordwijk Netherlands School of Physics and Astronomy University of Edinburgh James Clerk Maxwell Building Peter Guthrie Tait Road EdinburghEH9 3FD United Kingdom NASA Ames Research Center Mountain ViewCA94035 United States College of Pharmacy and Nutrition University of Saskatchewan Canada Institute for Global Food Security School of Biological Sciences Queen's University Belfast 19 Chlorine Gardens BelfastBT9 5DL United Kingdom Department of Astrophysical Sciences Princeton Plasma Physics Laboratory Princeton University United States Department of Mechanical and Aerospace Engineering Carleton University OttawaON Canada J. Heyrovsky Institute of Physical Chemistry Czech Academy of Sciences Prague Czech Republic Shandong Province China Tokyo Japan Research Centre for Astronomy and Earth Sciences Budapest Hungary Athens Greece National Space Science Centre NSSC Chinese Academy of Sciences Beijing China DLR Institute of Planetary Research Berlin Germany Hong Kong University Hong Kong Department of Biology and Biotechnology Sapienza University of Rome Rome Italy School of Physical Sciences The Open University Milton Keynes United Kingdom Department of Ecological and Biological Sciences University of Tuscia Viterbo Italy Physical Research Lab
Mars exploration motivates the search for extraterrestrial life, the development of space technologies, and the design of human missions and habitations. Here, we seek new insights and pose unresolved questions relati... 详细信息
来源: 评论
Study on the method of transmission line foreign body detection based on deep learning
Study on the method of transmission line foreign body detect...
收藏 引用
2017 IEEE Conference on Energy Internet and Energy System Integration, EI2 2017
作者: Wang, Bixiao Wu, Runze Zheng, Zhe Zhang, Weilong Guo, Jinghong School of Electrical and Electronic Engineering North China Electric Power University Beijing China Global Energy Interconnection Research Institute Co. Ltd. State Grid Key Laboratory of Information AndNetwork Security State Grid Laboratory of Electric Power Communication Network Technology Beijing China
Target detection methods based on region proposal are complicated and the detection speed is slow, which is difficult to meet the requirement of real-time detection of massive power inspection pictures. SSD (Single Sh... 详细信息
来源: 评论
Marked temporal dynamics modeling based on recurrent neural network
arXiv
收藏 引用
arXiv 2017年
作者: Wang, Yongqing Liu, Shenghua Shen, Huawei Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China
We are now witnessing the increasing availability of event stream data, i.e., a sequence of events with each event typically being denoted by the time it occurs and its mark information (e.g., event type). A fundament... 详细信息
来源: 评论
An approach for security evaluation and certification of a complete quantum communication system
arXiv
收藏 引用
arXiv 2019年
作者: Sajeed, Shihan Chaiwongkhot, Poompong Huang, Anqi Qin, Hao Egorov, Vladimir Kozubov, Anton Gaidash, Andrei Chistiakov, Vladimir Vasiliev, Artur Gleim, Artur Makarov, Vadim Institute for Quantum Computing University of Waterloo WaterlooONN2L 3G1 Canada Department of Physics and Astronomy University of Waterloo WaterlooONN2L 3G1 Canada Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada Department of Electrical and Computer Engineering University of Toronto M5S 3G4 Canada Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer National University of Defense Technology Changsha410073 China CAS Quantum Network Co. Ltd. 99 Xiupu road Shanghai201315 China Faculty of Photonics and Optical Information ITMO University Kadetskaya line 3/2 St. Petersburg199034 Russia Shanghai Branch National Laboratory for Physical Sciences at Microscale CAS Center for Excellence in Quantum Information University of Science and Technology of China Shanghai201315 China
Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete qua... 详细信息
来源: 评论
A decoupling two-grid method for the time-dependent poisson-nernst-planck equations
arXiv
收藏 引用
arXiv 2018年
作者: Shen, Ruigang Shu, Shi Yang, Ying Lu, Benzhuo School of Mathematics and Computational Science Xiangtan University Xiangtan Hunan411105 China Hunan Key Laboratory for Computation and Simulation in Science and Engineering Xiangtan University Xiangtan Hunan411105 China School of Mathematics and Computational Science Guangxi Colleges Universities Key Laboratory of Data Analysis and Computation Guangxi Key Laboratory of Cryptography and information Security Guilin University of Electronic Technology Guilin Guangxi541004 China Institute of Computational Mathematics and Scientific/Engineering Computing National Center for Mathematics and Interdisciplinary Sciences Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China
We study a two-grid strategy for decoupling the time-dependent Poisson-Nernst-Planck equations describing the mass concentration of ions and the electrostatic potential. The computational system is decoupled to smalle... 详细信息
来源: 评论
Big-data analysis of multi-source logs for anomaly detection on network-based system
Big-data analysis of multi-source logs for anomaly detection...
收藏 引用
IEEE International Conference on Automation Science and Engineering (CASE)
作者: Zhanpei Jia Chao Shen Xiao Yi Yufei Chen Tianwen Yu Xiaohong Guan Xi'an Jiaotong University Xi'an Shaanxi CN Control Laboratory MOE Key Laboratory for Intelligent Networks and Network Security and Science and Technology on Electronic Information
Log data are important audit basis to record routine events occurring on computer or network system, which are also critical data source for detecting system anomalies. By analyzing the data from multi-source logs, it... 详细信息
来源: 评论
A New Triage Process Model for Digital Investigations
A New Triage Process Model for Digital Investigations
收藏 引用
2016 IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference(IMCEC 2016)
作者: Bo Yang Ning Li Jianguo Jiang Institute of Information Engineering Chinese Academy of Sciences Beijing Key Laboratory of Network Security Technology
As the amount of crimes involving the digital dimension grows,an ever increasing number of digital artifacts collected from a forensic investigation needs plenty of resources to process in a forensically sound *** for... 详细信息
来源: 评论
Pan-cancer analysis of somatic mutations across 21 neuroendocrine tumor types
收藏 引用
细胞研究(英文版) 2018年 第5期28卷 601-604页
作者: Yanan Cao Weiwei Zhou Lin Li Jiaqian Wang Zhibo Gao Yiran Jiang Xiuli Jiang Aijing Shan Matthew H. Bailey Kuan-lin Huang Sam Q. Sun Michael D. McLellan Beifang Niu Weiqing Wang Li Ding Guang Ning Shanghai Clinical Center for Endocrine and Metabolic Diseases Shanghai Key Laboratory for Endocrine Tumors Rui-Jin Hospital Shanghai Jiao Tong University School of Medicine Shanghai China Laboratory of Endocrinology and Metabolism Shanghai Institutes for Biological Sciences Chinese Academy of Sciences Shanghai China Shanghai Clinical Center for Endocrine and Metabolic Diseases Shanghai Key Laboratory for Endocrine Tumors Rui-Jin Hospital Shanghai Jiao Tong University School of Medicine Shanghai China YuceBio Shenzhen China McDonnell Genome Institute Washington University St Louis MO USA Department of Medicine Division of Oncology Washington University St Louis MO USA McDonnell Genome Institute Washington University St Louis MO USA McDonnell Genome Institute Washington University St Louis MO USA Department of High-Performance Computing Technology and Application Development Computer Network Information Center Chinese Academy of Sciences Beijing China McDonnell Genome Institute Washington University St Louis MO USA Department of Medicine Division of Oncology Washington University St Louis MO USA Siteman Cancer Center Washington University St. Louis MO USA
Dear Editor,Neuroendocrine tumors (NETs) comprise a heterogeneous spectrum of neoplasms originating from neuroendocrine cells in various organs — most commonly in the endocrine glands and the gastrointestinal tract.1... 详细信息
来源: 评论
The Similarity Calculation of E-commerce User Behaviors with Petri Net
The Similarity Calculation of E-commerce User Behaviors with...
收藏 引用
2nd International Conference on Artificial Intelligence and Engineering Applications(AIEA 2017)
作者: LIHUA PAN BINGXIAN MA YAN WANG Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Electronic Department Shandong College of Electronic Technology
The similarity and of user behaviors behavior is conductive to great classify users,cluster different groups,generate the *** is of significance novel to of achieve a finegrained analysis of user *** In this paper,a m... 详细信息
来源: 评论