咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2911-2920 订阅
排序:
Survey on artificial intelligence for additive manufacturing  23
Survey on artificial intelligence for additive manufacturing
收藏 引用
23rd IEEE International Conference on Automation and computing, ICAC 2017
作者: Yang, Jimeng Chen, Yi Huang, Weidong Li, Yun School of Engineering University of Glasgow GlasgowG12 8LT United Kingdom School of Computer Science and Network Security Dongguan University of Technology Dongguan523808 China State Key Laboratory of Solidification Processing Northwestern Polytechnical University Xi'an710072 China
Additive manufacturing of three-dimensional objects are now more and more realised through 3D printing, known as an evolutional paradigm in the manufacturing industry. Artificial intelligence is currently finding wide... 详细信息
来源: 评论
A simple brain storm optimization algorithm via visualizing confidence intervals  11th
A simple brain storm optimization algorithm via visualizing ...
收藏 引用
11th International Conference on Simulated Evolution and Learning, SEAL 2017
作者: Cao, YingYing Chen, Wei Cheng, Shi Sun, Yifei Liu, Qunfeng Li, Yun Shi, Yuhui School of Computer Science and Network Security Dongguan University of Technology Dongguan China School of Computer Science Shaanxi Normal University Xi’an China Key Laboratory of Modern Teaching Technology Ministry of Education Xi’an China School of Physics and Information Technology Shaanxi Normal University Xi’an China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
Visualizing confidence intervals method developed recently for benchmarking stochastic optimization algorithm is adopted in this paper to benchmark and study the brain storm optimization algorithm in depth. Through an... 详细信息
来源: 评论
An Improved Algorithm for Multivariate Polynomial Interpolation
An Improved Algorithm for Multivariate Polynomial Interpolat...
收藏 引用
第二届亚太计算机科学与应用学术会议
作者: Min Tang Guoqiang Deng School of Mathematics and Computing Science Guangxi Key Laboratory of Cryptography and Information SecurityGuilin University of Electronic Technology Shanghai Key Lab of Trustworthy Computing East China Normal University School of Mathematics and Computing Science Guangxi Colleges and Universities Key Laboratory of Data Analysis and ComputationGuilin University of Electronic Technology
In this paper, we present an improved method based on Zippel's algorithm for multivariate polynomial interpolation, and a testing point technique is proposed to verify the recovered polynomial. Compared with Zippe... 详细信息
来源: 评论
An Improved Algorithm for Multivariate Polynomial Interpolation
An Improved Algorithm for Multivariate Polynomial Interpolat...
收藏 引用
2017 Asia-Pacific Computer Science and Application Conference
作者: Min Tang Guoqiang Deng School of Mathematics and Computing Science Guangxi Key Laboratory of Cryptography and Information SecurityGuilin University of Electronic Technology Shanghai Key Lab of Trustworthy Computing East China Normal University School of Mathematics and Computing Science Guangxi Colleges and Universities Key Laboratory of Data Analysis and ComputationGuilin University of Electronic Technology
In this paper,we present an improved method based on Zippel's algorithm for multivariate polynomial interpolation,and a testing point technique is proposed to verify the recovered *** with Zippel's algorithm,t... 详细信息
来源: 评论
A fibonacci based batch auditing protocol for cloud data  1
收藏 引用
9th International Symposium on Cyberspace Safety and security, CSS 2017
作者: Shen, Jian Shen, Jun Wang, Chen Wang, Anxi Jiangsu Engineering Center of Network Monitoring Nanjing China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China
As cloud storage is developing fast with time going by, the design of auditing protocols has caught a large number of researchers’ eyes. However, though most of the existing auditing protocols have considered batch a... 详细信息
来源: 评论
Discovering and understanding the security hazards in the interactions between iot devices, mobile apps, and clouds on smart home platforms
arXiv
收藏 引用
arXiv 2018年
作者: Zhou, Wei Jia, Yan Yao, Yao Zhu, Lipeng Guan, Le Mao, Yuhang Liu, Peng Zhang, Yuqing National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China School of Cyber Engineering Xidian University China Department of Computer Science University of Georgia United States College of Information Sciences and Technology Pennsylvania State University United States State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China
A smart home connects tens of home devices to the Internet, where an IoT cloud runs various home automation applications. While bringing unprecedented convenience and accessibility, it also introduces various security... 详细信息
来源: 评论
Packet: a privacy-aware access control policy composition method for services composition in cloud environments
收藏 引用
Frontiers of Computer Science 2016年 第6期10卷 1142-1157页
作者: Li LIN Jian HU Jianbiao ZHANG College of Computer Science Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing Beijing 100124 China National Engineering Laboratory for Classified Information Security Protection Beijing 100124 China
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service p... 详细信息
来源: 评论
EagleMine: Vision-guided mining in large graphs
arXiv
收藏 引用
arXiv 2017年
作者: Feng, Wenjie Liu, Shenghua Faloutsos, Christos Hooi, Bryan Shen, Huawei Cheng, Xueqi Cas Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences School of Computer Science Carnegie Mellon University
Given a graph with millions of nodes, what patterns exist in the distributions of node characteristics, and how can we detect them and separate anomalous nodes in a way similar to human vision? In this paper, we propo... 详细信息
来源: 评论
MBSA: a lightweight and flexible storage architecture for virtual machines
MBSA: a lightweight and flexible storage architecture for vi...
收藏 引用
作者: Chen, Xian Chen, Wenzhi Lu, Zhongyong Zhang, Yu Chang, Rui Hassan, Mohammad Mehedi Alelaiwi, Abdulhameed Xiang, Yang College of Computer Science and Technology Zhejiang University Hangzhou China State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China College of Computer and Information Sciences King Saud University Riyadh11543 Saudi Arabia Centre for Cyber Security Research Deakin University BurwoodVIC Australia
With the advantages of extremely high access speed, low energy consumption, nonvolatility, and byte addressability, nonvolatile memory (NVM) device has already been setting off a revolution in storage field. Conventio... 详细信息
来源: 评论
Analysis of SVEIR worm attack model with saturated incidence and partial immunization
收藏 引用
Journal of Communications and Information networks 2017年 第4期1卷 105-115页
作者: Wang, Fangwei Huang, Wenyan Shen, Yulong Wang, Changguang College of Information Technology Hebei Normal University Shijiazhuang China Shannxi Key Laboratory of Network and System Security Xidian University Xi’an China College of Computers Xidian University Xi’an China
Internet worms can propagate across networks at terrifying speeds, reduce network security to a remarkable extent, and cause heavy economic losses. Thus, the rapid elimination of Internet worms using partial immunizat...
来源: 评论