咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2921-2930 订阅
排序:
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1284卷
作者: Zhixiao Wang Wenyao Yan Wendong Wang Ang Gao Lei Yu Shaobo Yang GaoYang Nie School of Computer Science and Engineering Xi'an University of Technology 710048 Xi'an China Telematics Group the University of Goettingen 37077 Goettingen Germany Shaanxi Key Laboratory of Network Computing and Security 710048 Xi'an China School of Electronic and Information Engineering Xi'an Jiaotong University 710048 Xi'an China College of Xi'an Innovation Yan'an University 710100 Xi'an China Yan'an University Yan'an 716000 China National Satellite Meteorological Center China Meteorological Administration Beijing 100081 China
Based on the huge volumes of user check-in data in LBSNs, users' intrinsic mobility patterns can be well explored, which is fundamental for predicting where a user will visit next given his/her historical check-in...
来源: 评论
Implementing an Inference Engine for RDFS/OWL Constructs and User-Defined Rules in HBase
Implementing an Inference Engine for RDFS/OWL Constructs and...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Zhengbo Liu Wenbin Yao Dongbin Wang National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Ministry of Education for Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
The Inference Engine is an integral part of Semantic Data Stores. In this paper, we describe our experience of implementing a scalable inference engine for HBase Semantic Data Store. This inference engine computes pro... 详细信息
来源: 评论
Multi-task representation learning for demographic prediction  38th
Multi-task representation learning for demographic predictio...
收藏 引用
38th European Conference on Information Retrieval Research, ECIR 2016
作者: Wang, Pengfei Guo, Jiafeng Lan, Yanyan Xu, Jun Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Beijing China
Demographic attributes are important resources for market analysis, which are widely used to characterize different types of users. However, such signals are only available for a small fraction of users due to the dif... 详细信息
来源: 评论
Low-resolution face recognition in the wild via selective knowledge distillation
arXiv
收藏 引用
arXiv 2018年
作者: Ge, Shiming Zhao, Shengwei Li, Chenyu Li, Jia Institute of Information Engineering Chinese Academy of Sciences Beijing100095 China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security at University of Chinese Academy of Sciences China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China
Typically, the deployment of face recognition models in the wild needs to identify low-resolution faces with extremely low computational cost. To address this problem, a feasible solution is compressing a complex face... 详细信息
来源: 评论
Anomaly Detection for Application Layer User Browsing Behavior Based on Attributes and Features
收藏 引用
Journal of Physics: Conference Series 2018年 第1期1069卷
作者: Xiong Luo Xiaoqiang Di Xu Liu Hui Qi Jinqing Li Ligang Cong Huamin Yang School of Computer Science and Technology Changchun University of Science and Technology Changchun 130022 China Jilin Province Key Laboratory of Network and Information Security Changchun 130022 China
Application layer distributed denial of service (App-DDoS) attacks has posed a great threat to the security of the Internet. Since these attacks occur in the application layer, they can easily evade traditional networ...
来源: 评论
Sentence Similarity Learning Method based on Attention Hybrid Model
收藏 引用
Journal of Physics: Conference Series 2018年 第1期1069卷
作者: Yue Wang Xiaoqiang Di Jinqing Li Huamin Yang Lin Bi School of Computer Science and Technology Changchun University of Science and Technology Changchun 130022 China Jilin Province Key Laboratory of Network and Information Security Changchun 130022 China
Sentence similarity learning is a vital task in Natural Language Processing (NLP) such as document summarization and question answering. In this paper, we propose a method to compute semantic similarity between senten...
来源: 评论
Quantum private comparison based on quantum dense coding
收藏 引用
Science China(Information Sciences) 2016年 第11期59卷 195-207页
作者: Feng WANG Mingxing LUO Huiran LI Zhiguo QU Xiaojun WANG College of Mathematical Sciences Dezhou University Information Security and National Computing Grid Laboratory Southwest Jiaotong University Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Electronic Engineering Dublin City University
A serious problem in cloud computing is privacy information protection. This study proposes a new private comparison protocol using Einstein-Podolsky-Rosen(EPR) pairs. This protocol allows two parties to secretly comp... 详细信息
来源: 评论
Achieve Personalized Anonymity Through Query Blocks Exchanging
收藏 引用
China Communications 2016年 第11期13卷 106-118页
作者: Chunguang Ma Lei Zhang Songtao Yang Xiaodong Zheng Pinhui Ke College of Computer Science and Technology Harbin Engineering University Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University College of Information and Electronic Technology Jiamusi University College of Applied Technology Qiqihar University
In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become ... 详细信息
来源: 评论
Improved quantum ripple-carry addition circuit
收藏 引用
Science China(Information Sciences) 2016年 第4期59卷 104-111页
作者: Feng WANG Mingxing LUO Huiran LI Zhiguo QU Xiaojun WANG College of mathematical sciences Dezhou University Information Security and National Computing Grid Laboratory Southwest Jiaotong University Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Electronic Engineering Dublin City University
A serious obstacle to large-scale quantum algorithms is the large number of elementary gates, such as the controlled-NOT gate or Toffoli gate. Herein, we present an improved linear-depth ripple-carry quantum addition ... 详细信息
来源: 评论
Survey on Redactable Signatures
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2017年 第10期54卷 2144-2152页
作者: Ma, Jinhua Liu, Jianghua Wu, Wei Huang, Xinyi School of Mathematics and Information Fujian Normal University Fuzhou350007 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou350007 China School of Information Technology Deakin University Melbourne3125 Australia
Data security issues have become a serious challenge to national economic, political, defence and cultural security. As a core technology in protecting data security, digital signatures have been widely used for the v... 详细信息
来源: 评论