咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2931-2940 订阅
排序:
A secure and high-performance multi-controller architecture for software-defined networking
收藏 引用
Frontiers of Information technology & Electronic Engineering 2016年 第7期17卷 634-646页
作者: Huan-zhao WANG Peng ZHANG Lei XIONG Xin LIU Cheng-chen HU Department of Computer Science and Technology Xi'an Jiaotong UniversityXi'an 710059China Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory Shijiazhuang 050081China MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong UniversityXi'an 710049China
Controllers play a critical role in software-defined networking(SDN).However,existing singlecontroller SDN architectures are vulnerable to single-point failures,where a controller's capacity can be saturated by fl... 详细信息
来源: 评论
Cross-site scripting attacks on android hybrid applications  17
Cross-site scripting attacks on android hybrid applications
收藏 引用
2017 International Conference on Cryptography, security and Privacy, ICCSP 2017
作者: Bao, Wenying Yao, Wenbin Zong, Ming Wang, Dongbin Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications No. 10 Xitucheng Road Beijing100876 China YingCai Honors College University of Electronic Science and Technology of China Chengdu610054 China National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications No. 10 Xitucheng Road Beijing100876 China
Hybrid mobile applications are coded in both standard web languages and native language. The including of web technologies results in that Hybrid applications introduce more security risks than the traditional web app... 详细信息
来源: 评论
Flame detection via quaternion discrete cosine transform based spectral saliency
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2016年 第9期9卷 343-352页
作者: Zhang, Haiyan Gao, Shangbing Xue, Jianxun Zheng, Hao Faculty of computer and software Jiangsu Provincial Key Laboratory for advanced manufacturing technology Huaiyin Institute of Technology Huai'an China The Key Laboratory for traffic and transportation security of Jiangsu Province Huai'an China Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing Xiaozhuang University Nanjing China
To address the problem of detecting the specific object of flame, this paper proposes quaternion discrete cosine transform based video flame detection algorithm in conjunction with the bottom-up visual attention mecha... 详细信息
来源: 评论
Detecting Malicious PDF Files Using Semi-Supervised Learning Method
Detecting Malicious PDF Files Using Semi-Supervised Learning...
收藏 引用
2017 5th International Conference on Advanced Computer Science Applications and Technologies(ACSAT 2017)
作者: Di Feng Min Yu Yongjian Wang Chao Liu Chunguang Ma Institution of Information Engineering Chinese Academy of Sciences College of Computer Science and Technology Harbin Engineering University School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Information Network Security of Ministry of Public Security the Third Research Institute of Ministry of Public Security
With the increase in popularity of Portable Document Format(PDF) documents and increasing vulnerability of PDF users, effective detection of malicious PDF documents has become as a more and more significant issue. In ... 详细信息
来源: 评论
Source code fragment summarization with small-scale crowdsourcing based features
收藏 引用
Frontiers of Computer Science 2016年 第3期10卷 504-517页
作者: Najam NAZAR He JIANG Guojun GAO Tao ZHANG Xiaochen LI Zhilei REN Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian 116621 China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China Department of Computing The Hong Kong Polytechnic University Hong Kong China
Recent studies have applied different approaches for summarizing software artifacts, and yet very few efforts have been made in summarizing the source code fragments available on web. This paper investigates the feasi... 详细信息
来源: 评论
Rectangle transformation problem
arXiv
收藏 引用
arXiv 2017年
作者: Wang, Shaojiang He, Kun Pan, Yicheng Xia, Mingji State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences
In this paper, we propose the rectangle transformation problem (RTP) and its variants. RTP asks for a transformation by a rectangle partition between two rectangles of the same area. We are interested in the minimum R... 详细信息
来源: 评论
Utilizing Dynamic Properties of Sharing Bits and Registers to Estimate User Cardinalities over Time
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Pinghui Jia, Peng Zhang, Xiangliang Tao, Jing Guan, Xiaohong Towsley, Don MOE Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University China Shenzhen Research Institute of Xi’an Jiaotong University Shenzhen China King Abdullah University of Science and Technology Thuwal Saudi Arabia Zhejiang Research Institute of Xi’an Jiaotong University Hangzhou China Department of Automation and NLIST Lab Tsinghua University Beijing China School of Computer Science University of Massachusetts Amherst MA United States
—Online monitoring user cardinalities (or degrees) in graph streams is fundamental for many applications. For example in a bipartite graph representing user-website visiting activities, user cardinalities (the number... 详细信息
来源: 评论
Coherence-based Automated Essay Scoring using Self-Attention
Coherence-based Automated Essay Scoring using Self-Attention
收藏 引用
第十七届全国计算语言学学术会议暨第六届基于自然标注大数据的自然语言处理国际学术研讨会(CCL 2018)
作者: Xia Li Minping Chen Jianyun Nie Zhenxing Liu Ziheng Feng Yingdan Cai Key Laboratory of Language Engineering and Computing Guangdong university of foreign studies Guangzh School of Information Science and Technology/School of Cyber Security Guangdong university of foreig Department of Computer Science and Operations Research University of montreal MontrealCanada
Automated essay scoring aims to score an essay automatically without any human *** methods heavily rely on manual feature engi-neering,making it expensive to extract the *** recent studies used neural-network-based sc... 详细信息
来源: 评论
A geometric image segmentation method based on a bi-convex, fuzzy, variational principle with teaching-learning optimization
A geometric image segmentation method based on a bi-convex, ...
收藏 引用
作者: Jin, Haiyan Li, Yaning Xing, Bei Wang, Lei Department of Computer Science and Engineering Xi'An University of Technology No. 5 South Jinhua Road Xi'an Shaanxi710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
This paper proposes an efficient, bi-convex, fuzzy, variational (BFV) method with teaching and learning based optimization (TLBO) for geometric image segmentation. Firstly, we adopt a bi-convex, object function to pro... 详细信息
来源: 评论
A Two-grid Method for Linearizing and Symmetrizing the Steady-state Poisson-Nernst-Planck Equations
arXiv
收藏 引用
arXiv 2017年
作者: Li, Xuefang Yang, Ying Cheng, Hang School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin Guangxi541004 China School of Mathematics and Computing Science Guangxi Colleges Universities Key Laboratory of Data Analysis and Computation Guangxi Key Laboratory of Cryptography and information Security Guilin University of Electronic Technology Guilin Guangxi541004 China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin Guangxi541004 China
In this paper, a two-grid method is proposed to linearize and symmetrize the steady-state Poisson-Nernst-Planck equations. The computational system is decoupled to linearize and symmetrize equations by using this meth... 详细信息
来源: 评论