咨询与建议

限定检索结果

文献类型

  • 2,037 篇 会议
  • 1,569 篇 期刊文献

馆藏范围

  • 3,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,365 篇 工学
    • 1,799 篇 计算机科学与技术...
    • 1,454 篇 软件工程
    • 585 篇 信息与通信工程
    • 317 篇 电气工程
    • 263 篇 控制科学与工程
    • 232 篇 生物工程
    • 227 篇 电子科学与技术(可...
    • 169 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 60 篇 建筑学
    • 59 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
  • 1,075 篇 理学
    • 614 篇 数学
    • 254 篇 物理学
    • 249 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 85 篇 化学
  • 595 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 304 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 74 篇 privacy
  • 73 篇 federated learni...
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 data privacy
  • 50 篇 object detection
  • 49 篇 neural networks
  • 48 篇 cloud computing
  • 47 篇 information secu...
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 224 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 96 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,248 篇 英文
  • 283 篇 其他
  • 80 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3606 条 记 录,以下是2941-2950 订阅
排序:
Overdue Prediction of Bank Loans Based on Deep Neural network
Overdue Prediction of Bank Loans Based on Deep Neural Networ...
收藏 引用
2017 International Symposium on Computer Science and Artificial Intelligence(ISCSAI 2017)
作者: Li Xin Sun Guozi Li Huakang Jiangsu Key Lab of Big Data and Security and Intelligent Processing Nanjing University of Posts and Telecommunications Collaborative Innovation Center for Economics crime investigation and prevention technology State Key Laboratory of Mathematical Engineering and Advanced Computing
With the development of information technology, the application of big data in financial aspects becomes more and more deepening. However, in the aspect of bank loans, the accuracy of traditional user loan risk predic... 详细信息
来源: 评论
Deep hybrid residual learning with statistic priors for single image super-resolution
Deep hybrid residual learning with statistic priors for sing...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Risheng Liu Xiangyu Wang Xin Fan Haojie Li Zhongxuan Luo Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Department of Computing The Hong Kong Polytechnic University DUT-RU International School of Information & Software Engineering Dalian University of Technology
This paper considers single image super-resolution (SISR), which is an important low-level vision task and has various applications in multimedia society. Recently, deep neural networks have archived good performance ... 详细信息
来源: 评论
Leveraging geometric correlation for input-adaptive facial landmark regression
Leveraging geometric correlation for input-adaptive facial l...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Yuyao Feng Risheng Liu Xin Fan Kang Huyan Zhongxuan Luo Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province DUT-RU International School of Information & Software Engineering Dalian University of Technology Department of Computing The Hong Kong Polytechnic University
Facial analysis plays very important role in many vision applications, such as authentication and entertainments. The very early works in the 1990s mostly focus on estimating geometric deformations of facial landmarks... 详细信息
来源: 评论
Least squares twin SVM decision tree for multi-class classification
Least squares twin SVM decision tree for multi-class classif...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics
作者: Qing Yu Lihui Wang Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology China
In order to solve multi-class classification problem in real world, we improved TSVM in this paper. We combined LSTSVM with partial binary tree to improve classification efficiency. Binary tree hierarchy can solved th... 详细信息
来源: 评论
Learning aggregated transmission propagation networks for haze removal and beyond
arXiv
收藏 引用
arXiv 2017年
作者: Liu, Risheng Fan, Xin Hou, Minjun Jiang, Zhiying Luo, Zhongxuan Zhang, Lei DUT-RU International School of Information Science and Engineering Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian University of Technology Dalian Department of Computing Hong Kong Polytechnic University
Single image dehazing is an important low-level vision task with many applications. Early researches have inves-tigated different kinds of visual priors to address this problem. However, they may fail when their assum... 详细信息
来源: 评论
Multiple influence maximization in social networks  10
Multiple influence maximization in social networks
收藏 引用
10th International Conference on Ubiquitous Information Management and Communication, IMCOM 2016
作者: Sun, Honglin Gao, Xiaofeng Chen, Guihai Gu, Jian Wang, Yongjian Shanghai Key Lab. of Scalable Computing and Systems Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Key Laboratory of Information Network Security of Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Influence Maximization, a technique of social analysis to help marketers select a small group of users to promote their products with the goal of maximizing their influence spread, has been studied for a long time. Ho... 详细信息
来源: 评论
Robust Multi-Exposure Image Fusion: A Structural Patch Decomposition Approach
Robust Multi-Exposure Image Fusion: A Structural Patch Decom...
收藏 引用
作者: Ma, Kede Li, Hui Yong, Hongwei Wang, Zhou Meng, Deyu Zhang, Lei Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong Department of Computing. Hong Kong Polytechnic University Hong Kong Hong Kong Institute for Information and System Sciences and Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China Inst. for Info. and Syst. Sci. and Min. of Educ. Key Lab. of Intelligent Networks and Netwk. Secty. Xi'an Jiaotong University Xi'an710049 China
We propose a simple yet effective structural patch decomposition approach for multi-exposure image fusion (MEF) that is robust to ghosting effect. We decompose an image patch into three conceptually independent compon... 详细信息
来源: 评论
Improved Canopy-FCM algorithm based on MapReduce
Improved Canopy-FCM algorithm based on MapReduce
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)
作者: Qing Yu Zhimin Ding Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
In order to solve the problem that FCM algorithm is sensitive to initial clustering center, we use Canopy algorithm to conduct the quick rough clustering. In the meantime, to avoid the blindness of Canopy algorithm, w... 详细信息
来源: 评论
ROSF: Leveraging Information Retrieval and Supervised Learning for Recommending Code Snippets
arXiv
收藏 引用
arXiv 2017年
作者: Jiang, He Nie, Liming Sun, Zeyi Ren, Zhilei Kong, Weiqiang Zhang, Tao Luo, Xiapu School of Software Dalian University of Technology Dalian China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian China State Key Laboratory of Software Engineering Wuhan University Wuhan China Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian China School of Computer Science & Technology Nanjing University of Posts and Telecommunications Nanjing China Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
—when implementing unfamiliar programming tasks, developers commonly search code examples and learn usage patterns of APIs from the code examples or reuse them by copy-pasting and modifying. For providing high-qualit... 详细信息
来源: 评论
A Performance Evaluation of Classification Algorithms for Big Data
收藏 引用
Procedia Computer Science 2017年 122卷 1100-1107页
作者: Mo Hai You Zhang Yuejin Zhang School of Information Central University of Finance and Economics Beijing China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China School of Information Systems &Management Heinz College Carnegie Mellon University Pittsburgh PA 1521 USA
The performance of two typical classification algorithms in Spark: random forest and naïve bayes are evaluated by using four metrics: classification accuracy, speedup, scaleup and sizeup. Experiments are performe... 详细信息
来源: 评论