咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是2961-2970 订阅
排序:
Improved Canopy-FCM algorithm based on MapReduce
Improved Canopy-FCM algorithm based on MapReduce
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)
作者: Qing Yu Zhimin Ding Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
In order to solve the problem that FCM algorithm is sensitive to initial clustering center, we use Canopy algorithm to conduct the quick rough clustering. In the meantime, to avoid the blindness of Canopy algorithm, w... 详细信息
来源: 评论
ROSF: Leveraging Information Retrieval and Supervised Learning for Recommending Code Snippets
arXiv
收藏 引用
arXiv 2017年
作者: Jiang, He Nie, Liming Sun, Zeyi Ren, Zhilei Kong, Weiqiang Zhang, Tao Luo, Xiapu School of Software Dalian University of Technology Dalian China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian China State Key Laboratory of Software Engineering Wuhan University Wuhan China Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian China School of Computer Science & Technology Nanjing University of Posts and Telecommunications Nanjing China Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
—when implementing unfamiliar programming tasks, developers commonly search code examples and learn usage patterns of APIs from the code examples or reuse them by copy-pasting and modifying. For providing high-qualit... 详细信息
来源: 评论
A Performance Evaluation of Classification Algorithms for Big Data
收藏 引用
Procedia Computer Science 2017年 122卷 1100-1107页
作者: Mo Hai You Zhang Yuejin Zhang School of Information Central University of Finance and Economics Beijing China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China School of Information Systems &Management Heinz College Carnegie Mellon University Pittsburgh PA 1521 USA
The performance of two typical classification algorithms in Spark: random forest and naïve bayes are evaluated by using four metrics: classification accuracy, speedup, scaleup and sizeup. Experiments are performe... 详细信息
来源: 评论
Android multi-level system permission management approach
arXiv
收藏 引用
arXiv 2017年
作者: Luo, Yang Zhang, Qi-Xun Shen, Qing-Ni Liu, Hong-Zhi Wu, Zhong-Hai School of Software and Microelectronics Peking University Beijing100871 China MoE Key Laboratory of Network and Software Assurance Peking University Beijing100871 China Research Laboratory of Service Computing and Big Data Technology Peking University Beijing100871 China
With the expansion of the market share occupied by the Android platform, security issues (especially application security) have become attention focus of researchers. In fact, the existing methods lack the capabilitie... 详细信息
来源: 评论
Angle-domain doppler pre-compensation for high-mobility OFDM uplink with a massive ULA
arXiv
收藏 引用
arXiv 2017年
作者: Guo, Wei Zhang, Weile Mu, Pengcheng Gao, Feifei Yao, Bobin MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China Tsinghua National Laboratory for Information Science and Technology Beijing China School of Electronic and Control Engineering Chang'an University Xi'an China
In this paper, we propose a Doppler pre-compensation scheme for high-mobility orthogonal frequency division multiplexing (OFDM) uplink, where a high-speed terminal transmits signals to the base station (BS). Consideri... 详细信息
来源: 评论
DOA and polarization estimation for non-circular signals in 3-D millimeter wave polarized massive MIMO systems
arXiv
收藏 引用
arXiv 2017年
作者: Wan, Liangtian Liu, Kaihui Liang, Ying-Chang Zhu, Tong Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian116620 China National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology of China Chengdu611731 China National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology of China Chengdu611731 China School of Electrical and Information Engineering University of Sydney NSW2006 Australia Tianjin Institute of Computing Technology Tianjin300000 China
In this paper, an algorithm of multiple signal classification (MUSIC) is proposed for two-dimensional (2-D) direction-of-arrival (DOA) and polarization estimation of non-circular signal in three-dimensional (3-D) mill... 详细信息
来源: 评论
Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction
arXiv
收藏 引用
arXiv 2017年
作者: Zhao, Yijia Zhang, Yichen Xu, Bingjie Yu, Song Guo, Hong State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China State Key Laboratory of Advanced Optical Communication System and Network School of Electronics Engineering and Computer Science Center for Quantum Information Technology Peking University Beijing100871 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China
The method of improving the performance of continuous-variable quantum key distribution protocols by post-selection has been recently proposed and verified. In continuous-variable measurement-device-independent quantu... 详细信息
来源: 评论
Robust online matrix factorization for dynamic background subtraction
arXiv
收藏 引用
arXiv 2017年
作者: Yong, Hongwei Meng, Deyu Zuo, Wangmeng Zhang, Lei School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi China School of Computer Science and Technology Harbin Institute of Technology Harbin China Biometrics Research Center Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong
We propose an effective online background subtraction method, which can be robustly applied to practical videos that have variations in both foreground and background. Different from previous methods which often model... 详细信息
来源: 评论
Construction of One-Gray Weight Codes and Two-Gray Weight Codes over Z4+uZ4
收藏 引用
Journal of Systems Science & Complexity 2016年 第5期29卷 1472-1484页
作者: SHI Minjia WANG Dandan GAO Jian WU Bo Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei 230039 China National Mobile Communications Research Laboratory Southeast University Nanjing 210096China School of Mathematical Sciences Anhui University Hefei 230601 China. School of Science Shandong University of Technology Zibo 255091 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Bcijing 100093 China
This paper firstly gives some necessary conditions on one-Gray weight linear codes. And then we use these results to construct several classes of one-Gray weight linear codes over Z_4 +uZ_4(u^2=u) with type 16^(k_1)8^... 详细信息
来源: 评论
On error linear complexity of new generalized cyclotomic binary sequences of period p2
arXiv
收藏 引用
arXiv 2017年
作者: Wu, Chenhuang Xu, Chunxiang Chen, Zhixiong Ke, Pinhui School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Provincial Key Laboratory of Applied Mathematics Putian University PutianFujian351100 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Mathematics and Informatics Fujian Normal University Fuzhou Fujian350117 China
We consider the k-error linear complexity of a new binary sequence of period p2, proposed in the recent paper "New generalized cyclotomic binary sequences of period p2", by Z. Xiao et al., who calculated the... 详细信息
来源: 评论