咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是2991-3000 订阅
排序:
Robust Depth-based Person Re-identification
arXiv
收藏 引用
arXiv 2017年
作者: Wu, Ancong Zheng, Wei-Shi Lai, Jian-Huang School of Electronics and Information Technology Sun Yat-sen University Guangzhou China Collaborative Innovation Center of High Performance Computing National University of Defense Technology Changsha410073 China School of Data and Computer Science Sun Yat-sen University Guangzhou China Ministry of Education China Guangdong Province Key Laboratory of Information Security China
Person re-identification (re-id) aims to match people across non-overlapping camera views. So far the RGB-based appearance is widely used in most existing works. However, when people appeared in extreme illumination o... 详细信息
来源: 评论
A Forward-Secure Multi-Receiver Signcryption Scheme
收藏 引用
Journal of Harbin Institute of technology(New Series) 2016年 第5期23卷 53-61页
作者: Zhimin Yu Zhengjun Jing Hua Yang Chunsheng Gu Key Laboratory of Cloud Computing and Intelligent Information Processing of Changzhou City Jiangsu University of Technology Changzhou Jiangsu 213001 China College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China
In order to protect historical ciphertext when the private key leaked in the broadcasting system,the forward-secure multi-receiver signcryption scheme is designed based on the generic graded multilinear mapping encodi... 详细信息
来源: 评论
Joint power control and proportional fair scheduling for D2D communication underlaying cellular networks  13
Joint power control and proportional fair scheduling for D2D...
收藏 引用
13th IEEE International Conference on Signal Processing, ICSP 2016
作者: Li, Xiaoshuai Lin, Ma Xu, Yubin Rajan, Shankaran Harbin Institute of Technology Communication Research Center Harbin China Key Laboratory of Police Wireless Digital Communication China Ministry of Public Security Harbin China Macquarie University Department of Computing Sydney Australia
Device-to-Device (D2D) communication appears to be a promising component in 5G networks because of its increased spectral efficiency and reduced communication delay. But it also causes the co-channel interference to c... 详细信息
来源: 评论
Learning to Predict Links by Integrating Structure and Interaction Information in Microblogs
收藏 引用
Journal of Computer Science & technology 2015年 第4期30卷 829-842页
作者: 贾岩涛 王元卓 程学旗 Key Laboratory of Network Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Link prediction in microblogs by using unsupervised methods has been studied extensively in recent years, which aims to find an appropriate similarity measure between users in the network. However, the measures used b... 详细信息
来源: 评论
Person re-identification by camera correlation aware feature augmentation
arXiv
收藏 引用
arXiv 2017年
作者: Chen, Ying-Cong Zhu, Xiatian Zheng, Wei-Shi Lai, Jian-Huang School of Data and Computer Science Sun Yat-sen University Guangzhou510275 China Collaborative Innovation Center of High Performance Computing National University of Defense Technology Changsha410073 China Department of Computer Science and Engineering Chinese University of Hong Kong School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom Key Laboratory of Machine Intelligence and Advanced Computing Sun Yatsen University Ministry of Education China Guangdong Province Key Laboratory of Information Security China
The challenge of person re-identification (re-id) is to match individual images of the same person captured by different non-overlapping camera views against significant and unknown cross-view feature distortion. Whil... 详细信息
来源: 评论
INTELLIGENT INFORMATION network security AND MANAGEMENT
收藏 引用
China Communications 2016年 第7期13卷 3-6页
作者: Yixian Yang Zhongshan Zhang Wenjing Li Information Security Center(ISC) Beijing University of Posts and Telecommunications(BUPT) National Engineering Laboratory for Disaster Backup and Recovery the School of Computer and Communication Engineering in the University of Science and Technology Beijing(USTB) State Key Lab of Networking and Switching Technologies Network Management Research Center at BUPT National Innovation Research Group of China
Intelligent Information network security and Management(IINSM)is an emerging direction in future Internet architecture research,which has gained significant tractions among academia and *** the rapid development of mo... 详细信息
来源: 评论
Efficient group key management for secure big data in predictable large-scale networks
Efficient group key management for secure big data in predic...
收藏 引用
作者: He, Shuangyu Wu, Qianhong Qin, Bo Liu, Jianwei Li, Yan School of Electronics and Information Engineering Beihang University Beijing100191 China State Key Laboratory of Integrated Services Networks Xidian University Xi'an710071 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100193 China Key Laboratory of Cryptographic Technology and Information Security Ministry of Education Shandong University Shandong250100 China Ministry of Education School of Information Renmin University of China Beijing China School of Mathematics and Computing Science Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin Guangxi541004 China State Key Laboratory of Cryptology P.O. Box 5159 Beijing100878 China Aerospace Hengxing Science and Technology Co. LTD Beijing China
It is challenging to secure group communications among large-scale networks due to their network scale. We observe that in many large-scale networks, the scale of actual group communication is nevertheless predicable ... 详细信息
来源: 评论
Pessimistic multi-granulation rough set in incomplete information system
收藏 引用
Revista Tecnica de la Facultad de Ingenieria Universidad del Zulia 2016年 第2期39卷 203-208页
作者: Yao, Sheng Zhao, Peng Jin, Haijun Chu, Xiaofang Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Hefei Anhui230039 China School of Computer Science and Technology Hefei Anhui246011 China Quality and Technical Supervision and Inspection Center of QuZhou QuZhou Zhejiang324000 China Hefei Municipal Public Security Bureau Hefei Anhui230011 China
According to granular computing, Pawlak s rough set theory is based on a single granulation; however, multi-granulation rough set theory is applied to describe an uncertain concept by multiple binary relations. In thi... 详细信息
来源: 评论
An energy-efficient bandwidth allocation method for single-chip heterogeneous processor  7
An energy-efficient bandwidth allocation method for single-c...
收藏 引用
7th International Green and Sustainable computing Conference, IGSC 2016
作者: Zhu, Yatao Zhang, Shuai Ye, Xiaochun Wang, Da Tan, Xu Fan, Dongrui Zhang, Zhimin Li, Hongliang State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi Jiangsu China
In recent years, many studies on optimization of energy consumption have focused on heterogeneous processor architectures. Heterogeneous computing model composed of CPU and GPU has developed from co-processing between... 详细信息
来源: 评论
PIWD: A plugin-based framework for well-designed SPARQL  6
PIWD: A plugin-based framework for well-designed SPARQL
收藏 引用
6th Joint International Conference on Semantic technology, JIST 2016
作者: Zhang, Xiaowang Song, Zhenyu Feng, Zhiyong Wang, Xin School of Computer Science and Technology Tianjin University Tianjin China School of Computer Software Tianjin University Tianjin300350 China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing211189 China
In the real world datasets (e.g., DBpedia query log), queries built on well-designed patterns containing only AND and OPT operators (for short, WDAO-patterns) account for a large proportion among all SPARQL queries. I... 详细信息
来源: 评论