咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3001-3010 订阅
排序:
Sequence to backward and forward sequences: A content-introducing approach to generative short-text conversation  26
Sequence to backward and forward sequences: A content-introd...
收藏 引用
26th International Conference on Computational Linguistics, COLING 2016
作者: Mou, Lili Song, Yiping Yan, Rui Li, Ge Zhang, Lu Jin, Zhi Key Laboratory of High Confidence Software Technologies MoE China Institute of Software Peking University China Institute of Network Computing and Information Systems Peking Univerity China Institute of Computer Science and Technology Peking University China
Using neural networks to generate replies in human-computer dialogue systems is attracting increasing attention over the past few years. However, the performance is not satisfactory: the neural network tends to genera... 详细信息
来源: 评论
Learning to segment with image-level annotations
收藏 引用
Pattern Recognition 2016年 59卷 234-244页
作者: Wei, Yunchao Liang, Xiaodan Chen, Yunpeng Jie, Zequn Xiao, Yanhui Zhao, Yao Yan, Shuicheng Institute of information Science Beijing Jiaotong University Beijing 100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing 100044 China School of Advanced Computing Sun Yat-Sen University Guangzhou 510006 China Vision and Machine Learning Lab National University of Singapore 117583 Singapore People׳s Public Security University of China Beijing 100038 China
Recently, deep convolutional neural networks (DCNNs) have significantly promoted the development of semantic image segmentation. However, previous works on learning the segmentation network often rely on a large numbe... 详细信息
来源: 评论
A novel quantum image compression method based on JPEG
arXiv
收藏 引用
arXiv 2017年
作者: Wang, Jian Jiang, Nan Zhao, Na School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China Department of Computer Science Purdue University West Lafayette47907 United States Department of Chemistry Purdue University West Lafayette47907 United States College of Computer Science Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China
Quantum image processing has been a hot topic. The first step of it is to store an image into qubits, which is called quantum image preparation. Different quantum image representations may have different preparation m... 详细信息
来源: 评论
Distributed energy balanced routing for wireless sensor network using energy prediction metric
Distributed energy balanced routing for wireless sensor netw...
收藏 引用
International Conference on Information Science and Control Engineering
作者: Quan Guo Xiaoying Song Liaoning Key Lab of Network Security and Computing Technology Dalian Neusoft Information Institute College of Computer Science and Engineering Northeastern University
A considerable amount of energy efficient routing algorithms have been proposed to save energy and prolong network lifetime. Those algorithms mainly focus on forwarding packets along the minimum energy path to the sin... 详细信息
来源: 评论
Joint power allocation and beamforming for non-orthogonal multiple access (NOMA) in 5G millimeter-wave communications
arXiv
收藏 引用
arXiv 2017年
作者: Xiao, Zhenyu Zhu, Lipeng Choi, Jinho Xia, Pengfei Xia, Xiang-Gen School of Electronic and Information Engineering Beihang University Beijing100191 China Beijing Key Laboratory for Network-Based Cooperative Air Traffic Management Beijing Laboratory for General Aviation Technology Beijing100191 China Collaborative Innovation Center of Geospatial Technology Wuhan430079 China Korea Republic of School of Electronics and Information Engineering Key Laboratory of Embedded System and Service Computing Tongji University Shanghai200092 China College of Information Engineering Shenzhen University Shenzhen China Department of Electrical and Computer Engineering University of Delaware NewarkDE19716 United States
In this paper we explore non-orthogonal multiple access (NOMA) in millimeter-wave (mmWave) communications (mmWave-NOMA). In particular, we consider a typical problem, i.e., maximization of the sum rate of a 2-user mmW... 详细信息
来源: 评论
Automatic mobile retinal microaneurysm detection using handheld fundus camera via cloud computing
Automatic mobile retinal microaneurysm detection using handh...
收藏 引用
Imaging and Multimedia Analytics in a Web and Mobile World 2016
作者: You, Jane Li, Qin Guo, Zhenhua Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong Shenzhen Institute of Information Technology School of Software Engineering Shenzhen China Shenzhen Key Laboratory of Broaband Network and Multimedia Graduate School at Shenzhen Tsinghua University China
This paper presents a new system to monitor retinal microaneurysm which are regarded as the first sign of diabetic retinopathy(DR). The proposed approach to automatic microaneurysm detection aims to enhance screening ... 详细信息
来源: 评论
Classification of Handwriting Number Based on PCANet network with Data Augmentation
Classification of Handwriting Number Based on PCANet Network...
收藏 引用
2016 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics(AMEII 2016)
作者: Tianmei Guo Jiwen Dong Lei Wang Department of Computer Science and Technology Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan
In this paper we proposed an algorithm for classification of handwriting number which use depth of the structure of the simple convolution neural network-- PCANet network with data *** network with data augmentation c... 详细信息
来源: 评论
Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification
Using Multi-features and Ensemble Learning Method for Imbala...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Yunan Zhang Qingjia Huang Xinjian Ma Zeming Yang Jianguo Jiang Beijing Key Laboratory of Network Security Technology CAS Beijing China Institute of Information Engineering CAS Beijing China
The ever-growing malware threats in the cyber spacecalls for techniques that are more effective than widely deployedsignature-based detection system. To counter large volumes ofmalware variants, machine learning techn... 详细信息
来源: 评论
A trusted evidence collection method based on the trusted third-party for cloud platform
收藏 引用
International Journal of Simulation: Systems, Science and technology 2016年 第25期17卷
作者: Wu, Lili Zhan, Jing Zhao, Yong Hu, Jun Li, Ming Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing University of Technology Beijing China The Third Research Institute of Ministry of public security Shanghai China
The characteristics of cloud computing, such as highly centralized resources, dynamic extensibility, and layered service mode, make the trusted evidence collection on the cloud platforms becomes very complex, this art... 详细信息
来源: 评论
Frequency Synchronization for Massive MIMO Multi-User Uplink
Frequency Synchronization for Massive MIMO Multi-User Uplink
收藏 引用
IEEE Global Communications Conference
作者: Weile Zhang Feifei Gao Hui-Ming Wang MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Tsinghua National Laboratory for Information Science and Technology
In this paper, we propose a new frequency synchronization scheme for multiuser orthogonal frequency division multiplexing (OFDM) uplink with a large-scale uniform linear array (ULA) at base station (BS). Considering t... 详细信息
来源: 评论