咨询与建议

限定检索结果

文献类型

  • 2,087 篇 会议
  • 1,620 篇 期刊文献

馆藏范围

  • 3,707 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,418 篇 工学
    • 1,833 篇 计算机科学与技术...
    • 1,472 篇 软件工程
    • 594 篇 信息与通信工程
    • 340 篇 电气工程
    • 272 篇 控制科学与工程
    • 242 篇 电子科学与技术(可...
    • 233 篇 生物工程
    • 177 篇 网络空间安全
    • 155 篇 机械工程
    • 113 篇 光学工程
    • 96 篇 生物医学工程(可授...
    • 91 篇 化学工程与技术
    • 86 篇 仪器科学与技术
    • 86 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 69 篇 材料科学与工程(可...
    • 64 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,083 篇 理学
    • 612 篇 数学
    • 268 篇 物理学
    • 252 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 91 篇 化学
  • 606 篇 管理学
    • 333 篇 管理科学与工程(可...
    • 301 篇 图书情报与档案管...
    • 101 篇 工商管理
  • 121 篇 法学
    • 72 篇 社会学
  • 82 篇 医学
    • 72 篇 临床医学
    • 66 篇 基础医学(可授医学...
  • 45 篇 经济学
  • 34 篇 军事学
  • 19 篇 农学
  • 18 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 168 篇 feature extracti...
  • 129 篇 semantics
  • 127 篇 accuracy
  • 112 篇 training
  • 110 篇 computational mo...
  • 103 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 73 篇 data models
  • 69 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 60 篇 robustness
  • 59 篇 data privacy
  • 59 篇 protocols
  • 52 篇 neural networks
  • 51 篇 object detection
  • 51 篇 adaptation model...
  • 50 篇 cloud computing
  • 48 篇 data mining

机构

  • 278 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 98 篇 university of ch...
  • 83 篇 school of comput...
  • 82 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 66 篇 school of cyber ...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 60 篇 guangdong provin...
  • 53 篇 shandong enginee...
  • 51 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 46 篇 shandong provinc...
  • 44 篇 institute of inf...

作者

  • 101 篇 cheng xueqi
  • 50 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 27 篇 jin xiaolong
  • 27 篇 xu qianqian
  • 25 篇 xiaoming wu
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 24 篇 li wei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 20 篇 yang zhiyong
  • 20 篇 shen yulong

语言

  • 3,242 篇 英文
  • 390 篇 其他
  • 86 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3707 条 记 录,以下是3011-3020 订阅
排序:
The Similarity Calculation of E-commerce User Behaviors with Petri Net
The Similarity Calculation of E-commerce User Behaviors with...
收藏 引用
2nd International Conference on Artificial Intelligence and Engineering Applications(AIEA 2017)
作者: LIHUA PAN BINGXIAN MA YAN WANG Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Electronic Department Shandong College of Electronic Technology
The similarity and of user behaviors behavior is conductive to great classify users,cluster different groups,generate the *** is of significance novel to of achieve a finegrained analysis of user *** In this paper,a m... 详细信息
来源: 评论
Survey on artificial intelligence for additive manufacturing  23
Survey on artificial intelligence for additive manufacturing
收藏 引用
23rd IEEE International Conference on Automation and computing, ICAC 2017
作者: Yang, Jimeng Chen, Yi Huang, Weidong Li, Yun School of Engineering University of Glasgow GlasgowG12 8LT United Kingdom School of Computer Science and Network Security Dongguan University of Technology Dongguan523808 China State Key Laboratory of Solidification Processing Northwestern Polytechnical University Xi'an710072 China
Additive manufacturing of three-dimensional objects are now more and more realised through 3D printing, known as an evolutional paradigm in the manufacturing industry. Artificial intelligence is currently finding wide... 详细信息
来源: 评论
A simple brain storm optimization algorithm via visualizing confidence intervals  11th
A simple brain storm optimization algorithm via visualizing ...
收藏 引用
11th International Conference on Simulated Evolution and Learning, SEAL 2017
作者: Cao, YingYing Chen, Wei Cheng, Shi Sun, Yifei Liu, Qunfeng Li, Yun Shi, Yuhui School of Computer Science and Network Security Dongguan University of Technology Dongguan China School of Computer Science Shaanxi Normal University Xi’an China Key Laboratory of Modern Teaching Technology Ministry of Education Xi’an China School of Physics and Information Technology Shaanxi Normal University Xi’an China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
Visualizing confidence intervals method developed recently for benchmarking stochastic optimization algorithm is adopted in this paper to benchmark and study the brain storm optimization algorithm in depth. Through an... 详细信息
来源: 评论
An Improved Algorithm for Multivariate Polynomial Interpolation
An Improved Algorithm for Multivariate Polynomial Interpolat...
收藏 引用
第二届亚太计算机科学与应用学术会议
作者: Min Tang Guoqiang Deng School of Mathematics and Computing Science Guangxi Key Laboratory of Cryptography and Information SecurityGuilin University of Electronic Technology Shanghai Key Lab of Trustworthy Computing East China Normal University School of Mathematics and Computing Science Guangxi Colleges and Universities Key Laboratory of Data Analysis and ComputationGuilin University of Electronic Technology
In this paper, we present an improved method based on Zippel's algorithm for multivariate polynomial interpolation, and a testing point technique is proposed to verify the recovered polynomial. Compared with Zippe... 详细信息
来源: 评论
An Improved Algorithm for Multivariate Polynomial Interpolation
An Improved Algorithm for Multivariate Polynomial Interpolat...
收藏 引用
2017 Asia-Pacific Computer Science and Application Conference
作者: Min Tang Guoqiang Deng School of Mathematics and Computing Science Guangxi Key Laboratory of Cryptography and Information SecurityGuilin University of Electronic Technology Shanghai Key Lab of Trustworthy Computing East China Normal University School of Mathematics and Computing Science Guangxi Colleges and Universities Key Laboratory of Data Analysis and ComputationGuilin University of Electronic Technology
In this paper,we present an improved method based on Zippel's algorithm for multivariate polynomial interpolation,and a testing point technique is proposed to verify the recovered *** with Zippel's algorithm,t... 详细信息
来源: 评论
A fibonacci based batch auditing protocol for cloud data  1
收藏 引用
9th International Symposium on Cyberspace Safety and security, CSS 2017
作者: Shen, Jian Shen, Jun Wang, Chen Wang, Anxi Jiangsu Engineering Center of Network Monitoring Nanjing China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China
As cloud storage is developing fast with time going by, the design of auditing protocols has caught a large number of researchers’ eyes. However, though most of the existing auditing protocols have considered batch a... 详细信息
来源: 评论
Discovering and understanding the security hazards in the interactions between iot devices, mobile apps, and clouds on smart home platforms
arXiv
收藏 引用
arXiv 2018年
作者: Zhou, Wei Jia, Yan Yao, Yao Zhu, Lipeng Guan, Le Mao, Yuhang Liu, Peng Zhang, Yuqing National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China School of Cyber Engineering Xidian University China Department of Computer Science University of Georgia United States College of Information Sciences and Technology Pennsylvania State University United States State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China
A smart home connects tens of home devices to the Internet, where an IoT cloud runs various home automation applications. While bringing unprecedented convenience and accessibility, it also introduces various security... 详细信息
来源: 评论
Packet: a privacy-aware access control policy composition method for services composition in cloud environments
收藏 引用
Frontiers of Computer Science 2016年 第6期10卷 1142-1157页
作者: Li LIN Jian HU Jianbiao ZHANG College of Computer Science Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing Beijing 100124 China National Engineering Laboratory for Classified Information Security Protection Beijing 100124 China
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service p... 详细信息
来源: 评论
An adaptive AI-based virtual reality sports system for adolescents with excess body weight: a randomized controlled trial
收藏 引用
Nature medicine 2025年 1-14页
作者: Jihong Wang Yiming Qin Qian Wu Dian Zeng Xiaojing Gao Qinyi Wang Zhen Li Yueqiong Ni Haoxuan Li Ping Zhang Jingyi Guo Weizhi Ma Mamatkasim Maitusun Xufeng Jin Minghong Chen Liping Zhu Qin Lu Qiandi Chen Yuna Wu Chengxiang Lin Rui Han Di Cheng Jiacheng Ni Xiaochun Wang Fangshu Yao Jie Zhuang Jun Xia Dan Liu Yuwei Lu Piao Kang Shujie Yu Anran Chen Ying Zhang Qian Li Wenli Ge Xiaoxue Long Zehua Jiang Zhouyu Guan Zihao Jin Pengfei Jin Tingyao Li Jia Shu Jiale Yang Jinyang Wang Nan Jiang Jing Qian Younhyun Jung Han Zhang Qing Yang Lifei Ma Xiaomeng Wu Xiaojun Huang Dongyang Si Jie Ren Hui Qiao Yuchen Guo Zhifeng Huang Wenxiao Wang Weihong Deng Lei Bi Danyue Zhao Yuehua Li Rynson W H Lau Yih-Chung Tham Xindong Ma Jing Ma Dinggang Shen Songhai Zhang Haibing Guan Weiwen Zou Minyi Guo Xinping Guan Xiaokang Yang Aimin Xu Jiarui Wu Gianni Panagiotou Michael Andrew Tse Jinman Kim Enhua Wu Daniel Thalmann Nadia Magnenat Thalmann Felipe Fregni Tien Yin Wong Weiping Jia Rong Zeng Chwee Teck Lim Bin Sheng Huating Li The Consortium for Digitalized and Intelligent Physical Education Assessment and Application School of Athletic Performance Shanghai University of Sport Shanghai Sixth People's Hospital Affiliated to Shanghai Jiao Tong University School of Medicine Department of Computer Science and Engineering School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China. School of Clinical Medicine Tsinghua University Beijing China. Department of Computer Science City University of Hong Kong Hong Kong Special Administrative Region China. MOE Key Laboratory of AI School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China. Institute for Proactive Healthcare Antai College of Economics and Management Shanghai Jiao Tong University Shanghai China. Shanghai Diabetes Institute Shanghai Key Laboratory of Diabetes Mellitus Shanghai Clinical Center for Diabetes Shanghai China. Tsinghua Medicine Tsinghua University Beijing China. Shanghai Clinical Research and Trial Center ShanghaiTech University Shanghai China. Department of Microbiome Dynamics Leibniz Institute for Natural Product Research and Infection Biology - Leibniz-Hans Knöll Institute Jena Germany. Cluster of Excellence Balance of the Microverse Friedrich Schiller University Jena Germany. School of Exercise and Health Shanghai University of Sport Shanghai China. Department of Computer Science and Engineering The Ohio State University Columbus OH USA. Department of Biomedical Informatics The Ohio State University Columbus OH USA. Clinical Research Center Shanghai Sixth People's Hospital Affiliated to Shanghai Jiao Tong University School of Medicine Shanghai China. Institute for AI Industry Research Tsinghua University Beijing China. Hotan District Secondary Vocational and Technical School Hotan China. Shanghai Baoshan High School Shanghai China. Shanghai Qiuzhen Middle School Shanghai China. School of Psychology Shanghai Universi
Adolescents with obesity face numerous health risks and encounter barriers that lead to physical inactivity. We developed a virtual reality sports system, named REVERIE (Real-World Exercise and VR-Based Exercise Resea...
来源: 评论
EagleMine: Vision-guided mining in large graphs
arXiv
收藏 引用
arXiv 2017年
作者: Feng, Wenjie Liu, Shenghua Faloutsos, Christos Hooi, Bryan Shen, Huawei Cheng, Xueqi Cas Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences School of Computer Science Carnegie Mellon University
Given a graph with millions of nodes, what patterns exist in the distributions of node characteristics, and how can we detect them and separate anomalous nodes in a way similar to human vision? In this paper, we propo... 详细信息
来源: 评论