咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3031-3040 订阅
排序:
Some classes of complete permutation polynomials over Fq
收藏 引用
Science China Mathematics 2015年 第10期58卷 2081-2094页
作者: WU GaoFei LI Nian HELLESETH Tor ZHANG YuQing State Key Laboratory of Integrated Service Networks Xidian University Information Security and National Computing Grid Laboratory Southwest Jiaotong University Department of Informatics University of Bergen National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences
By using a powerful criterion for permutation polynomials, we give several classes of complete permutation polynomials over finite fields. First, two classes of complete permutation monomials whose exponents are of Ni... 详细信息
来源: 评论
Teleportation of a ququart system using hyperentangled photons assisted by atomic-ensemble memories
收藏 引用
Physical Review A 2016年 第1期93卷 012332-012332页
作者: Ming-Xing Luo Hui-Ran Li Hong Lai Xiaojun Wang Information Security and National Computing Grid Laboratory School of Information Science and Technology Southwest Jiaotong University Chengdu 610031 China State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China School of Computer and Information Science Southwest University Chongqing 400715 China School of Electronic Engineering Dublin City University Dublin 9 Ireland
A single photon encoded in both the spin and the orbital angular momentum has recently been experimentally demonstrated [X.-L. Wang et al., Nature 518, 516 (2015)] with linear optics using the hyperentangled state, w... 详细信息
来源: 评论
Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
收藏 引用
Personal and Ubiquitous computing 2017年 第1期22卷 69-69页
作者: Da-Zhi Sun Yi Mu Willy Susilo Tianjin Key Laboratory of Advanced Networking (TANK) School of Computer Science and Technology Tianjin University Tianjin China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong Wollongong Australia
Figure 4 contained an error. "Diffie-Hellman key" in step 1c' of Figure 4 should be changed to "Diffie-Hellman keys". The original article was corrected.
来源: 评论
Micro-Expression Recognition based on 2D Gabor Filter and Sparse Representation
收藏 引用
Journal of Physics: Conference Series 2017年 第1期787卷
作者: Hao Zheng Key Laboratory of Trusted Cloud Computing and Big Data Analysis School of Information Engineering Nanjing XiaoZhuang University Nanjing China MOE Key Laboratory of Computer Network and Information Integration School of Computer Science and Engineering Southeast University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Micro-expression recognition is always a challenging problem for its quick facial expression. This paper proposed a novel method named 2D Gabor filter and Sparse Representation (2DGSR) to deal with the recognition of ...
来源: 评论
Simulate Human Saccadic Scan-Paths in Target Searching
收藏 引用
International Journal of Intelligence Science 2016年 第1期6卷 1-9页
作者: Lijuan Duan Jun Miao David M. W. Powers Jili Gu Laiyun Qing Beijing Key Laboratory of Trusted Computing Beijing Key Laboratory on Integration and Analysis of Large-Scale Stream Data College of Computer Science and Technology Beijing University of Technology Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences(CAS) Institute of Computing Technology CAS Beijing China School of Computer Science Engineering & Maths Flinders University of South Australia Adelaide South Australia Beijing Samsung Telecom R&D Center Beijing China University of Chinese Academy of Sciences Beijing China
Human saccade is a dynamic process of information pursuit. There are many methods using either global context or local context cues to model human saccadic scan-paths. In contrast to them, this paper introduces a mode... 详细信息
来源: 评论
Comment on “Quantum oblivious set-member decision protocol”
收藏 引用
Physical Review A 2016年 第3期93卷 036301-036301页
作者: Bin Liu Di Xiao Wei Huang Ting-Ting Song Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) of Ministry of Education College of Computer Science Chongqing University Chongqing 400044 China Science and Technology on Communication Security Laboratory Chengdu 610041 China Department of Computer Science College of Information Science and Technology Jinan University Guangzhou 510632 China
In a recent paper [Phys. Rev. A 92, 022309 (2015)], the authors proposed a quantum oblivious set-member decision protocol, which is designed to allow a server to check whether a private secret of a user is a member of... 详细信息
来源: 评论
The design and implementation of network attack and defense platform based on cloud desktop
收藏 引用
Journal of Physics: Conference Series 2017年 第1期887卷
作者: Zining Yan Yunhan Wang Shijiao Shao Boquan Li Embedded System Lab. College of Computer Science and Technology Harbin China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Network Assessment of Technology Chinese Academy of Sciences Beijing China
This paper discusses the cloud desktop technology, virtualization technology and penetration testing technology used in the network attack and defense training platform, and introduces the design and implementation pr...
来源: 评论
Automatic salient object segmentation via shape prior based active contour model
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第11期7卷 2491-2496页
作者: Gao, Shangbing Zhang, Youdong Zhou, Jun Zheng, Hao The Key Laboratory for Traffic and Transportation Security of Jiangsu Province Faculty of Computer and Software Engineering No. 1 Meicheng Rd. Huai’an223003 China Jiangsu Provincial Key Laboratory for Advanced Manufacturing Technology Huaiyin Institute of Technology No. 1 Meicheng Rd. Huai’an223003 China Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing Xiaozhuang University No. 3601 Hongjing Ave. Jiangning Dist. Nanjing211171 China
In this paper, we propose a novel model for unsupervised segmentation of viewer's attention object from natural images based on localizing region-based active con-tour (LRAC). Firstly, we proposed the saliency det... 详细信息
来源: 评论
Design and Implementation of Library Books Search and Management System Using RFID technology
Design and Implementation of Library Books Search and Manage...
收藏 引用
International Conference on Intelligent networking and Collaborative Systems (INCOS)
作者: Haiming Cheng Ling Huang He Xu Yifan Hu Xu An Wang School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks College of Internet of Things Nanjing University of Posts and Telecommunications Nanjing China Key Laboratory of Information and Network Security Engineering University of Chinese Armed Police Force Xi'an China
Radio Frequency Identification technology (RFID) is the key technology to realize the Internet of things. Currently, using RFID to locate objects indoor is a hot topic in the research on the application of RFID. In th... 详细信息
来源: 评论
BLIND CFO ESTIMATION FOR MULTIUSER OFDM UPLINK WITH LARGE NUMBER OF RECEIVE ANTENNAS
BLIND CFO ESTIMATION FOR MULTIUSER OFDM UPLINK WITH LARGE NU...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Weile Zhang Feifei Gao Bobin Yao MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University China Tsinghua National Laboratory for Information Science and Technology Tsinghua University China School of Electronic and Control Engineering Chang'an University China
In this paper, we propose a new blind carrier frequency offset (CFO) estimation method for multiuser orthogonal frequency division multiplexing (OFDM) uplink transmissions. The spatial multiplexing is supported in the... 详细信息
来源: 评论