咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3051-3060 订阅
排序:
HANSpeller++: A unified framework for chinese spelling correction  8
HANSpeller++: A unified framework for chinese spelling corre...
收藏 引用
8th SIGHAN Workshop on Chinese Language Processing, SIGHAN 2015
作者: Zhang, Shuiyuan Xiong, Jinhua Hou, Jianpeng Zhang, Qiao Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology China Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China
Increased interest in China from foreigners has led to a corresponding interest in the study of Chinese. However, the learning of Chinese by non-native speakers will encounter many difficulties, Chinese spelling check... 详细信息
来源: 评论
Paralleled Extraction Method for Content of Invoice Image Based on TPL
Paralleled Extraction Method for Content of Invoice Image Ba...
收藏 引用
2015 International Conference on Advanced Management Science and Information Engineering(AMSIE 2015)
作者: H.Y.Jin B.Xing X.H.Hei School of Computer Science & Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
The paper mainly uses a mixed strategy of data and task parallelism to realize parallel extraction date information of *** at the deficiency of ordinary pipeline mode for parallel extraction date information from invo... 详细信息
来源: 评论
Background modeling methods in video analysis: A review and comparative evaluation
收藏 引用
CAAI Transactions on Intelligence technology 2016年 第1期1卷 43-60页
作者: Yong Xu Jixiang Dong Bob Zhang Daoyun Xu Bio-Computing Research Center Shenzhen Graduate School Harbin Institute of Technology 518055 Shenzhen China Shenzhen Key Laboratory of Network Oriented Intelligent Computation Shenzhen China Department of Computer and Information Science University of Macao Avenida da Universidade Taipa Macao China The College of Computer Science and Technology Guizhou University Guiyang 550025 Guizhou China
Foreground detection methods can be applied to efficiently distinguish foreground objects including moving or static objects from back- ground which is very important in the application of video analysis, especially v... 详细信息
来源: 评论
Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption
Trusted Boolean Search on Cloud Using Searchable Symmetric E...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Cong Zuo James Macindoe Siyin Yang Ron Steinfeld Joseph K. Liu School of Computer and Information Engineering Zhejiang Gongshang University Zhejiang P.R. China Faculty of Information Technology Clayton Campus Monash University Australia Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou Fujian China
A Searchable Symmetric Encryption (SSE) scheme allows a server to search a user's data without having to decrypt the data. This provides the user with a high degree of privacy and is particularly useful when data ... 详细信息
来源: 评论
Worldwide Soundscapes: A Synthesis of Passive Acoustic Monitoring Across Realms
收藏 引用
Global Ecology and Biogeography 2025年 第5期34卷
作者: Kevin F. A. Darras Rodney A. Rountree Steven L. Van Wilgenburg Anna F. Cord Frederik Pitz Youfang Chen Lijun Dong Agnès Rocquencourt Camille Desjonquères Patrick Mauritz Diaz Tzu-Hao Lin Théophile Turco Louise Emmerson Tom Bradfer-Lawrence Amandine Gasc Sarah Marley Marcus Salton Laura Schillé Paul J. Wensveen Shih-Hung Wu Adriana C. Acero-Murcia Orlando Acevedo-Charry Matyáš Adam Jacopo Aguzzi Irmak Akoglu M. Clara P. Amorim Mina Anders Michel André Alexandre Antonelli Leandro Aparecido Do Nascimento Giulliana Appel Stephanie Archer Christos Astaras Andrey Atemasov Jamieson Atkinson Joël Attia Emanuel Baltag Luc Barbaro Fritjof Basan Carly Batist Julio Ernesto Baumgarten Just T. Bayle Sempere Kristen Bellisario Asaf Ben David Oded Berger-Tal Frédéric Bertucci Matthew G. Betts Iqbal S. Bhalla Thiago Bicudo Marta Bolgan Sara Bombaci Gerard Bota Martin Boullhesen Robert A. Briers Susannah Buchan Michal Budka Katie Burchard Giuseppa Buscaino Alice Calvente Marconi Campos-Cerqueira Maria Isabel Carvalho Gonçalves Maria Ceraulo Maite Cerezo-Araujo Gunnar Cerwén Adams A. Chaskda Maria Chistopolova Christopher W. Clark Kieran D. Cox Benjamin Cretois Chapin Czarnecki Luis P. da Silva Wigna da Silva Laurence H. De Clippele David de la Haye Ana Silvia de Oliveira Tissiani Devin de Zwaan M. Eugenia Degano Jessica Deichmann Joaquin del Rio Christian Devenish Ricardo Díaz-Delgado Pedro Diniz Dorgival Diógenes Oliveira-Júnior Thiago Dorigo Saskia Dröge Marina Duarte Adam Duarte Kerry Dunleavy Robert Dziak Simon Elise Hiroto Enari Haruka S. Enari Florence Erbs Britas Klemens Eriksson Pınar Ertör-Akyazi Nina C. Ferrari Luane Ferreira Abram B. Fleishman Paulo J. Fonseca Bárbara Freitas Nicholas R. Friedman Jérémy S. P. Froidevaux Svetlana Gogoleva Carolina Gonzaga José Miguel González Correa Eben Goodale Benjamin Gottesman Ingo Grass Jack Greenhalgh Jocelyn Gregoire Samuel Haché Jonas Hagge William Halliday Antonia Hammer Tara Hanf-Dressler Sylvain Haupert Samara Haver Becky Heath Daniel Hending Jose Hernandez-Blanco Dennis Higgs EFNO ECODIV INRAE Domaine des Barres Nogent-sur-Vernisson France Sustainable Agricultural Systems & Engineering Lab School of Engineering Westlake University Hangzhou Zhejiang China Chair of Computational Landscape Ecology Faculty of Environmental Sciences Dresden University of Technology Dresden Germany Biology Department University of Victoria Victoria British Columbia Canada The Fish Listener Waguoit Massachusetts USA Terrestrial Unit Prairie Region Canadian Wildlife Service Environment & Climate Change Canada Prairie & Northern Wildlife Research Centre Saskatoon Saskatchewan Canada Agro-ecological Modeling Group Faculty of Agriculture University of Bonn Bonn Germany Marine Mammal and Marine Bioacoustics Laboratory Department of Deep Sea Science Institute of Deep-sea Science and Engineering Chinese Academy of Sciences Sanya Hainan China Institut de Systématique Évolution Biodiversité Muséum National d’Histoire Naturelle Paris France Université Grenoble Alpes Université Savoie Mont Blanc CNRS LECA Grenoble France Climate Change and Biodiversity Hanns R. Neumann Stiftung Indonesia Muaradua Indonesia Biodiversity Research Center Academia Sinica Nankang Taipei Taiwan ENES Bioacoustics Research Laboratory University of Saint-Etienne CRNL CNRS UMR 5292 Inserm UMR_S 1028 Saint-Etienne France Australian Antarctic Division Science Branch Department of Climate Change Energy Environment and Water Channel Highway Kingston Tasmania Australia Biological and Environmental Sciences University of Stirling Stirling Scotland Centre for Conservation Science RSPB Edinburgh UK IMBE Aix Marseille Univ Avignon Univ CNRS IRD Aix-en-Provence France Scotland's Rural College Craibstone Estate Aberdeen UK BIOGECO INRAE University of Bordeaux Cestas France Westman Islands Research Centre University of Iceland Vestmannaeyjar Iceland Qigu Research Center Taiwan Biodiversity Research Institute Nantou County Taiwan Programa de Pós-graduação em Ecologia
Aim The urgency for remote, reliable and scalable biodiversity monitoring amidst mounting human pressures on ecosystems has sparked worldwide interest in Passive Acoustic Monitoring (PAM), which can track life underwa... 详细信息
来源: 评论
FE-brick: Re-definition and re-design of fe model in next-generation router architecture
FE-brick: Re-definition and re-design of fe model in next-ge...
收藏 引用
作者: Gao, Xianming Wang, Baosheng Wang, Xu An Zhang, Xiaozhe School of Computer National University of Defense Technology Changsha410073 China Key Laboratory of Network and Information Security Engineering University of CAPF Xi'an710086 China
In traditional router, it usually consists of forwarding element (FE) and control element (CE). However, there is a tight coupling between FE model and logical functions, thus restricting service innovation and user c... 详细信息
来源: 评论
Radiation constrained wireless charger placement
Radiation constrained wireless charger placement
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Haipeng Dai Yunhuai Liu Alex X. Liu Lingtao Kong Guihai Chen Tian He State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu CHINA Third Research Institute of Ministry of Public Security Shanghai CHINA Shanghai key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China Computer Science and Engineering University of Minnesota Minneapolis MN USA Department of Automation Shanghai Jiao Tong University Shanghai China
Wireless Power Transfer has become a commercially viable technology to charge devices because of the convenience of no power wiring and the reliability of continuous power supply. This paper concerns the fundamental i... 详细信息
来源: 评论
A twin-multi-ring channel model for Massive MIMO system
A twin-multi-ring channel model for Massive MIMO system
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Ying Chen Yue Li Songlin Sun Xinzhou Cheng Xuqi Chen School of Information and Communication Engineering Beijing University of Posts and Telecommunications China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) China Unicom Network Technology Research Institute China Posts & Telecommunications Planning and Designing Institute Co. Ltd China
A Massive MIMO system is equipped with more antennas than traditional MIMO system. Channel modeling for MIMO system has been well studied. However, study for Massive MIMO system channel modeling has just begun. In thi... 详细信息
来源: 评论
A nonlocal interferometric phase filtering strategy for practical InSAR system
A nonlocal interferometric phase filtering strategy for prac...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Xue Lin Dongsheng Fang Fangfang Li Ke Wang Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan China School of Information Science and Engineering University of Jinan Jinan China Institute of Electronics Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Key Laboratory of Technology in Geo-spatial Information Processing and Application System Chinese Academy of Sciences Beijing China School of Information Science and Engineering Henan University of Technology Zhengzhou China
Nonlocal interferometric phase filtering methods achieve excellent performance in both noise reduction and texture preservation, even in the case of complicated topography and low coherence. The main limitation of the... 详细信息
来源: 评论
Stability analysis of a worm propagation model with quarantine and vaccination
收藏 引用
International Journal of network security 2016年 第3期18卷 493-500页
作者: Wang, Fangwei Yang, Fang Wang, Changguang Zhao, Dongmei Zhang, Yunkia College of Information Technology Hebei Normal University No. 20 South ErHuan Road YuHua District Shijiazhuang050024 China Shaanxi Key Laboratory of Network and System Security Xidian University No. 1 TaiBai South Road YanTa District Xi'an710071 China Department of Science and Technology Hebei Vocational College of Public Security Police No. 587 Gongnong Road Qiaoxi District Shijiazhuang050011 China Department of Information Engineering Shijiazhuang Institute of Railway Technology No. 18 Sishuichang Road Qiaodong District Shijiazhuang050071 China
Internet worms pose a serious threat to the Internet secu-rity. In order to effectively defend against Internet worms, this paper proposes a novel epidemic e-SEIQV model with quarantine and vaccination. Using this e-S... 详细信息
来源: 评论