咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3081-3090 订阅
排序:
On Efficient Feature Ranking Methods for High-Throughput Data Analysis
On Efficient Feature Ranking Methods for High-Throughput Dat...
收藏 引用
作者: Liao, Bo Jiang, Yan Liang, Wei Peng, Lihong Peng, Li Hanyurwimfura, Damien Li, Zejun Chen, Min Key Laboratory for Embedded and Network Computing of Hunan Province College of Information Science and Engineering Hunan University Changsha Hunan410082 China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Department of Computer Science and Engineering Changsha Medical University Changsha Hunan410219 China
Efficient mining of high-throughput data has become one of the popular themes in the big data era. Existing biology-related feature ranking methods mainly focus on statistical and annotation information. In this study... 详细信息
来源: 评论
Research on the design of the effective transmission scheduling algorithm based on the factory wireless sensor network
收藏 引用
Open Automation and Control Systems Journal 2014年 第1期6卷 1426-1434页
作者: Zhang, Yunyi Liu, Shuru Zhang, Ran Wei, Wei College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology China
In order to make the sensing data in the monitoring equipment’s sensor nodes reach to the monitoring center as soon as possible and deal with the equipment which has some problems, the network time delay should be gu... 详细信息
来源: 评论
Research on Identification and Addressing of the Internet of Things
Research on Identification and Addressing of the Internet of...
收藏 引用
International Conference on P2P, Parallel, Grid, Cloud and Internet computing (3PGCIC)
作者: Rui Ma Yue Liu Chun Shan Xiao Lin Zhao Xu An Wang School of Software Beijing Institute of Technology Beijing China Key Laboratory of Information and Network Security Engineering University of Chinese Armed Police Force Xi'an Shanxi China
It is a key issue that identification and addressing the entity which access the Internet through the wireless network with various short distance transmission protocols. To solve the problem, combining with the exist... 详细信息
来源: 评论
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Sch...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Xu Yang Joseph K. Liu Wei Wu Man Ho Au Willy Susilo Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University China and State Key Laboratory of Cryptology Beijing China Faculty of Information Technology Monash University Australia Department of Computing Hong Kong Polytechnic University Hong Kong School of Computer Science and Software Engineering University of Wollongong Australia
Electric Vehicle (EV) infrastructure is relatively new in many countries. Due to the recency of an EV infrastructure, it is important to carry out a series of testing programs. Furthermore, authenticity for collection... 详细信息
来源: 评论
Author Correction: The FLUXNET2015 dataset and the ONEFlux processing pipeline for eddy covariance data
收藏 引用
Scientific data 2021年 第1期8卷 72页
作者: Gilberto Pastorello Carlo Trotta Eleonora Canfora Housen Chu Danielle Christianson You-Wei Cheah Cristina Poindexter Jiquan Chen Abdelrahman Elbashandy Marty Humphrey Peter Isaac Diego Polidori Markus Reichstein Alessio Ribeca Catharine van Ingen Nicolas Vuichard Leiming Zhang Brian Amiro Christof Ammann M Altaf Arain Jonas Ardö Timothy Arkebauer Stefan K Arndt Nicola Arriga Marc Aubinet Mika Aurela Dennis Baldocchi Alan Barr Eric Beamesderfer Luca Belelli Marchesini Onil Bergeron Jason Beringer Christian Bernhofer Daniel Berveiller Dave Billesbach Thomas Andrew Black Peter D Blanken Gil Bohrer Julia Boike Paul V Bolstad Damien Bonal Jean-Marc Bonnefond David R Bowling Rosvel Bracho Jason Brodeur Christian Brümmer Nina Buchmann Benoit Burban Sean P Burns Pauline Buysse Peter Cale Mauro Cavagna Pierre Cellier Shiping Chen Isaac Chini Torben R Christensen James Cleverly Alessio Collalti Claudia Consalvo Bruce D Cook David Cook Carole Coursolle Edoardo Cremonese Peter S Curtis Ettore D'Andrea Humberto da Rocha Xiaoqin Dai Kenneth J Davis Bruno De Cinti Agnes de Grandcourt Anne De Ligne Raimundo C De Oliveira Nicolas Delpierre Ankur R Desai Carlos Marcelo Di Bella Paul di Tommasi Han Dolman Francisco Domingo Gang Dong Sabina Dore Pierpaolo Duce Eric Dufrêne Allison Dunn Jiří Dušek Derek Eamus Uwe Eichelmann Hatim Abdalla M ElKhidir Werner Eugster Cacilia M Ewenz Brent Ewers Daniela Famulari Silvano Fares Iris Feigenwinter Andrew Feitz Rasmus Fensholt Gianluca Filippa Marc Fischer John Frank Marta Galvagno Mana Gharun Damiano Gianelle Bert Gielen Beniamino Gioli Anatoly Gitelson Ignacio Goded Mathias Goeckede Allen H Goldstein Christopher M Gough Michael L Goulden Alexander Graf Anne Griebel Carsten Gruening Thomas Grünwald Albin Hammerle Shijie Han Xingguo Han Birger Ulf Hansen Chad Hanson Juha Hatakka Yongtao He Markus Hehn Bernard Heinesch Nina Hinko-Najera Lukas Hörtnagl Lindsay Hutley Andreas Ibrom Hiroki Ikawa Marcin Jackowicz-Korczynski Dalibor Janouš Wilma Jans Rachhpal Jassal Shicheng Jiang Tomomichi Kato Myr Computational Research Division Lawrence Berkeley National Laboratory Berkeley CA 94720 USA. gzpastorello@lbl.gov. DIBAF University of Tuscia Viterbo 01100 Italy. Euro-Mediterranean Centre on Climate Change Foundation (CMCC) Lecce 73100 Italy. Climate & Ecosystem Sciences Division Lawrence Berkeley National Laboratory Berkeley CA 94720 USA. Computational Research Division Lawrence Berkeley National Laboratory Berkeley CA 94720 USA. Department of Civil Engineering California State University Sacramento CA 95819 USA. Department of Geography Environment and Spatial Sciences Michigan State University East Lansing MI 48823 USA. Department of Computer Science University of Virginia Charlottesville VA 22904 USA. TERN Ecosystem Processes Menzies Creek VIC3159 Australia. Max Planck Institute for Biogeochemistry Jena 07701 Germany. Laboratoire des Sciences du Climat et de l'Environnement (LSCE) CEA CNRS UVSQ UPSACLAY Gif sur Yvette 91190 France. Key Laboratory of Ecosystem Network Observation and Modeling Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing 100101 China. Department of Soil Science University of Manitoba Winnipeg MB R3T2N2 Canada. Department of Agroecology and Environment Agroscope Research Institute Zürich 8046 Switzerland. School of Geography and Earth Sciences McMaster University L8S4K1 Hamilton ON Canada. Department of Physical Geography and Ecosystem Science Lund University Lund 22362 Sweden. Department of Agronomy and Horticulture University of Nebraska-Lincoln Lincoln NE 68583 USA. School of Ecosystem and Forest Sciences The University of Melbourne Richmond VIC3121 Australia. Department of Biology Research Group PLECO University of Antwerp Antwerp 2610 Belgium. Joint Research Centre European Commission Ispra 21027 Italy. TERRA Teaching and Research Center University of Liege Gembloux B-5030 Belgium. Finnish Meteorological Institute Helsinki 00560 Finland. ES
来源: 评论
A face recognition algorithm based on invariant features of trace transform
收藏 引用
Journal of Computational Information Systems 2014年 第3期10卷 911-920页
作者: Zhang, Liang Dong, Jiwen Wang, Lei Shandong Provincial Key Laboratory of Network based Intelligent Computing Department of Computer Science and Technology University of Jinan Jinan 250022 China
In order to improve the recognition rate in single training sample, a face recognition algorithm based on invariant features of trace transform (IFT) is developed. In feature extraction, with application of Scharr ope... 详细信息
来源: 评论
Typical universal entanglers
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2014年 第10期57卷 1913-1917页
作者: WANG Feng LUO MingXing CHEN XiuBo YANG YiXian WANG XiaoJun College of mathematical sciences Dezhou University Information Security and National Computing Grid Laboratory Southwest Jiaotong University State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications School of Electronic Engineering Dublin City University
A universal entangler is a very powerful fault-tolerant entangling device for generating quantum entanglements from any joint states. Our paper aims to address the construction of universal entanglers. We prove that u... 详细信息
来源: 评论
Erratum to: Appearance-based bidirectional representation for palmprint recognition
收藏 引用
Multimedia Tools and Applications 2015年 第24期74卷 11003-11005页
作者: Cui, Jinrong Wen, Jiajun Fan, Zizhu Bio-Computing Research Center Harbin Institute of Technology Shenzhen Graduate School Shenzhen China Key Laboratory of Network Oriented Intelligent Computation Shenzhen China School of Basic Science East China Jiaotong University Nanchang China
来源: 评论
Hybrid quantum-state joining and splitting assisted by quantum dots in one-side optical microcavities
收藏 引用
Physical Review A 2015年 第4期91卷 042326-042326页
作者: Ming-Xing Luo Song-Ya Ma Xiu-Bo Chen Xiaojun Wang Information Security and National Computing Grid Laboratory School of Information Science and Technology Southwest Jiaotong University Chengdu 610031 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Mathematics and Statistics Henan University Kaifeng 475004 China School of Electronic Engineering Dublin City University Dublin 9 Ireland
Quantum state joining has been recently experimentally demonstrated [C. Vitelli et al., Nat. Photon. 7, 521 (2013)] which can transfer two input photonic qubits into a photonic ququart. Here, we revisit these process... 详细信息
来源: 评论
A New Secure Data Deduplication Approach Supporting User Traceability
A New Secure Data Deduplication Approach Supporting User Tra...
收藏 引用
International Conference on Broadband, Wireless computing, Communication and Applications (BWCCA)
作者: Jianfeng Wang Xiaofeng Chen Jin Li Kamil Kluczniak Miroslaw Kutylowski Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou PRChina State Key Laboratory of Integrated Service Networks (ISN) Xidian University Xi'an China School of Computer Science Guangzhou University Guangzhou China Wroclaw University of Technology Wroclaw Poland
The notion of data deduplication enables a user to eliminate duplicate copies of data so that it can save the amount of storage space and network bandwidth. Convergent encryption, as the state-of-art approach, has bee... 详细信息
来源: 评论