咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3151-3160 订阅
排序:
A Collaborative Linear Discriminative Representation Classification Based Method for Face Recognition
A Collaborative Linear Discriminative Representation Classif...
收藏 引用
2014 International Conference on Artificial,Intelligence and Software Engineering(AISE 2014)
作者: Jian ZHANG Ke YAN Zhen-yu HE Yong XU Bio-computing Research Center Shenzhen Graduate School Harbin Institute of Technology Key Laboratory of Network Oriented Intelligent Computation
The face recognition biometric technology, as one of the main applications, has been researched and improved by more and more people. In recent years, linear sparse representation being advantageous in improving the c... 详细信息
来源: 评论
Image Compression Algorithm Based On Automatic Extracted ROI
Image Compression Algorithm Based On Automatic Extracted ROI
收藏 引用
The 2014 10th International Conference on Natural Computation (ICNC 2014) and the 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2014)(第十届自然计算和第十一届模糊系统与知识发现国际会议)
作者: Peilong Zhao Jiwen Dong Lei Wang Department of Computer Science and Technology Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Jinan China
An region of interesting compression algorithm of still image is *** algorithm that is based on embedded block coding with optimized truncation(EBCOT)encodes the interested region of the *** to the character of image ... 详细信息
来源: 评论
Social evolutionary games
Social evolutionary games
收藏 引用
International Conference on Game Theory for networks, GameNets
作者: Jianye Yu Yuanzhuo Wang Xiao!ong Jin Xueqi Cheng CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing China
In this paper, we introduce a framework of social evolutionary games (SEG) for investigating the evolution of social networks. In a SEG, a coevolutionary mechanism is adopted by agents who aim to improve his short-ter... 详细信息
来源: 评论
Attribute-based encryption based access control scheme with constant-size ciphertext in cloud computing
收藏 引用
Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and technology Edition) 2014年 第3期44卷 788-794页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Zhang, Tao Liu, Xi-Meng School of Computer Science and Technology Xidian University Xi'an 710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China School of Telecommunications Engineering Xidian University Xi'an 710071 China
Based on Attribute-Based Encryption (ABE), a variety of access control schemes have been constructed in cloud computing. However, in these schemes, the ciphertext overhead goes linearly with the number of attributes u... 详细信息
来源: 评论
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & technology 2013年 第4期28卷 743-748页
作者: 葛爱军 黄欣沂 陈成 马传贵 张锐 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University Institute of Software Chinese Academy of Sciences
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... 详细信息
来源: 评论
A User-Based Document Management Mechanism in Cloud
A User-Based Document Management Mechanism in Cloud
收藏 引用
International Conference on Computational Intelligence and security
作者: Guozhen Shi Mang Su Fenghua Li Jiapeng Lou Qiong Huang Department of Information Security Beijing Electronic Science and Technology Institute Beijing China State Key Laboratory of Integrated Services Network Xidian University Xi'an Shaanxi China State Key Laboratory of Information Security Chinese Academy of Sciences Beijing China
The document plays an important role in the development of cloud computing. The user obtains and shares information by the electronic document. It is rich in content and various in representations. But the challenge t... 详细信息
来源: 评论
Output Feature Augmented Lasso
Output Feature Augmented Lasso
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Changqing Zhang Yahong Han Xiaojie Guo Xiaochun Cao School of Computer Science and Technology Tianjin University Tianjin Tianjin Key Laboratory of Cognitive Computing and Application Tianjin University Tianjin State Key Laboratory of Information Security Chinese Academy of Sciences Beijing
Lasso simultaneously conducts variable selection and supervised regression. In this paper, we extend Lasso to multiple output prediction, which belongs to the categories of structured learning. Though structured learn... 详细信息
来源: 评论
Adaptively secure key-policy ABE scheme with fast decryption
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 26-32页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng School of Computer Science and Technology Xidian University Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China Faculty of Software Fujian Normal University Fuzhou350108 China School of Telecommunication Engineering Xidian University Xi'an710071 China
In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc... 详细信息
来源: 评论
The cross-layer design of wireless mesh networks based on multimedia services
收藏 引用
Journal of Computational Information Systems 2013年 第11期9卷 4495-4504页
作者: Sun, Qindong Zhang, Benliang Yang, Min Wang, Qian Key Lab. for Network Computing and Security of Shaanxi Province Xi'an University of Technology Xi'an 710048 China
In this paper, we have introduced a cross-layer design model which is based on multimedia services in order to favor the QoS demand in wireless mesh networks. By means of this model the relevant parameters in each lay... 详细信息
来源: 评论
A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking
A Robust Collaborative Threshold Authenticated Encryption Sc...
收藏 引用
International Conference on Cyber-Enabled Distributed computing and Knowledge Discovery, CyberC
作者: Zhen Chen Wenfang Zhang Xiaomin Wang Key Laboratory of Information Security and National Computing Grid Southwest Jiaotong University Chengdu China School of Information Science and Technology Southwest Jiaotong University
In recent years, some collaborative threshold authenticated encryption schemes were put forward to ease the workloads of the individual signers. Unfortunately, the original scheme was found to have design flaws in its... 详细信息
来源: 评论