咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3161-3170 订阅
排序:
Multi-user access control scheme based on resources hierarchies for perceptual layer of IoT
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2014年 第1期42卷 28-35页
作者: Ma, Jun Guo, Yuan-Bo Ma, Jian-Feng Liu, Xi-Meng Li, Qi School of Computer Science and Technology Xidian University Xi'an Shaanxi 710071 China PLA Information Engineering University Zhengzhou Henan 450004 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an Shaanxi 710071 China
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, ... 详细信息
来源: 评论
MF-PDP: Multi-function provable data possession scheme in cloud computing
MF-PDP: Multi-function provable data possession scheme in cl...
收藏 引用
IEEE International Conference on Cloud computing and Intelligence Systems (CCIS)
作者: Xiaojun Yu Qiaoyan Wen State key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing China Beijing Topsec Network Security Technology Co. Ltd. Beijing China
This paper proposed a multi-function provable data possession (MF-PDP), which supports public verification, data dynamic, unlimited times verification and sampling verification. The detail design is provided and the t... 详细信息
来源: 评论
An adaptively secure multi-authority ciphertext-policy ABE scheme on prime order groups
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2014年 第4期42卷 696-702页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng Ma, Jun School of Computer Science and Technology Xidian University Xi'an Shaanxi 710071 China School of Telecommunication Engineering Xidian University Xi'an Shaanxi 710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an Shaanxi 710071 China
Previous adaptively secure multi-authority attribute-based encryption (ABE) schemes suffered from superfluous computation overhead on composite order groups. To tackle this problem, an adaptively secure multi-authorit... 详细信息
来源: 评论
How does four-dimensional CT spare normal tissues in non-small cell lung cancer radiotherapy by defining internal target volume?
How does four-dimensional CT spare normal tissues in non-sma...
收藏 引用
第八届中国肿瘤学术大会暨第十三届海峡两岸肿瘤学术会议
作者: Tong Bai Jian Zhu Yong Yin Jie Lu Huazhong Shu Lin Wang Bo Yang Department of Radiation Physics Shandong Cancer Hospital and Institute Laboratory of Image Science and Technology Southeast University Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan
Purpose To investigate how does the four-dimensional CT(4DCT)technique spare normal tissues in non-small cell lung cancer(NSCLC)radiotherapy by defining individualized internal target volume(ITV).Methods GTV and CTV w... 详细信息
来源: 评论
Implementation and test of human-operated and human-like adaptive impedance controls on Baxter robot
Implementation and test of human-operated and human-like ada...
收藏 引用
15th Annual Conference on Advances in Autonomous Robotics Systems, TAROS 2014
作者: Liang, Peidong Yang, Chenguang Wang, Ning Li, Zhijun Li, Ruifeng Burdet, Etienne Centre for Robotics and Neural Systems School of Computing and Mathematics Plymouth University United Kingdom MOE Key Lab. of Autonomous System and Network Control College of Automation Science and Engineering South China University of Technology China State Key Laboratory of Robotics and System Harbin Institute of Technology China Department of Computer Science and Engineering Chinese University of Hong Kong Hong Kong Department of Bioengineering Imperial College of Science Technology and Medicine London United Kingdom
This paper presents an improved method to teleoperate impedance of a robot based on surface electromyography (EMG) and test it experimentally. Based on a linear mapping between EMG amplitude and stiffness, an incremen... 详细信息
来源: 评论
Package of the vector math library based on the sunway processor
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2014年 25卷 70-79页
作者: Xie, Qing-Chun Zhang, Yun-Quan Li, Yan Pang, Ren-Bo Wu, Zai-Long Lu, Yong-Quan Gao, Peng-Dong High Performance Computing Center Communication University of China Beijing100024 China Laboratory of Parallel Computing Institute of Software The Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Computer Architecture Institute of Computing Technology The Chinese Academy of Sciences Beijing100190 China Department of Computer and Network National Marine Environmental Forecasting Center Beijing100081 China School of Information Sceience and Technology The Ocean University of China Qingdao266100 China
This paper first introduces the SIMD (single instruction multiple data) extension technology and presents three ways to use SIMD instructions. It is considered that calling the third party library, which is optimized ... 详细信息
来源: 评论
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
收藏 引用
Chinese Physics B 2013年 第6期22卷 199-202页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security (Institute of Information EngineeringChinese Academy of Sciences)
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography... 详细信息
来源: 评论
Detecting Compromised VM via Application-Aware Anomaly Detection
Detecting Compromised VM via Application-Aware Anomaly Detec...
收藏 引用
International Conference on Computational Intelligence and security
作者: Kai Luo Shouzhong Tu Chunhe Xia Dan Zhou Beijing Key Laboratory of Network Technology Beihang University Beijing China Beijing Institute of Electronic Technology & Application Beijing China The Institute of Computing Technology University of the Chinese Academy of Sciences Beijing China
Nowadays, the Infrastructure as a Service (IaaS) cloud has become the new target of attackers and the security of virtual machine (VM) in cloud is attracting more and more attention. In this paper, we propose to use v... 详细信息
来源: 评论
Approach to keyword search over encrypted data in cloud
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 147-153页
作者: Zhang, Peng Li, Yan Lin, Hai-Lun Yang, Rong Liu, Qing-Yun Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China National Engineering Laboratory for Information Security Technologies Beijing100093 China National Computer Network Emergency Response and Coordination Center Beijing100029 China Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China
With the advent of cloud computing, large-scale data are being increasingly outsourced to the cloud. For the protection of data privacy, sensitive data has to be encrypted before outsourcing, which makes effective dat... 详细信息
来源: 评论
A random walk evolution model of wireless sensor networks and virus spreading
收藏 引用
Chinese Physics B 2013年 第1期22卷 154-160页
作者: 王亚奇 杨晓元 Network and Information Security Key Laboratory of the Armed Police Force Department of Electronics Technology Engineering University of the Chinese People's Armed Police Force
In this paper, considering both cluster heads and sensor nodes, we propose a novel evolving a network model based on a random walk to study the fault tolerance decrease of wireless sensor networks (WSNs) due to node... 详细信息
来源: 评论