咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3171-3180 订阅
排序:
Corrigendum to “Fast and scalable lock methods for video coding on many-core architecture” [J. Vis. Commun. Image R. 25(7) (2014) 1758–1762]
收藏 引用
Journal of Visual Communication and Image Representation 2015年 27卷 57-57页
作者: Weizhi Xu Hui Yu Dianjie Lu Fenglong Song Da Wang Xiaochun Ye Songwei Pei Dongrui Fan Hongtao Xie Institute of Microelectronics Tsinghua University Beijing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Information Science and Engineering Shandong Normal University Jinan China Department of Computer Science and Technology Beijing University of Chemical Technology Beijing China Institute of Information Engineering Chinese Academy of Sciences National Engineering Laboratory for Information Security Technologies Beijing China
来源: 评论
Corrigendum to “Fast and scalable lock methods for video coding on many-core architecture” [J. Vis. Commun. 25 (7) (2014) 1758–1762]
收藏 引用
Journal of Visual Communication and Image Representation 2015年 26卷 350-350页
作者: Weizhi Xu Hui Yu Dianjie Lu Fenglong Song Da Wang Xiaochun Ye Songwei Pei Dongrui Fan Hongtao Xie Institute of Microelectronics Tsinghua University Beijing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Information Science and Engineering Shandong Normal University Jinan China Department of Computer Science and Technology Beijing University of Chemical Technology Beijing China Institute of Information Engineering Chinese Academy of Sciences National Engineering Laboratory for Information Security Technologies Beijing China
来源: 评论
Parallel execution of data-intensive web services based on data-flow constructs and I/O operation ratio
International Journal of Database Theory and Application
收藏 引用
International Journal of Database Theory and Application 2014年 第4期7卷 129-138页
作者: Yu, Dongjin Zhu, Qi Shao, Jianhua Li, Chang Yuan, Youwei Li, Wanqing School of Computer Hangzhou Dianzi University Hangzhou China Zhejiang Topcheer Information Technology Co. Ltd Hangzhou China Zhejiang Provincial Key Laboratory of Network Technology and Information Security China
Data-intensive applications, such as data mining and data visualization, need to deal with huge amount of data. Service-oriented architecture, on the other hand, offers a scalable and flexible framework to implement l... 详细信息
来源: 评论
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
收藏 引用
Communications in Theoretical Physics 2013年 第5期59卷 547-553页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security (Institute of Information Engineering Chinese Academy of Sciences)
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... 详细信息
来源: 评论
High-efficiency quantum steganography based on the tensor product of Bell states
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2013年 第9期56卷 1745-1754页
作者: XU ShuJiang CHEN XiuBo NIU XinXin YANG YiXian Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first pa... 详细信息
来源: 评论
Android Malware Detection with Contrasting Permission Patterns
收藏 引用
China Communications 2014年 第8期11卷 1-14页
作者: XIONG Ping WANG Xiaofeng NIU Wenjia ZHU Tianqing LI Gang School of Information and Security Engineering Zhongnan University of Economics and Law Wuhan 430073 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Institute of Information Engineering Technology Chinese Academy of Sciences Beijing 100093 China School of Information Technology Deakin University Melbourne VIC 3125 Australia Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin 541004 China
As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research *** works have demonstrated that required permissions of Android applications are valuable fo... 详细信息
来源: 评论
A Flow Based Method to Detect Penetration
A Flow Based Method to Detect Penetration
收藏 引用
The 7th IEEE/International Conference on Advanced Infocomm technology
作者: Shangdong Liu Jian Gong Jianxin Chen Yanbing Peng Wang Yang Weiwei Zhang Ahmad Jakalan Key Laboratory of Computer Network Technology of Jiangsu Province Southeast University Nanjing University of Posts and Telecommunications Security Products Department Fiberhome Telecommunication Technologies Co.Ltd.
With the rapid expansion of the Internet,network security has become more and more ***(Intrusion Detection System)is an important technology coping network attacks and is of two main types:network based(NIDS)and host ... 详细信息
来源: 评论
Virus spreading in wireless sensor networks with a medium access control mechanism
收藏 引用
Chinese Physics B 2013年 第4期22卷 70-74页
作者: 王亚奇 杨晓元 Network and Information Security Key Laboratory of Armed Police Force Department of Electronics Technology Engineering University of the Chinese People's Armed Police Force
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a... 详细信息
来源: 评论
Improved OMP selecting sparse representation used with face recognition
Improved OMP selecting sparse representation used with face ...
收藏 引用
IEEE International Conference on Software Engineering and Service Sciences (ICSESS)
作者: Jian Zhang Ke Yan Zhenyu He Bio-computing Research Center Harbin Institute of Technology Shenzhen P.R. China Key Laboratory of Network Oriented Intelligent Computation Shenzhen P.R. China
With the worldwide strengthening of anti-terrorism and other identity verification, the products based on face recognition are used in real life more and more. The recognition as an important ways has become the focus... 详细信息
来源: 评论
Account matching across heterogeneous networks
Account matching across heterogeneous networks
收藏 引用
International Conference on Game Theory for networks, GameNets
作者: Qiang Liu Jingyuan Li Yuanzhuo Wang Guoliang Xing Yan Ren University of Chinese Academy of Sciences Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Due to the development of web services, many social network sites, as well as online shopping sites have been booming in the past decade, where it is a common phenomenon that people are likely to use multiple services... 详细信息
来源: 评论