咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3181-3190 订阅
排序:
Steganographic codes by applying syndrome-trellis codes to dynamic distortion model in pixel chain
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2014年 第8期51卷 1739-1747页
作者: Bao, Zhenkun Zhang, Weiming Cheng, Sen Zhao, Xianfeng The Fourth Institute Information Engineering University Zhengzhou450002 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450002 China School of Information Science and Technology University of Science and Technology of China Hefei230026 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China State Key Laboratory of Information Security Instituteof Information Engineering Chinese Academy of Sciences Beijing100093 China
Double-layered STC (syndrome trellis code) is the most popular method for minimizing the distortion of ± 1 steganography. However, it is a probabilistic algorithm which may fail in the embedding process on some g... 详细信息
来源: 评论
An improved approach to the recovery of traceability links between requirement documents and source codes based on latent semantic indexing
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2013年 7971卷 547-557页
作者: Shao, Jianwei Wu, Wei Geng, Peng Zhejiang Topthinking Information Technology Co. Ltd Hangzhou China Zhejiang Provincial Key Laboratory of Network Technology and Information Security Hangzhou China
The traceability links among software artifacts plays a very important role for the maintenance of consistency in the evolution of software product lines. This paper introduces an improved approach to the recovery of ... 详细信息
来源: 评论
26th Annual Computational Neuroscience Meeting (CNS*2017): Part 3 Antwerp, Belgium. 15-20 July 2017 Abstracts
收藏 引用
BMC NEUROSCIENCE 2017年 第SUPPL 1期18卷 95-176页
作者: [Anonymous] Department of Neuroscience Yale University New Haven CT 06520 USA Department Physiology & Pharmacology SUNY Downstate Brooklyn NY 11203 USA NYU School of Engineering 6 MetroTech Center Brooklyn NY 11201 USA Departament de Matemàtica Aplicada Universitat Politècnica de Catalunya Barcelona 08028 Spain Institut de Neurobiologie de la Méditerrannée (INMED) INSERM UMR901 Aix-Marseille Univ Marseille France Center of Neural Science New York University New York NY USA Aix-Marseille Univ INSERM INS Inst Neurosci Syst Marseille France Laboratoire de Physique Théorique et Modélisation CNRS UMR 8089 Université de Cergy-Pontoise 95300 Cergy-Pontoise Cedex France Department of Mathematics and Computer Science ENSAT Abdelmalek Essaadi’s University Tangier Morocco Laboratory of Natural Computation Department of Information and Electrical Engineering and Applied Mathematics University of Salerno 84084 Fisciano SA Italy Department of Medicine University of Salerno 84083 Lancusi SA Italy Dipartimento di Fisica Università degli Studi Aldo Moro Bari and INFN Sezione Di Bari Italy Data Analysis Department Ghent University Ghent Belgium Coma Science Group University of Liège Liège Belgium Cruces Hospital and Ikerbasque Research Center Bilbao Spain BIOtech Department of Industrial Engineering University of Trento and IRCS-PAT FBK 38010 Trento Italy Department of Data Analysis Ghent University Ghent 9000 Belgium The Wellcome Trust Centre for Neuroimaging University College London London WC1N 3BG UK Department of Electronic Engineering NED University of Engineering and Technology Karachi Pakistan Blue Brain Project École Polytechnique Fédérale de Lausanne Lausanne Switzerland Departement of Mathematics Swansea University Swansea Wales UK Laboratory for Topology and Neuroscience at the Brain Mind Institute École polytechnique fédérale de Lausanne Lausanne Switzerland Institute of Mathematics University of Aberdeen Aberdeen Scotland UK Department of Integrativ
来源: 评论
A flow based method to detect penetration
A flow based method to detect penetration
收藏 引用
International Conference on Advanced Infocomm technology (ICAIT)
作者: Shangdong Liu Jian Gong Jianxin Chen Yanbing Peng Wang Yang Weiwei Zhang Ahmad Jakalan Key Laboratory of Computer Network Technology of Jiangsu Province Southeast University China Nanjing University of Posts and Telecommunications China Security Products Department Fiberhome Telecommunication Technologies Co. Ltd. China
With the rapid expansion of the Internet, network security has become more and more important. IDS (Intrusion Detection System) is an important technology coping network attacks and is of two main types: network based... 详细信息
来源: 评论
Action recognition of motion capture data
Action recognition of motion capture data
收藏 引用
Congress on Image and Signal Processing, CISP
作者: Na Lv Zhiquan Feng Lingqiang Ran Xiuyang Zhao Shandong Provincial Key Laboratory of Network based Intelligent Computing Jinan P.R. China Department of Information Science and Technology University of Jinan Jinan China School of Computer Science and Technology Shandong University Jinan China
With the advancement of motion capture technology, 3D skeleton data is easier to be obtained. 3D skeleton data has the advantage over traditional video data for the reason that it is less affected by illumination, com... 详细信息
来源: 评论
A Reliable Supervision Model and Implementation for the Trading of Digital Works
A Reliable Supervision Model and Implementation for the Trad...
收藏 引用
International Conference on Computational Intelligence and security
作者: Guozhen Shi Ying Shen Fenghua Li Mang Su Department of Information Security Beijing Electronic Science and Technology Institute Beijing China National Key Laboratory of Integrated Services Network Xidian University Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
Aim at the digital works are facing with difficult problems in counting, providers can not accurately gain the real and integrated trade data, this paper presents a reliable supervision model, which includes three par... 详细信息
来源: 评论
Research on Fault Diagnosis of Tennessee Eastman Process Based on KPCA and SVM
Research on Fault Diagnosis of Tennessee Eastman Process Bas...
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Ke Zhang Kun Qian Yi Chai Yi Li Jianhuan Liu State Key Laboratory of Power Transmission Equipment & System Security and New Technology College of Automation Chongqing University Chongqing P.R. China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education College of Automation Chongqing University Chongqing P.R. China
Based on principal component analysis (PCA) and support vector machine (SVM), a new method for the fault diagnosis of TE Process is proposed. The fault recognition based on kernel principal component analysis (KPCA) i... 详细信息
来源: 评论
Verifying a Carry Look-Ahead Adder with Propositional Projection Temporal Logic
收藏 引用
电子学报(英文版) 2013年 第1期22卷 21-24页
作者: ZHANG Nan DUAN Zhenhua TIAN Cong Institute of Computing Theory and Technology Xidian University Xi'an 710071 China National Key Laboratory on Integrated Services Network Xidian University Xi'an 710071 China
This paper presents a case study for veri- fying a carry look-ahead adder using the axiom system of Propositional projection temporal logic (PPTL). To this end, the syntax, semantics and axiom system of PPTL are brief... 详细信息
来源: 评论
25th Annual Computational Neuroscience Meeting CNS-2016, Seogwipo City, South Korea, July 2-7, 2016 Abstracts
收藏 引用
BMC NEUROSCIENCE 2016年 第1期17卷 1-112页
作者: [Anonymous] Computational Neurobiology Laboratory The Salk Institute for Biological Studies San Diego USA UNIC CNRS Gif sur Yvette France The European Institute for Theoretical Neuroscience (EITN) Paris France ATR Computational Neuroscience Laboratories Kyoto Japan Krembil Research Institute University Health Network Toronto Canada Department of Physiology University of Toronto Toronto Canada Department of Medicine (Neurology) University of Toronto Toronto Canada Department of Physics University of New Hampshire Durham USA Department of Neurophysiology Nencki Institute of Experimental Biology Warsaw Poland Department of Theory Wigner Research Centre for Physics of the Hungarian Academy of Sciences Budapest Hungary Department of Mathematical Sciences KAIST Daejoen Republic of Korea Department of Mathematics University of Houston Houston USA Department of Biochemistry & Cell Biology and Institute of Biosciences and Bioengineering Rice University Houston USA Department of Biology and Biochemistry University of Houston Houston USA Grupo de Neurocomputación Biológica Dpto. de Ingeniería Informática Escuela Politécnica Superior Universidad Autónoma de Madrid Madrid Spain Department of Biological Sciences University of Southern California Los Angeles USA Center for Neuroscience Korea Institute of Science and Technology Seoul South Korea Department of Neurology Albert Einstein College of Medicine Bronx USA Center for Neuroscience KIST Seoul South Korea Department of Neuroscience University of Science and Technology Daejon South Korea Systems Neuroscience Group QIMR Berghofer Medical Research Institute Herston Australia Department of Psychology Yonsei University Seoul South Korea Department of Psychiatry Kyung Hee University Hospital at Gangdong Seoul South Korea Department of Psychiatry Veterans Administration Boston Healthcare System and Harvard Medical School Brockton USA Department of Electrical and Electronic Engineering The University of Melbourne Parkvil
A1 Functional advantages of cell-type heterogeneity in neural circuits Tatyana O. Sharpee A2 Mesoscopic modeling of propagating waves in visual cortex Alain Destexhe A3 Dynamics and biomarkers of mental disorders Mits...
来源: 评论
DMAT: A new network and computer attack classification
收藏 引用
Journal of Engineering Science and technology Review 2013年 第5期6卷 101-106页
作者: Jiang, Wei Tian, Zhi-Hong Cui, Xiang College of Computer Science Beijing University of Technology Beijing 100124 China School of Computer National University of Defense Technology Changsha 410073 China Key Laboratory of Information and Network Security Ministry of Public Security Shanghai 201204 China School of Computer Science and Technology Harbin Institute of Technology Haerbin 150001 China The Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
With the rapid development of computer network and information technology, the Internet has been suffering from a variety of security attacks over the past few years. Attacks have become both numerous and complex, and... 详细信息
来源: 评论