咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3191-3200 订阅
排序:
Construction and correlation analysis of combiner functions with 1 bit memory
收藏 引用
Journal of Computational Information Systems 2013年 第2期9卷 521-528页
作者: Che, Xiaoliang Yang, Xiaoyuan Institute of Network and Information Security under the Chinese Armed Police Force Department of Electronic Technology Engineering University of Armed Police Force Xi'an 710086 China Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an 710086 China
In this paper, we construct a kind of combiner functions with high nonlinearity and correlation-immunity. This construction is based on the relationship between properties of the combiners with 1bit memory and the cry... 详细信息
来源: 评论
Improvements on bottleneck feature for large vocabulary continuous speech recognition
Improvements on bottleneck feature for large vocabulary cont...
收藏 引用
International Conference on Signal Processing Proceedings (ICSP)
作者: Maimaitiaili Tuerxun Shiliang Zhang Yebo Bao Lirong Dai The Key Laboratory for Network Information Security and Public Opinion Analysis Xinjiang Normal University Urumqi Xinjiang P. R. China National Engineering Laboratory for Speech and Language Information Processing University of Science and Technology of China Hefei Anhui P. R. China
In this paper, we have proposed three methods to improve the performance of the bottleneck(BN) feature based GMM-HMM system. Firstly, we recommend a new bottleneck feature architecture, namely LBN, which places the bo... 详细信息
来源: 评论
A mesh editing algorithm based on Gaussian curvature
收藏 引用
Journal of Information and Computational Science 2013年 第10期10卷 2881-2890页
作者: Wang, Feng Huang, Zhangjin Guo, Licai School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Key Laboratory of Software in Computing and Communication Hefei 230027 China USTC-SICT Joint Laboratory on Network and Communication Hefei 230027 China
Mesh editing plays an important role in the design of mesh models. The As-Rigid-As-Possible (ARAP) surface editing algorithm is likely to produce degenerated results in sharp regions. This degeneration affects the qua... 详细信息
来源: 评论
Towards accountable authority attribute-based encryption
收藏 引用
High technology Letters 2013年 第1期19卷 82-87页
作者: 王永涛 Chen Kefei Long Yu Department of Computer Science and Engineering Shanghai Jiao Tong University China Information Technology Security Evaluation Center Shanghai Key Laboratory of Scalable Computing and System Shanghai JiaoTong University
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It ... 详细信息
来源: 评论
Flickr group recommendation based on quaternary semantic analysis
收藏 引用
Journal of Computational Information Systems 2013年 第6期9卷 2235-2242页
作者: Wang, Xiaofang Ma, Jun Cui, Chaoran Gao, Shuai School of Computer Science and Technology Shandong University Jinan 250101 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan 250022 China
Flickr groups are self-organized user communities revolving around a common interest and of massive popularity. In recent years, the explosive growth in the number of the group makes it difficult for Flickr users to f... 详细信息
来源: 评论
Real-time detection and recognition of landmarks for mobile robot in indoor scenes
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous Engineering 2013年 第4期8卷 329-341页
作者: Xue, Yanbing Zhang, Hua Ju, Yucui Wang, Jin Key Laboratory of Computer Vision and System Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China
This paper proposes a robust real-time artificial landmarks detection and recognition system for indoor mobile robot. Landmarks detection and recognition for indoor robots faces two major difficulties, one is the illu... 详细信息
来源: 评论
Feedforward and feedback optimal vibration rejection for active suspension discrete-time systems under in-vehicle networks
Feedforward and feedback optimal vibration rejection for act...
收藏 引用
World Congress on Nature & Biologically Inspired computing (NaBIC)
作者: Shi-Yuan Han Yue-Hui Chen Kun Ma Dong Wang Ajith Abraham Zhong-Guang Liu Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China IT4Innovations VSB-Technical University of Ostrava Ostrava Czech Republic Machine Intelligence Research Labs (MIR Labs) Auburn Washington USA Vehicle Management Agency of Jinan Public Security Bureau Jinan China
This paper studies the vibration rejection problem of active suspension discrete-time systems under in-vehicle networks and designs a controller of feedforward and feedback optimal vibration rejection. Based on the gr... 详细信息
来源: 评论
A systematic approach to capturing and analysing botnets
收藏 引用
Information technology Journal 2013年 第23期12卷 7152-7159页
作者: Wei, Jiang Tian, Zhihong College of Computer Science Beijing University of Technology Beijing 100124 China School of Computer National University of Defense Technology Changsha 410073 China Key Laboratory of Information and Network Security Ministry of Public Security Shanghai 201204 China School of Computer Science and Technology Harbin Institute of Technology Haerbin 150001 China
In this study, a systematic approach to Capturing and Analysing botnets is presented. Our framework is a scalable and robust infrastructure and consists of four modules. Honeynet-based capture system is proposed that ... 详细信息
来源: 评论
Optimal Feature Selection for Robust Classification via l2,1-Norms Regularization
Optimal Feature Selection for Robust Classification via l2,1...
收藏 引用
International Conference on Pattern Recognition
作者: Jiajun Wen Zhihui Lai Wai Keung Wong Jinrong Cui Minghua Wan Bio-Computing Research Center Harbin Institute of Technology Shenzhen Graduate School 518055 China ITC The Hong Kong Polytechnic University Hong Kong Key Laboratory of Network Oriented Intelligent Computation Shenzhen China SIE Nanchang Hangkong University Nanchang China
This paper aims to explore the optimal feature selection with dimensionality reduction and jointly sparse representation scheme for classification. The proposed method is called Optimal Feature Selection Classificatio... 详细信息
来源: 评论
A Steganalysis based on OC-SVM and two Clustering Methods
A Steganalysis based on OC-SVM and two Clustering Methods
收藏 引用
International Conference on Information technology and Management Innovation (ICITMI2012)
作者: Yang, Haibin Guo, Duntao Luo, Peng Key Laboratory of Network and Information Security Chinese Armed Police Force Department of Electronic Technology Engineering University of Armed Police Force China
In this paper, a novel and efficient steganalysis based on improved K-means clustering using One-Class Support Vector Machine (OC-SVM) was proposed to blindly determine the existence of hidden messages in an image. Th... 详细信息
来源: 评论