咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3201-3210 订阅
排序:
Noisy component extraction with reference
收藏 引用
Frontiers of Computer Science 2013年 第1期7卷 135-144页
作者: Yongjian ZHAO Hong HE Jianxun Mi School of Information Engineering Shandong University Weihai 264209 China Bio-Computing Research Center Shenzhen Graduate School Harbin Institute of Technology Shenzhen 518055 China Key Laboratory of Network Oriented Intelligent Computation Shenzhen 518055 China
Blind source extraction (BSE) is particularly at- tractive to solve blind signal mixture problems where only a few source signals are desired. Many existing BSE methods do not take into account the existence of nois... 详细信息
来源: 评论
Cryptanalysis and improvement of a dynamic ID based remote user authentication scheme using smart cards
收藏 引用
Journal of Computational Information Systems 2013年 第14期9卷 5513-5520页
作者: Xu, Chengbo Jia, Zhongtian Wen, Fengtong Ma, Yan School of Mathematical Sciences University of Jinan Jinan 250022 China Institute of Network Technology Research Beijing University of Posts and Telecommunications Beijing 100876 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan 250022 China
Recently, Lee, Lai and Li proposed a dynamic identity based remote user authentication scheme using smart card to remedy the weaknesses of Lee-Lin-Chang's scheme. However, we find that Lee-Lai-Li's scheme is s... 详细信息
来源: 评论
GramFuzz: Fuzzing testing of web browsers based on grammar analysis and structural mutation
GramFuzz: Fuzzing testing of web browsers based on grammar a...
收藏 引用
2013 2nd International Conference on Informatics and Applications, ICIA 2013
作者: Guo, Tao Zhang, Puhan Wang, Xin Wei, Qiang China Information Technology Security Valuation Center Beijing China State Key Laboratory of Mathematical Engineerning and Advanced Computing Zhenzhou China
Fuzz testing is an automated black-box testing technique providing random data as input to a software system in the hope to find vulnerability. In order to be effective, the fuzzed input must be common enough to pass ... 详细信息
来源: 评论
A Watermarking Scheme based on NSCT Using Computer-Generated Hologram
A Watermarking Scheme based on NSCT Using Computer-Generated...
收藏 引用
International Conference on Information technology and Management Innovation (ICITMI2012)
作者: Yang, Xiaoyuan Yang, Haibin Luo, Peng Key Laboratory of Network and Information Security Chinese Armed Police Force Department of Electronic Technology Engineering University of Armed Police Force China Institute of Network and Information Security Chinese Armed Police Force Department of Electronic Technology Engineering University of Armed Police Force China
A robust watermarking scheme that used computer-generated holograms as the watermark is in NSCT (NonSampled Contourlet Transform) domain was proposed. To maintain imperceptibility and robustness, a repeated embedding ... 详细信息
来源: 评论
Visual saliency detection based on photographic composition  13
Visual saliency detection based on photographic composition
收藏 引用
5th International Conference on Internet Multimedia computing and Service, ICIMCS 2013
作者: Chen, Jingjing Zhao, Handong Han, Yahong Cao, Xiaochun School of Computer Science and Technology Tianjin University China State Key Laboratory of Information Security Chinese Academy of Sciences China Tianjin Key Laboratory of Cognitive Computing and Application China
Visual saliency detection and segmentation are widely used in many applications in image processing and computer vision. However, existing saliency detection methods have not fully taken the spatial information of sal... 详细信息
来源: 评论
The face tracking research based on cam-shift and improved NMI
The face tracking research based on cam-shift and improved N...
收藏 引用
2013 5th International Conference on Computational and Information Sciences, ICCIS 2013
作者: Dong, Jiwen Zhao, Lei Zhang, Liang Department of Computer Science and Technology Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan 250022 China
In order to take the complex background interference and real-time requirements into account, the experience apply NMI feature and Cam-Shift feature space on face tracking. By secondary search on the feature space of ... 详细信息
来源: 评论
Face recognition algorithm based on kernel collaborative representation
Face recognition algorithm based on kernel collaborative rep...
收藏 引用
3rd International Conference on Materials Science and Information technology, MSIT 2013
作者: Zhang, Liang Dong, Ji Wen Department of Computer Science and Technology Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Jinan 250022 China
Aiming at solving the problems of occlusion and illumination in face recognition, a new method of face recognition based on Kernel Principal Components Analysis (KPCA) and Collaborative Representation Classifier (CRC)... 详细信息
来源: 评论
An Image Steganography Based on Multi-Layered Syndrome-Trellis Codes in DWT Domain
An Image Steganography Based on Multi-Layered Syndrome-Trell...
收藏 引用
第三十二届中国控制会议
作者: YANG Xiaoyuan GUO Duntao LI Jun Key Laboratory of Network & Information Security under the Chinese Armed Police Force Electronic DepartmentEngineering College of the Armed Police Force Institute of Network & Information Security under the Chinese Armed Police Force Department of Electronic TechnologyEngineering University of Armed Police Force
A good method to improve the security of Steganography System is to embed messages by minimizing a sum of per-pixel distortions and the near-optimal codes for this minimization problem is the Syndrome-Trellis Codes(ST... 详细信息
来源: 评论
Visible light texture image classification using Gabor and LBP feature
收藏 引用
Journal of Computational Information Systems 2013年 第21期9卷 8415-8422页
作者: Zhu, Qi Wang, Yaowu Li, Chunshan Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of Technology Shenzhen Graduate School Shenzhen 518055 China Key Laboratory of Urban Planning and Decision-Making Simulation Harbin Institute of Technology Shenzhen Graduate School Shenzhen 518055 China E-Business and Intelligent Enterprise Computing Research Center Harbin Institute of Technology Shenzhen Graduate School Shenzhen 518055 China
LBP and Gabor wavelets are two widely used and successful local image representation methods. This paper presents the visible light texture image classification method simultaneously using Gabor and Local Binary Patte... 详细信息
来源: 评论
Time evolving graphical password for securing mobile devices  13
Time evolving graphical password for securing mobile devices
收藏 引用
8th ACM SIGSAC Symposium on Information, Computer and Communications security, ASIA CCS 2013
作者: Wang, Zhan Jing, Jiwu Li, Liang State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Increasingly widespread use of mobile devices for processing monetary transactions and accessing business secrets has created a great demand on securing mobile devices. Poorly designed authentication mechanisms (e.g.,... 详细信息
来源: 评论