咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3211-3220 订阅
排序:
A competitive sample selection method for palmprint recognition
A competitive sample selection method for palmprint recognit...
收藏 引用
3rd Sino-Foreign-Interchange Workshop on Intelligent Science and Intelligent Data Engineering, IScIDE 2012
作者: Wen, Jiajun Cui, Jinrong Lai, Zhihui Mi, Jianxun Bio-Computing Research Center Shenzhen Graduate School Harbin Institute of Technology Shenzhen China Key Laboratory of Network Oriented Intelligent Computation Shenzhen China
In the field of palmprint recognition, traditional classification methods such as PCA and LDA only exploit training samples to build the model of classifiers while ignoring the feedback of test sample during the proce... 详细信息
来源: 评论
Multifractal analyses of daily rainfall time series in Pearl River basin of China
收藏 引用
Physica A: Statistical Mechanics and its Applications 2014年 405卷 193-202页
作者: Zu-Guo Yu Yee Leung Yongqin David Chen Qiang Zhang Vo Anh Yu Zhou Hunan Key Laboratory for Computation and Simulation in Science and Engineering Xiangtan University Xiangtan Hunan 411105 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China School of Mathematical Sciences Queensland University of Technology GPO Box 2434 Brisbane Q4001 Australia Department of Geography and Resource Management The Chinese University of Hong Kong Hong Kong China Institute of Environment Energy and Sustainability The Chinese University of Hong Kong Hong Kong China Department of Water Resources and Environment Sun Yat-sen University Guangzhou 510275 China Key Laboratory of Water Cycle and Water Security in Southern China of Guangdong High Education Institute Sun Yat-sen University Guangzhou 510275 China
The multifractal properties of daily rainfall time series at the stations in Pearl River basin of China over periods of up to 45 years are examined using the universal multifractal approach based on the multiplicative... 详细信息
来源: 评论
Robust tensor clustering with non-greedy maximization
Robust tensor clustering with non-greedy maximization
收藏 引用
23rd International Joint Conference on Artificial Intelligence, IJCAI 2013
作者: Cao, Xiaochun Wei, Xingxing Han, Yahong Yang, Yi Lin, Dongdai Tianjin Key Laboratory of Cognitive Computing and Application School of Computer Science and Technology Tianjin University China School of Information Technology and Electrical Engineering University of Queensland Australia State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China
Tensors are increasingly common in several areas such as data mining, computer graphics, and computer vision. Tensor clustering is a fundamental tool for data analysis and pattern discovery. However, there usually exi... 详细信息
来源: 评论
A hybrid model for grammatical error correction  17
A hybrid model for grammatical error correction
收藏 引用
17th Conference on Computational Natural Language Learning: Shared Task, CoNLL 2013
作者: Xiang, Yang Yuan, Bo Zhang, Yaoyun Wang, Xiaolong Zheng, Wen Wei, Chongqiang Intelligent Computing Research Center Key Laboratory of Network Oriented Intelligent Computation Computer Science and technology Department Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong518055 China
This paper presents a hybrid model for the CoNLL-2013 shared task which focuses on the problem of grammatical error correction. This year’s task includes determiner, preposition, noun number, verb form, and subject-v... 详细信息
来源: 评论
An Event-Driven Service-Oriented Architecture for the Internet of Things
An Event-Driven Service-Oriented Architecture for the Intern...
收藏 引用
IEEE Asia-Pacific Conference on Services computing (APSCC)
作者: Lina Lan Fei Li Bai Wang Lei Zhang Ruisheng Shi School of Network Education Beijing University of Posts and Telecommunications Beijing China Information Systems Institute Vienna University of Technology Vienna Austria Beijing University of Posts and Telecommunications Beijing Beijing CN School of Computer Beijing University of Posts and Telecommunications Beijing China Education Ministry Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
IoT (Internet of Things) bridges the physical world and information space. IoT services are environment sensitive and event-driven. The new IoT service architecture should adapt to these features. This paper analyses ... 详细信息
来源: 评论
Object coding on the semantic graph for scene classification  13
Object coding on the semantic graph for scene classification
收藏 引用
21st ACM International Conference on Multimedia, MM 2013
作者: Chen, Jingjing Han, Yahong Cao, Xiaochun Tian, Qi School of Computer Science and Technology Tianjin University China State Key Laboratory of Information Security Chinese Academy of Sciences China Tianjin Key Laboratory of Cognitive Computing and Application China Department of Computer Science University of Texas at San Antonio United States
In the scene classification, a scene can be considered as a set of object cliques. Objects inside each clique have semantic correlations with each other, while two objects from different cliques are relatively indepen... 详细信息
来源: 评论
Embedding change rate estimation based on ensemble learning  13
Embedding change rate estimation based on ensemble learning
收藏 引用
1st ACM Workshop on Information Hiding and Multimedia security, IH and MMSec 2013
作者: Li, Zhenyu Hu, Zongyun Luo, Xiangyang Lu, Bin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China Zhengzhou Institute of Information Science and Technology Zhengzhou 450002 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China
In order to achieve higher estimation accuracy of the embedding change rate of a stego object, an ensemble learning-based estimation method is presented. First of all, a framework of embedding change rate estimation b... 详细信息
来源: 评论
Steganalysis of F5-like steganography based on selection of joint distribution features  13
Steganalysis of F5-like steganography based on selection of ...
收藏 引用
5th International Conference on Internet Multimedia computing and Service, ICIMCS 2013
作者: Liu, Yuan Luo, Xiangyang Lu, Jicang Gong, Daofu Zhengzhou Information Science and Technology Institute Zhengzhou 450001 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
For steganalysis of F5-like steganography with two types of widely used joint distribution statistical features: co-occurrence matrix and Markov transition probability matrix, a feature selection and fusion method bas... 详细信息
来源: 评论
A model of three points for location estimation in wireless sensor networks
收藏 引用
2013 2nd International Symposium on Materials Science and Engineering technology, ISMSET 2013
作者: Xie, Shao Guo Hu, Yan Jun Wang, Yi Jiang, Fang Liu, Jing Jing Wang, Ying Guan Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education AnHui University Hefei China Key Laboratory of Wireless Sensor Network and Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences 865 Changning Road Shanghai 200050 China
In this paper, we propose a novel model of three points named TP for location estimation in wireless sensor networks (WSNs) with random deployment of anchor nodes. In this model, we select three anchor nodes which hav... 详细信息
来源: 评论
Research on the degeneration problem of key sequence based on chaos
Research on the degeneration problem of key sequence based o...
收藏 引用
5th IEEE International Conference on Intelligent networking and Collaborative Systems, INCoS 2013
作者: Wang, Jing-Jing Wei, Ping Chen, Jia-Yong Key Laboratory of Network and Information Security of APF Department of Electronic Technology Engineering University of APF Xi'an 710086 China Laboratory-Center of Computer Department of Information Engineering Engineering University of APF Xi'an 710086 China Laboratory of Information and Network of APF Department of Information Engineering Engineering University of APF Xi'an 710086 China
In view of the degeneration problem of chaos characteristics of the secret-key sequences, a new key sequence generation system was designed, combining chaos and cryptography. The simulation results shows that, not onl... 详细信息
来源: 评论