咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3231-3240 订阅
排序:
A secret enriched visual cryptography
A secret enriched visual cryptography
收藏 引用
11th International Workshop on Digital Forensics and Watermaking, IWDW 2012
作者: Liu, Feng Yan, Wei Q. Li, Peng Wu, Chuankun State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China School of Computing and Mathematical Sciences Auckland University of Technology 1142 New Zealand Department of Mathematics and Physics North China Electric Power University Baoding Hebei 071003 China
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that are able to... 详细信息
来源: 评论
A Model of Three Points for Location Estimation in Wireless Sensor networks
A Model of Three Points for Location Estimation in Wireless ...
收藏 引用
2013 2nd International Symposium on Materials Science and Engineering technology(ISMSET 2013)
作者: Shaoguo Xie Yanjun Hu Yi Wang Fang Jiang Jingjing Liu Yingguan Wang Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education An Hui University Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences
In this paper, we propose a novel model of three points named TP for location estimation in wireless sensor networks(WSNs) with random deployment of anchor nodes. In this model, we select three anchor nodes which have... 详细信息
来源: 评论
A regression test case generation method guided with branch probability
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and technology) 2013年 第SUPPL.2期44卷 317-322页
作者: Yu, Lechen Wang, Haijun Zheng, Qinghua Liu, Ting Huang, Xiaolong Yang, Zijiang Wei, Wei MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an 710049 China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an 710049 China School of Computer Science and Engineering Xi'an University of Technology Xi'an 710049 China
A novel method was proposed to generate regression test cases guided by the branch possibility (GBP). The symbolic execution was applied to search the paths of the program and generate control dependence graph of the ... 详细信息
来源: 评论
A heterogeneous-aware cooperative MIMO transmission scheme in WSN
Journal of Software
收藏 引用
Journal of Software 2013年 第3期8卷 639-644页
作者: Pei, Tingrui Xie, Da Li, Zhetao Tu, Dengbiao Choi, Youngjune College of Information Engineering Xiangtan University Xiangtan 411105 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan 411105 China School of Computer National University of Defense Technology Changsha 410073 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China Department of Information and Computer Engineering Ajou University Suwon 443749 Korea Republic of
A heterogeneous-aware cooperative MIMO transmission scheme (HAMS) is proposed to optimize the network lifetime and save energy for energy heterogeneous wireless sensor networks (WSN). This scheme extends the tradition... 详细信息
来源: 评论
An in-depth measurement and analysis of popular private tracker systems in China
An in-depth measurement and analysis of popular private trac...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Qiang Li Tao Qin Xiaohong Guan Qinghua Zheng Qiuzhen Huang Department of Automation Tsinghua National Laboratory for Information Science and Technology Beijing China Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China
In recent years, a novel BitTorrent (BT) technology, Private Tracker (PT), has received extensive attentions in academia. Due to its huge amount of traffic volumes and population, it is essential to understand the cha... 详细信息
来源: 评论
Software survivability evaluation method based on software calling structure
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and technology) 2013年 第SUPPL.1期44卷 443-448页
作者: Hou, Yuqiao Qu, Yu Liu, Linfeng Zheng, Qinghua Liu, Ting Zheng, Chao Yang, Zijiang Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi'an Jiaotong University Xi'an 710049 China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an 710049 China School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China
A new method was proposed to evaluate the survivability of the software system based on the calling structure of the software. Firstly, the interactions among the components of the software were obtained using the sta... 详细信息
来源: 评论
Compressed sensing based on best wavelet packet basis for image processing
收藏 引用
Journal of Computers (Finland) 2013年 第8期8卷 1947-1950页
作者: Li, Zhe Tao Xie, Jing Xiong Yu, Zu Guo Tu, Deng Biao Choi, Young June The College of Information Engineering Xiangtan University Hunan 411105 China School of Computer National University of Defense Technology Hunan 410073 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China School of Mathematics and Computational Science Xiangtan University Hunan 411105 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China Department of Information and Computer Engineering Ajou University Suwon 443749 Korea Republic of
In this paper, an algorithm named best wavelet packet tree decomposition (BWPTD) is proposed for image compression. In order to obtain better sparse representation of image, best wavelet packet basis is introduced to ... 详细信息
来源: 评论
Performance Comparison on network-Wide Time Synchronization Approaches in Wireless Sensor networks
Performance Comparison on Network-Wide Time Synchronization ...
收藏 引用
2013 IEEE International Conference on Microwave technology & Computational Electromagnetics
作者: Rong Fan Wenlong Xu LiLi Wu Li Han School of Information and Electronics Beijing Institute of Technology Shaanxi Key Laboratory of Network and System Security Xidian university
Wireless sensor networks(WSNs) have received a lot of attention recently due to their enormous potential in different *** in all distributed systems,time synchronization is very important in a sensor network since the... 详细信息
来源: 评论
A Generic Construction of Proxy Signatures from Certificateless Signatures
A Generic Construction of Proxy Signatures from Certificatel...
收藏 引用
International Conference on Advanced Information networking and Applications (AINA)
作者: Lei Zhang Qianhong Wu Bo Qin Josep Domingo-Ferrer Peng Zeng Jianwei Liu Ruiying Du Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Tarragona Spain Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University China Department of Maths School of Science Xi'an University of Technology China School of Electronic and Information Engineering Beijing University of Aeronautics and Astronautics China
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where ... 详细信息
来源: 评论
Temperature Uniformity of Wafer on a Large-Sized Susceptor for a Nitride Vertical MOCVD Reactor
收藏 引用
Chinese Physics Letters 2012年 第3期29卷 52-55页
作者: LI Zhi-Ming JIANG Hai-Ying HAN Yan-Bin LI Jin-Ping YIN Jian-Qin ZHANG Jin-Cheng Shandong Provincial Key Laboratory of Network-Based Intelligent Computing School of Information Science and EngineeringUniversity of Ji’nanJi’nan 250022 Key Laboratory of Fundamental Science for National on Wide Band-Gap Semiconductor Technology School of MicroelectronicsXidian UniversityXi’an 710071
The effect of coil location on wafer temperature is analyzed in a vertical MOCVD reactor by induction *** is observed that the temperature distribution in the wafer with the coils under the graphite susceptor is more ... 详细信息
来源: 评论