咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3251-3260 订阅
排序:
Design of distribution transformer monitoring system based on LPC2103
收藏 引用
Journal of Convergence Information technology 2012年 第21期7卷 120-126页
作者: Sun, Qindong Wang, Qian Wang, Nan Network Computing and Security Key Lab of Shaanxi Xi'an University of Technology Xi'an 710048 China
Aimed at satisfying the monitoring requirement of distribution transformer, a kind of distribution transformer monitoring system based on LPC2103 is designed. Hardware module and data processing program of the monitor... 详细信息
来源: 评论
Predicting cement compressive strength using double-layer multi-expression programming
Predicting cement compressive strength using double-layer mu...
收藏 引用
4th International Conference on Computational and Information Sciences, ICCIS 2012
作者: Zhang, Qingke Yang, Bo Wang, Lin Zhu, Fuxiang Shandong Province Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China Computer Networks and Distributed Systems Laboratory Beijing Institute Technology Beijing China
This paper presents a novel algorithm named Double-layer Multi-expression Programming (DMEP). Then DMEP model is applied to the prediction of 28-day Portland cement compressive strength. We compare DMEP model with oth... 详细信息
来源: 评论
An efficient mutation-based fuzz testing approach for detecting flaws of network protocol
An efficient mutation-based fuzz testing approach for detect...
收藏 引用
2012 International Conference on Computer Science and Service System, CSSS 2012
作者: Zhang, Zhao Wen, Qiao-Yan Tang, Wen State Key Laboratory of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China IT Security Cooperate Technology Siemens Ltd. China Beijing 100102 China
security flaws existed in protocol implementations might be exploited by malicious attackers and the consequences can be very serious. Therefore, detecting vulnerabilities of network protocol implementations is becomi... 详细信息
来源: 评论
Annihilators of fast discrete fourier spectra attacks
Annihilators of fast discrete fourier spectra attacks
收藏 引用
7th International Workshop on security, IWSEC 2012
作者: Wang, Jingjing Chen, Kefei Zhu, Shixiong Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China Science and Technology on Communication Security Laboratory Chengdu China
Spectra attacks proposed recently are more data efficient than algebraic attacks against stream cipher. They are also time-and-space efficient. A measurement of the security of a stream cipher against spectra attacks ... 详细信息
来源: 评论
Concurrent access control using subcarrier signature in heterogeneous MIMO-based WLAN
Concurrent access control using subcarrier signature in hete...
收藏 引用
5th International Workshop on Multiple Access Communications, MACOM 2012
作者: Shen, Hu Lv, Shaohe Sun, Yanqiang Dong, Xuan Wang, Xiaodong Zhou, Xingming National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China Institute of Network Information and Security National University of Defense Technology Changsha 410073 China
In recent WLAN standards (such as IEEE 802.11n), MIMO (Multiple Input Multiple Output) is deployed to provide high data transmission rate. It is however challenging to efficiently share the channel resources among dif... 详细信息
来源: 评论
Stochastic prefix-based fault tolerant source routing algorithm for network on chip
Stochastic prefix-based fault tolerant source routing algori...
收藏 引用
2012 International Conference on Computer and Information Science, ICCIS 2012 - A Conference of World Engineering, Science and technology Congress, ESTCON 2012
作者: Xu, Gengchun Ren, Kaixin Gu, Naijie Anhui Province Key Laboratory of Computing and Communication Software Hefei China USTC-SICT Joint Laboratory on Network and Communication Hefei China School of Computer Science and Technology University of Science and Technology of China Hefei China
In this paper, a novel fault-tolerant source routing algorithm for network on Chip (NOC) called Stochastic Prefix-based Source Routing (SPSR) is proposed. Compared to non-source routing algorithms, it releases the int... 详细信息
来源: 评论
An evaluation model of botnet based on peer to peer  4th
An evaluation model of botnet based on peer to peer
收藏 引用
4th International Conference on Computational Intelligence and Communication networks, CICN 2012
作者: Jian, Gao Zheng, Kangfeng Yang, Yixian Niu, Xinxin Chinese People's Public Security University BeiJing China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications BeiJing China
We propose a evaluation model of botnet based on peer to peer. We propose key metrics to measure their activities(e.g, Stealthy, Effectiveness, Efficiency and Robustness). Using these performance metrics, we can study... 详细信息
来源: 评论
Accountable authority key policy attribute-based encryption
收藏 引用
Science China(Information Sciences) 2012年 第7期55卷 1631-1638页
作者: WANG YongTao 1,2 ,CHEN KeFei 1,3 ,LONG Yu 1,4 & LIU ZhaoHui 2 1 Department of Computer Science and Engineering,Shanghai Jiao Tong University,Shanghai 200240,China 2 China Information technology security Evaluation Center,Beijing 100085,China 3 Shanghai key laboratory of Scalable computing and Systems,Shanghai Jiao Tong University,Shanghai,200240,China 4 State key laboratory of Information security,Graduate School of Chinese Academy of Sciences,100039,China 1. Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China2. China Information Technology Security Evaluation Center Beijing 100085 China3. Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai 200240 China4. State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing 100039 China
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable aut... 详细信息
来源: 评论
A mixed deterministic model for coreference resolution
A mixed deterministic model for coreference resolution
收藏 引用
2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, EMNLP-CoNLL 2012 - Shared Task: Modeling Multilingual Unrestricted Coreference in OntoNotes
作者: Yuan, Bo Chen, Qingcai Xiang, Yang Wang, Xiaolong Ge, Liping Liu, Zengjian Liao, Meng Si, Xianbo Intelligent Computing Research Center Key Laboratory of Network Oriented Intelligent Computation Computer Science and Technology Department Harbin Institute of Technology Shenzhen Graduate School Guangdong Shenzhen518055 China
This paper presents a mixed deterministic model for coreference resolution in the CoNLL-2012 shared task. We separate the two main stages of our model, mention detection and coreference resolution, into several sub-ta... 详细信息
来源: 评论
Explore Chinese Encyclopedic Knowledge to Disambiguate Person Names  2
Explore Chinese Encyclopedic Knowledge to Disambiguate Perso...
收藏 引用
2nd CIPS-SIGHAN Joint Conference on Chinese Language Processing, CLP 2012
作者: Liu, Jie Xu, Ruifeng Lu, Qin Xu, Jian Key Laboratory of Network Oriented Intelligent Computation Shenzhen Graduate School Harbin Institute of Technology China Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
This paper presents the HITSZ-PolyU system in the CIPS-SIGHAN bakeoff 2012 Task 3, Chinese Personal Name Disambiguation. This system leveraged the Chinese encyclopedia Baidu Baike (Baike) as the external knowledge to ... 详细信息
来源: 评论