咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3271-3280 订阅
排序:
Hiding Information in MPEG Sequences by Using of B-Frames
收藏 引用
Wuhan University Journal of Natural Sciences 2012年 第3期17卷 238-242页
作者: ZHENG Peng WANG Weihua ZHAO Bo LIU Minzhong School of Computer Wuhan University Wuhan 430072 Hubei China The Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wtthan 430072 Hubei China School of Software Anyang Institute of Technology Anyang 455000 Henan China
In this paper,in order to increase the amount of hiding information,we choose MPEG sequences as carriers and present a practical method focus on the steganographic method in MPEG compressed video ***,there are many B-... 详细信息
来源: 评论
Conflict-based belief revision operators in possibilistic logic  26
Conflict-based belief revision operators in possibilistic lo...
收藏 引用
26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference, AAAI-12 / IAAI-12
作者: Qi, Guilin Wang, Kewen Key Laboratory of Computer Network and Information Integration of State Education Ministry School of Computer Science and Engineering Southeast University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China School of Computing and Information Technology Griffith University Australia
In this paper, we investigate belief revision in possibilistic logic, which is a weighted logic proposed to deal with incomplete and uncertain information. Existing revision operators in possibilistic logic are restri... 详细信息
来源: 评论
Novel steganography using JPEG-compressed images
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第23期6卷 319-325页
作者: Dong, Xiuze Liu, Shu Zhang, Ru Niu, Xinxin Information Security Center Beijing University of Posts and Telecommunications China Beijing Electronic Science and Technology Institute China Key Laboratory of China Information Network Security Ministry of Public Security China
In this paper, a novel steganography based on joint photographic expert-group (JPEG) is proposed. The proposed method embeds two secret bits into each middle frequency coefficient using the least two-significant bits ... 详细信息
来源: 评论
Mining Protocol State Machines by Interactive Grammar Inference
Mining Protocol State Machines by Interactive Grammar Infere...
收藏 引用
第三届数字制造与自动化国际会议
作者: Zhao Zhang Qiao-Yan Wen Wen Tang State Key Laboratory of Network and Switching Technology Beijing University of Posts and Telecommunications IT Security Cooperate Technology Siemens Ltd
Protocol state machine is very essential in network security and implementation fields, however, improper management of software evolution, compounded by changing and imprecise requirements, along with "short tim... 详细信息
来源: 评论
An new anonymous authentication scheme for cloud computing
An new anonymous authentication scheme for cloud computing
收藏 引用
2012 7th International Conference on Computer Science and Education, ICCSE 2012
作者: Zhang, Zhi-Hua Li, Jian-Jun Jiang, Wei Zhao, Yong Gong, Bei China Tobacco Zhejiang Iidustrial Co. Ltd. Hangzhou 310009 China College of Computer Science Beijing University of Technology Beijing 100124 China Key Laboratory of Information and Network Security 3rd Research Institute Ministry of Public Security Beijing 100124 China Beijing 100124 China
Cloud computing is a hot topic of current research, for anonymous authentication is required in many applications scenarios of e-business based on cloud computing, users do not want to expose their identity, users jus... 详细信息
来源: 评论
A comparative study of two independent component analysis using reference signal methods
A comparative study of two independent component analysis us...
收藏 引用
8th International Conference on Emerging Intelligent computing technology and Applications, ICIC 2012
作者: Mi, Jian-Xun Yang, Yanxin Bio-Computing Research Center Shenzhen Graduate School Harbin Institute of Technology Shenzhen Guangdong Province China Key Laboratory of Network Oriented Intelligent Computation Shenzhen Guangdong Province China Faculty of Engineering and Technology Yunnan Agriculture University Kunming Yunnan Province China
Independent Component Analysis (ICA) using reference signal is a useful tool for extracting a desired independent component (IC). Reference signal is served asa priori information to conduct ICA to converge to the loc... 详细信息
来源: 评论
Research on hardware security of embedded system in cloud environment
Research on hardware security of embedded system in cloud en...
收藏 引用
2012 2nd International Conference on key Engineering Materials, ICKEM 2012
作者: Li, Jing Zhang, Huanguo Zhao, Bo Guo, Xi He, Fan School of Computer Wuhan University Wuhan 430072 Hubei China Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education Wuhan University Wuhan 430072 Hubei China School of Computer Science and Technology Wuhan University of Technology 1040 Heping Road Wuhan 430063 China
Cloud computing is an important innovation of current computing models. At present, the research on the security of cloud computing is mainly concentrated on PCs and servers. The security of embedded system in cloud e... 详细信息
来源: 评论
Selective opening chosen ciphertext security directly from the DDH assumption
Selective opening chosen ciphertext security directly from t...
收藏 引用
6th International Conference on network and System security, NSS 2012
作者: Liu, Shengli Zhang, Fangguo Chen, Kefei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get t... 详细信息
来源: 评论
Multi-Layer Synthesis of HighlyStructured Texture
收藏 引用
Wuhan University Journal of Natural Sciences 2012年 第4期17卷 302-308页
作者: TANG Li YU Rongwei GU Yuanting YUAN Jie DU Gong School of Computer Science and Engineering ChangshuInstitute of Technology Changshu 215500 Jiangsu China State Key Laboratary of Software Engineering WuhanUniversity Wuhan 430072 Hubei China Key Laboratory of Aerospace Information Security andTrust Computing Ministry of Education Wuhan 430072 HubeiChina Institute of Software Chinese Academy of Sciences Beijing100080 Beijing China
In this paper, a novel concept of multilayer synthesis and a general framework for texture synthesis method are presented. Within this framework, we first decompose the texture into the supposed pattern layer and mate... 详细信息
来源: 评论
A parallel NURBS-based isogeometric analysis framework on multi-core CPUs
收藏 引用
Journal of Computational Information Systems 2012年 第16期8卷 6589-6600页
作者: Guo, Licai Huang, Zhangjin Gu, Naijie School of Computer Science and Technology University of Science and Technology of China China Key Laboratory of Software in Computing and Communication Anhui China USTC-SICT Joint Laboratory on Network and Communication China
A parallel framework for NURBS-based isogeometric analysis on multi-core cpus is presented in this paper. The framework is composed of two parts: (1) construction of the stiffness matrix and right hand side vector;(2)... 详细信息
来源: 评论