咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3301-3310 订阅
排序:
Cryptanalysis of a fuzzy identity based encryption scheme in the standard model
收藏 引用
Informatica (Netherlands) 2012年 第2期23卷 299-314页
作者: Wang, Xu An Yang, Xiaoyuan Zhang, Minqing Yu, Yong Key Laboratory of Information and Network Security Engineering University of Chinese Armed Police Force Xi'an 710086 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China
Fuzzy identity based encryption (FIBE), proposed by Sahai and Waters, is a new kind of identity based encryption. It allows users with identity w can decrypt ciphertext for w' if and only if w is close enough to w... 详细信息
来源: 评论
SAR RANGE AMBIGUITY SUPPRESSION VIA SPARSE REGULARIZATION
SAR RANGE AMBIGUITY SUPPRESSION VIA SPARSE REGULARIZATION
收藏 引用
IEEE International Geoscience and Remote Sensing Symposium
作者: Jian Fang Zongben Xu Chenglong Jiang Bingchen Zhang Wen Hong Ministry of Education Key Lab for Intelligent Networks and Network Security & Xi'an Jiaotong University Science and Technology on Microwave Imaging Laboratory & Institute of Electronics Chinese Academy of Sciences (IECAS)
Range ambiguity in synthetic aperture radar (SAR) imaging primarily arises from scattered energy of bright targets out-side the interested region. So to reduce the ambiguity, we need to identify these targets addition... 详细信息
来源: 评论
A Parallel NURBS-based Isogeometric Analysis Framework on Multi-core CPUs
A Parallel NURBS-based Isogeometric Analysis Framework on Mu...
收藏 引用
2012年全国理论计算机科学学术年会(NCTCS2012)
作者: Licai Guo Zhangjin Huang School of Computer Science and Technology University of Science and Technology of China PR China USTC-SICT Joint Laboratory on Network and Key Laboratory of Software in Computing and Communication Anhui Province PR China USTC-SICT Joint Laboratory on Network and Communication PR China School of Computer Science and Technology University of Science and Technology of China PR China
parallel framework for NURBS-based isogeometric analysis on multi-core cpus is presented in this *** framework is composed of two parts:(1) construction of the stiffness matrix and right hand side vector; (2) a parall...
来源: 评论
A Mixed Deterministic Model for Coreference Resolution  12
A Mixed Deterministic Model for Coreference Resolution
收藏 引用
Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning
作者: Bo Yuan Qingcai Chen Yang Xiang Xiaolong Wang Liping Ge Zengjian Liu Meng Liao Xianbo Si Intelligent Computing Research Center Key Laboratory of Network Oriented Intelligent Computation Computer Science and technology Department Harbin Institute of Technology Shenzhen graduate School Shenzhen Guangdong 518055 China
This paper presents a mixed deterministic model for coreference resolution in the CoNLL-2012 shared task. We separate the two main stages of our model, mention detection and coreference resolution, into several sub-ta... 详细信息
来源: 评论
Alliance-Authentication Protocol in Clouds computing Environment
收藏 引用
China Communications 2012年 第7期9卷 42-54页
作者: Zhang Qikun Li Yuanzhang Song Danjie Tan Yuan School of Computer Science and Technology Beijing Institute of Technology Beijing 100081 P. R. China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology ofChina Chengdu 610054 P. R. China School of Computer Beijing University of Posts and Telecommunications Beijing 100876 P. R. China
security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or p... 详细信息
来源: 评论
Leaf image recognition using Fourier transform based on ordered sequence
Leaf image recognition using Fourier transform based on orde...
收藏 引用
8th International Conference on Intelligent computing technology, ICIC 2012
作者: Yang, Li-Wei Wang, Xiao-Feng Department of Automation University of Science and Technology of China Hefei Anhui 230027 China Intelligent Computing Laboratory Hefei Institute of Intelligent Machines Chinese Academy of Sciences P.O. Box 1130 Hefei Anhui 230031 China Key Lab. of Network and Intelligent Information Processing Hefei University Hefei Anhui 230601 China
There are a number of leaf recognition methods, but most of them are based on Euclidean space. In this paper, we will introduce a new description of feature for the leaf image recognition, which represents the leaf co... 详细信息
来源: 评论
In-Field Testing of NAND Flash Storage: Why and How?
In-Field Testing of NAND Flash Storage: Why and How?
收藏 引用
Asian Test Symposium (ATS)
作者: Yu Hu Xinli Gu Xiaowei Li State Key Laboratory of Computer Architecture Institute of Computing Technology CAS Beijing China North America Network Division Huawei Technologies Company Limited Santa Clara USA
NAND Flash memories have rapidly emerged as a storage class memory such as SSD (Solid State Disk), CF (Compact Flash) Card, SD (Secure Digital Memory) Card. Due to its distinct operation mechanisms, NAND Flash memory ... 详细信息
来源: 评论
Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
Identity-based proxy cryptosystems with revocability and hie...
收藏 引用
作者: Wang, Lihua Wang, Licheng Mambo, Masahiro Okamoto, Eiji Network Security Research Institute Koganei-shi 184-8795 Japan State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Faculty of Electrical and Computer Engineering Institute of Science and Engineering Kanazawa University Kanazawa-shi 920-1192 Japan School of Systems and Information Engineering University of Tsukuba Tsukuba-shi 305-8573 Japan
Proxy cryptosystems are classified into proxy decryption systems and proxy re-encryption systems on the basis of a proxy's role. In this paper, we propose an ID-based proxy cryptosystem with revocability and hiera... 详细信息
来源: 评论
A bilateral secure threshold signature scheme with distinguished signing authorities
收藏 引用
International Journal of Advancements in computing technology 2012年 第8期4卷 100-107页
作者: Lize, Gu Feng, Wang Yousheng, Zhou Shi-hui, Zheng Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Mathematic Department of Dezhou University Dezhou 253023 China Chongqing University of Posts and Telecommunications Chongqing 400065 China Key Laboratory of network and information attack and defence technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China
Forward secure threshold signature plays an important role in distributed signature. In order to enhance the security and efficient of the forward secure threshold signature, a new forward secure threshold signature i... 详细信息
来源: 评论
A secure message transaction protocol for delay tolerant networks
收藏 引用
Journal of Communications 2012年 第SPL.ISS. 8期7卷 622-633页
作者: Jia, Zhongtian Li, Lixiang Yu, Zhuoran Li, Shudong Yang, Yixian School of Information Science and Engineering Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan 250022 China Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China School of Science Beijing University of Posts and Telecommunications Beijing 100876 China
Delay/disruption tolerant network adopts a storecarry-and-forward mechanism, of which all the participants are assumed to cooperate with one another in message delivery, to overcome the challenges of the intermittent ... 详细信息
来源: 评论