咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3311-3320 订阅
排序:
An architecture description language based on dynamic description logics  1
收藏 引用
7th IFIP International Conference on Intelligent Information Processing, IIP 2012
作者: Wang, Zhuxiao Peng, Hui Guo, Jing Zhang, Ying Wu, Kehe Xu, Huan Wang, Xiaofeng School of Control and Computer Engineering State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources North China Electric Power University Beijing 102206 China Education Technology Center Beijing International Studies University Beijing 100024 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
ADML is an architectural description language based on Dynamic Description Logic for defining and simulating the behavior of system architecture. ADML is being developed as a new formal language and/or conceptual mode... 详细信息
来源: 评论
Anomaly detection of user behavior based on DTMC with states of variable-length sequences
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第6期18卷 106-115页
作者: XIAO Xi XIA Shu-tao TIAN Xin-guang ZHAI Qi-bin Graduate School at Shenzhen Tsinghua University Shenzhen 518055 China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China Key Laboratory of Network Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
In anomaly detection, a challenge is how to model a user's dynamic behavior. Many previous works represent the user behavior based on fixed-length models. To overcome their shortcoming, we propose a novel method base... 详细信息
来源: 评论
Research on fractional order controller based on best rational approximation approach
收藏 引用
Journal of Convergence Information technology 2012年 第4期7卷 50-58页
作者: Zhao, Huimin Nie, Bing Li, Wen Deng, Wu Software Institute Dalian Jiaotong University Dalian 116028 China Key Laboratory of Numerical Simulation in the Sichuan Provincial College Neijiang Normal University Neijiang 641112 China Artificial Intelligence Key Laboratory of Sichuan Province Sichuan University of Science and Engineering Zigong 643000 China State Key Laboratory of Power Transmission Equipment and System Security and New Technology College of Electrical Engineering Chongqing University Chongqing 400044 China Key Laboratory of advanced Design and Intelligent Computing Dalian University Ministry of Education Dalian 116622 China
Introduce the basic concept of best rational approximation and constructing procedure of the best rational approximation function in Laplace domain. By an illustrative example the design method of FOC based on best ra... 详细信息
来源: 评论
Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2011年 第6期16卷 672-676页
作者: 孙瑾 胡予濮 张乐友 Key Laboratory of Computer Network and Information Security Xidian University Department of Application Mathematics Xi'an University of Technology
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is *** the chosen ciphertext... 详细信息
来源: 评论
Erratum to: A Flame Detection Synthesis Algorithm
收藏 引用
Fire technology 2013年 第6期50卷 1619-1619页
作者: Shidong Wang Jian Wang Yaping He Jujia Zou Baobin Duan State Key Laboratory of Fire Science University of Science and Technology of China Hefei People’s Republic of China Information Network Center Anhui University of Architecture Hefei People’s Republic of China School of Engineering University of Western Sydney Penrith Australia School of Computing Engineering and Mathematics University of Western Sydney Penrith Australia Department of Mathematics and Physics Hefei University Hefei People’s Republic of China
来源: 评论
Universal Three-Party Quantum Secret Sharing Against Collective Noise
收藏 引用
Communications in Theoretical Physics 2011年 第4期55卷 589-593页
作者: 杨宇光 王园 滕义伟 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Information Security(Graduate University of Chinese Academy of Sciences) State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
we present a robust and universal quantum secret sharing protocol with four-qubit decoherence-free (DF) states against collective noise. The transmission's safety is ensured by the nonorthogonality of the noiseless... 详细信息
来源: 评论
Multi-policy threshold signature with distinguished signing authorities
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第1期18卷 113-120页
作者: WANG Feng ZHOU You-sheng GU Li-ze ZHENG Shi-hui YANG Yi-xian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China
Threshold signature plays an important role to distribute the power of a single authority in modem electronic society. In order to add functions and improve efficiency of threshold signatures, a multi-policy threshold... 详细信息
来源: 评论
Electrical performance of 330-kV composite insulators under icing conditions
Electrical performance of 330-kV composite insulators under ...
收藏 引用
International Conference on High Voltage Engineering and Application, ICHVE
作者: F. Yin X. Jiang M. Farzaneh J. Hu State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing Chongqing University Chongqing China LNSERC / Hydro-Quebec / UQAC Industrial Chair on Atmospheric Icing of Power Network Equipment (CIGELE) and Canada Research Chair on Engineering of Power Network Atmospheric Icing (INGIVRE) Univcrsité du Québec á Chicoutimi Chicoutimi QC Canada
Composite insulators have been widely used in high voltage transmission lines more than 20 years in China due to their hydrophobic properties, relatively low weight and maintenance costs, and high mechanical strength.... 详细信息
来源: 评论
Analysis and study on detection of credict fraud in E-commerce
Analysis and study on detection of credict fraud in E-commer...
收藏 引用
International Conference on Future Computer Science and Education
作者: Deng, Kaiyong Zhang, Ru Zhang, Dongfang Jiang, Wen Feng Niu, Xinxin Guo, Hong Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China Key Lab. of Information Network Security of Ministry of Public Security Shanghai China
An algorithm of applying Bedford's law to detect credit fraud in e-commerce is proposed in the paper and the feasibility is studied. The weakness of the algorithm for detecting financial fraud via Benford correlat... 详细信息
来源: 评论
Quantum Secure Direct Communication with Five-Qubit Entangled State
收藏 引用
Chinese Physics Letters 2011年 第3期28卷 17-20页
作者: LIN Song GAO Fei LIU Xiao-Fen School of Mathematics and Computer Science Fujian Normal UniversityFuzhou 350007 Key Lab of Network Security and Cryptography Fujian Normal UniversityFuzhou 350007 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[***.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state *** we build a quantum... 详细信息
来源: 评论