咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3341-3350 订阅
排序:
Bus rapid transit (BRT) parallel system based on ACP approach
Bus rapid transit (BRT) parallel system based on ACP approac...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: X.-S. Dong Gang Xiong Dong Fan F.-H. Zhu Li Xie Dongguan Research Institute of CASIA Cloud Computing Industrial Technology Innovation and Incubation Center Chinese Academy of Sciences Beijing China Dongguan Research Institute of CASIA Cloud Computing Industrial Technology Innovation and Incubation Center Chinese Academy of Sciences Dongguan China Dongguan Research Institute of CASIA Cloud Computing Industrial Technology Innovation and Incubation Center Chinese Academy of Sciences 523808 China Institute of Automation Chinese Academy of Sciences Beijing Beijing CN Zhejiang Provincial Key Laboratory of Information Network Technology Department of information Science and Electronic Engineering University of Zhejiang Hangzhou China
Bus Rapid Transit (BRT) is an effective way to improve urban traffic status. But, because of its complexity, it is difficult in its operation management and scheduling. In this article, based on ACP approach, Parallel... 详细信息
来源: 评论
Image perceptual hash algorithm based on target character
Image perceptual hash algorithm based on target character
收藏 引用
2011 IEEE 13th International Conference on Communication technology, ICCT 2011
作者: Zhang, Bin Xin, Yang Niu, Xin-Xin Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100086 China China Information Security Certification Center Beijing 100020 China Bejing Safe-Code Technology Co. Ltd. Beijing 100086 China
This paper proposed a perceptual hashing algorithm based on the image shape target Using the Hu invariant moments, the scheme extract the image characters. Then, calculate the weighted average of the Hu invariant mome... 详细信息
来源: 评论
Runtime-based boot components re-measurement scheme for trusted platform
Runtime-based boot components re-measurement scheme for trus...
收藏 引用
作者: Weiping, Peng Yajian, Zhou Cong, Wang Yixian, Yang Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science and Technology Henan Polytechnic University Jiaozuo Henan 454001 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions (binary code) is measured ... 详细信息
来源: 评论
computing parametric alignment of RNA structures:visualization and practice
Computing parametric alignment of RNA structures:visualizati...
收藏 引用
2011 International Conference on Future Computer Sciences and Application(ICFCSA 2011)
作者: Wangsen Feng Bei Zhang Lusheng Wang Key Laboratory of Network and Software Security Assurance of Ministry of Education Computing Center Beijing University Department of Computer Science City University of Hong Kong
Alignment of RNA structures is very important in biological *** to pair-wise sequence alignment,there is often disagreement about how to weight matches,mismatches,indels and gaps when comparing two RNA ***,we develop ... 详细信息
来源: 评论
Genetic Algorithm-Based Power Management in Cloud Platform
Genetic Algorithm-Based Power Management in Cloud Platform
收藏 引用
International Conference on Internet technology and Applications (iTAP)
作者: Zili Xiong Zhang Zhang Huafeng Kong Deqing Zou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Laboratory of Information Network Security Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Cloud computing is a novel computing pattern, and it can provide underlying hardware resource for cloud users on demand. Virtualization is the key technology of cloud computing, and it provides the technical support f... 详细信息
来源: 评论
An efficient data delivery mechanism by exploring multipath routes for wireless sensor networks
收藏 引用
Information technology Journal 2011年 第7期10卷 1359-1366页
作者: Ruan, Zhiqiang Sun, Xingming Hunan Provincial Key Laboratory of Network and Information Security Hunan University Hunan Changsha 410082 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology China
This paper study the data delivery mechanisms that can with high probability thwarting node capture attacks in unattended or distributed wirelesssensor networks. Classic cryptographic approaches are vulnerable to such... 详细信息
来源: 评论
Genetic algorithm-based power management in cloud platform
Genetic algorithm-based power management in cloud platform
收藏 引用
International Conference on Internet technology and Applications
作者: Xiong, Zili Zhang, Zhang Kong, Huafeng Zou, Deqing School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China Key Laboratory of Information Network Security Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai 201204 China
Cloud computing is a novel computing pattern, and it can provide underlying hardware resource for cloud users on demand. Virtualization is the key technology of cloud computing, and it provides the technical support f... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud computing technology and Science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
S3: Smart selection of sampling function for passive network measurement
S3: Smart selection of sampling function for passive network...
收藏 引用
Conference on Local Computer networks (LCN)
作者: Xingyu Ma Chengchen Hu Junchen Jiang Jing Wang Tsinghua National Laboratory for Information Science and Technology Tsinghua University China MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University China
Flow size statistics is a fundamental task of passive measurement. In order to bound the estimation error of passive measurement for both small and large flows, previous probabilistic counter updating algorithms used ... 详细信息
来源: 评论
Collaborative integrity verification in hybrid clouds
Collaborative integrity verification in hybrid clouds
收藏 引用
International Conference on Collaborative computing: networking, Applications and Worksharing (CollaborateCom)
作者: Yan Zhu Hongxin Hu Gail-Joon Ahn Yujing Han Shimin Chen Beijing Key Laboratory of Internet Security Technology Peking University Beijing China Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University Tempe AZ USA Justitutc of Computer Science and Technology Peking University Beijing China
A hybrid cloud is a cloud computing environment in which an organization provides and manages some internal resources and the others provided externally. However, this new environment could bring irretrievable losses ... 详细信息
来源: 评论