咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3361-3370 订阅
排序:
M-MEP:基于多层染色体多基因表达式编程的遗传进化算法
M-MEP:基于多层染色体多基因表达式编程的遗传进化算法
收藏 引用
2012全国高性能计算学术年会
作者: ZHANG Qing-Ke 张庆科 Yang Bo 杨波 Wang Lin 王琳 Zhu Fu-Xiang 朱福祥 Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of JinanJinan 济南大学 山东省网络环境智能计算技术重点实验室 中国 济南 250022 Computer Networks and distributed Systems Laboratory Beijing institute of technologyBeijing100081 北京理工大学 计算机学院 网络与分布式计算研究所 中国 北京 10081
本文提出了一种新的基于多层多基因表达式编程的进化算法M-MEP.本算法引入了多层超级染色体概念并采用多层染色体模型对个体进行并行表达,算法在解决函数发现和预测问题中取得了良好的效果.本文的主要贡献:(1)提出了基于多层染色体的... 详细信息
来源: 评论
Extended Doo-Sabin surfaces
收藏 引用
Journal of Information and Computational Science 2011年 第12期8卷 2239-2247页
作者: Huang, Zhangjin Wang, Feng Wang, Guoping School of Computer Science and Technology University of Science and Technology of China China Key Laboratory of Software in Computing and Communication Anhui Province China USTC-SICT Joint Laboratory on Network and Communication China Peking University China School of Electronic Engineering and Computer Science Peking University China
In this paper we propose a modification of quadratic NURSSes called EDSes (Extended Doo-Sabin Surfaces). EDSes inherit the refinement rules for quadratic NURSSes for four-sided faces but use the refinement rules for D... 详细信息
来源: 评论
Runtime-Based Boot Components Re-measurement Scheme for Trusted Platform
Runtime-Based Boot Components Re-measurement Scheme for Trus...
收藏 引用
2011 International Conference on Informatics,Cybernetics,and Computer Engineering(ICCE 2011)
作者: Peng Weiping Zhou Yajian Wang Cong Yang Yixian Key Laboratory of Network and Information Attack & Defence Technology of MOE Beijing University of Posts and Telecommunications School of Computer Science and Technology Henan Polytechnic University Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions(binary code) is measured a... 详细信息
来源: 评论
A Hybrid Watermarking Technique to Resist Tampering and Copy Attacks
A Hybrid Watermarking Technique to Resist Tampering and Copy...
收藏 引用
International Symposium on Intelligence Information Processing and Trusted computing (IPTC)
作者: Peng Zheng Weihua Wang Juan Wang School of Computer Wuhan University of China Wuhan Hubei China Anyang Institute of Technology Anyang Henan China Key Laboratory of AeroSpace Information Security and Trust Computing Ministry of Education Wuhan Hubei China
Digital watermarking is an efficient method to protect multimedia documents. Robust watermarks, which survive to any change or alteration of the protected documents, are typically used for copyright protection. Fragil... 详细信息
来源: 评论
Strong security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation
Strong Security Enabled Certificateless Aggregate Signatures...
收藏 引用
International Conference on Intelligent networking and Collaborative Systems (INCOS)
作者: Hu Xiong Qianhong Wu Zhong Chen Key Laboratory of Network and Software Security Assurance of the Ministry of Education Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Department of Computer Engineering and Mathematics UNESCO Chair in Data Pr Universitat Rovira i Virgili Tarragona Spain Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University of China China
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
A Trust-Personality Mechanism for Emotion Compensation
A Trust-Personality Mechanism for Emotion Compensation
收藏 引用
International Conference on Advanced Learning Technologies (ICALT)
作者: Jiwei Qin Qinghua Zheng Feng Tian Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China Xi'an Jiaotong University Xi'an Shaanxi CN Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China
E-learning provides an unprecedented flexibility and convenience for learners via breaking the limitation of space-time. Most researchers are only concerned about the learner's cognitive and construct a great amou... 详细信息
来源: 评论
A Topic Partition Algorithm Based on Average Sentence Similarity for Interactive Text
A Topic Partition Algorithm Based on Average Sentence Simila...
收藏 引用
International Conference on Computational Intelligence and security
作者: Haiping Zhu Yan Chen Yang Yang Chao Gao Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China Xi'an Jiaotong University Xi'an Shaanxi CN Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China
Based on the research and analysis of interactive text properties, the word frequency statistics and synonyms merger are imported to obtain the keywords of interactive text. The Sentence similarity is used to describe... 详细信息
来源: 评论
A method for translating belief function models to probability models
收藏 引用
Journal of Information and Computational Science 2011年 第10期8卷 1817-1823页
作者: Xu, Peida Wu, Jiyi Li, Ya Cong, Jiang Sun, Xiaohong Kang, Bingyi Deng, Yong School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai 200240 China Hangzhou Key Laboratory of E-Business and Information Security Hangzhou Normal University Zhejiang 310036 China College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China Key Subject Laboratory of National defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China College of Computer and Information Sciences Southwest University Chongqing 400715 China
One of the key issues in the applications of Dempster-Shafer evidence theory is how to make a decision based on Basic Probability Assignment (BPA). The conventional method is Pignistic Probability Transformation (PPT)... 详细信息
来源: 评论
Assessment of genetically modified food security-first results
收藏 引用
Journal of Information and Computational Science 2011年 第12期8卷 2493-2500页
作者: Chai, Jie Wu, Jiyi Cong, Jiang Sun, Xiaohong Kang, Bingyi Deng, Yong School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai 200240 China Hangzhou Key Laboratory of E-Business and Information Security Hangzhou Normal University Zhejiang 310036 China College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China Key Subject Laboratory of National Defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China College of Computer and Information Sciences Southwest University Chongqing 400715 China
With the development of Genetically Modified (GM) food, security issue is being paid increasing attention. In this paper, a comprehensive model taking account factors which influencing GM food security is proposed. An... 详细信息
来源: 评论
A more effective definition of evidential conflict combined with evidential distance
收藏 引用
Journal of Information and Computational Science 2011年 第9期8卷 1729-1734页
作者: Chen, Yuxin Wu, Jiyi Cong, Jian Jie, Wenjing Deng, Yong School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai 20024 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou 310036 China College of Food Science and Technology Shanghai Ocean University 999 Hucheng Huan Road Shanghai 201306 China Key Subject Laboratory of National Defense for Radioactive Waste and Environment Security Southwest University of Science and Technology Mianyang 621010 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China College of Computer and Information Sciences Southwest University Chongqing 400715 China
Evidence theory is widely used in many application systems such as information fusion and decision making under uncertainty environment. However, the classical Dempster combination rule is not efficient to deal with h... 详细信息
来源: 评论