咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3381-3390 订阅
排序:
Physical topology discovery based on Spanning Tree Protocol
Physical topology discovery based on Spanning Tree Protocol
收藏 引用
2010 International Conference on Computer Application and System Modeling, ICCASM 2010
作者: He, Peng Pan, Heng Li, Xiangdong Zheng, Qiusheng Zhengzhou Key Laboratory of Network Security Appraisal Zhongyuan Institute of Technology ZhengZhou China
The physical topology discovery is one of the difficulties in network measurements. This paper proposes a novel algorithm for discovering the physical topology of networks based on Spanning Tree Protocol (STP). Our al... 详细信息
来源: 评论
An attack graph based network security evaluation model for hierarchical network
An attack graph based network security evaluation model for ...
收藏 引用
2010 IEEE International Conference on Information Theory and Information security, ICITIS 2010
作者: Ge, Haihui Gu, Lize Yang, Yixian Liu, Kewei Key Laboratory of Network and Information Attack and Defence Technology MOE Beijing University of Posts and Telecommunications Beijing China Laboratory of network security Information Technology Security Evaluation Center Beijing China
To evaluate the security situation of hierarchical network, a novel evaluation algorithm based on the method of constructing a security risk function is proposed. The proposed algorithm is the aggregation of qualitati... 详细信息
来源: 评论
Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & technology 2010年 第6期25卷 1293-1304页
作者: 王怀习 朱岩 冯荣权 Stephen S.Yau LMAM School of Mathematical SciencesPeking University Electronic Engineering Institute Institute of Computer Science and Technology Peking University Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education Information Assurance Center and School of Computing Informatics and Decision Systems Engineering Arizona State University
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***... 详细信息
来源: 评论
Popular or personal: Access patterns of User Generated Content
Popular or personal: Access patterns of User Generated Conte...
收藏 引用
International Conference on networking and Distributed computing
作者: Shan, Yi Liu, Taoying Liu, Hong Key Laboratory of Network Science Institute of Computing Technology Chinese Academy of Sciences Beijing China
It is generally believed that Zipf's law is well applied for Web objects. However, as OSNs prevail and Internet begins to concentrate more and more on individuals, many researchers report that request frequency of... 详细信息
来源: 评论
Investigating, modeling, and ranking interface complexity of Web Services on the World Wide Web
Investigating, modeling, and ranking interface complexity of...
收藏 引用
World Congress on Services
作者: Lu, Xiaoyi Lin, Jian Zou, Yongqiang Peng, Juan Liu, Xingwu Zha, Li Key Laboratory of Network Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Analyzing factors of affecting Web Service invocation performance is a hot topic. Among the factors, service interface complexity is a key one investigated by much research work. However, these researches mainly analy... 详细信息
来源: 评论
Identification and extraction of topic elements for Chinese interactive text
Identification and extraction of topic elements for Chinese ...
收藏 引用
International Conference on Multimedia technology
作者: Haiping Zhu Yang Yang Yan Chen Xiaolu Yu Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Technology Research and Development Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi''an Jiaotong University Xi'an China Department of Computer Science and Technology Xi'an Jiaotong University China Department of Computer Science and Technology Xi''an Jiaotong University Xi'an China Xi'an Jiaotong University Xi'an Shaanxi CN
This paper is based on identification and extraction of topic elements for Chinese interactive text. A topic segmentation method based on time sequence is achieved. Then a novel identification and extraction algorithm... 详细信息
来源: 评论
A Digital Interface-based Digital Rights Management Scheme for Digital Cinema
收藏 引用
电子学报(英文版) 2010年 第3期19卷 481-485页
作者: FAN Kefeng MA Zhaofeng YANG Yixiani NIU Xinxin Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China
Digital rights management (DRM) is indispensable to prevent various kinds of illegal content usage. In this paper, we present a Digital interface-based DRM scheme (DI-DRM) for digital cinema, which can provide a new m... 详细信息
来源: 评论
Performance analysis of sign quantized projection
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第1期17卷 62-66页
作者: YE Tian-yu NIU Xin-xin MA Zhao-feng YANG Yi-xian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China
Quantized projection technology (QP) is the version of quantization index modulation (QIM) working in the projection domain. It essentially belongs to a double-sided additive embedder. In this article, the concept... 详细信息
来源: 评论
Signal sparse representation based on the peak transform and modulus maximum of wavelet coefficients
收藏 引用
Tamkang Journal of Science and Engineering 2011年 第3期14卷 217-224页
作者: Cen, Yi-Gang Xin, Rui Chen, Xiao-Fang Cen, Li-Hui Hu, Ming-Xing Chen, Shi-Ming Institute of Information Science Beijing Jiaotong University Beijing 100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing 100044 China School of Information Science and Engineering Central South University Hunan Changsha 410083 China Centre for Medical Image Computing University College London United Kingdom School of Electrical and Electronic Engineering East China Jiao Tong University Jiangxi Nanchang 330013 China
It is now well-known that one can reconstruct sparse or compressible signals accurately from a very limited number of measurements. This technique is known as "compressed sensing" or "compressive sampli... 详细信息
来源: 评论
An improved radius of gyration similarity measure between generalized fuzzy numbers and its application to multisource data fusion
收藏 引用
Journal of Computers 2011年 第8期6卷 1732-1739页
作者: Yong, Deng Dong, Sun Wen, Jiang Jianling, Xu College of computer and information sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hanzhou Zhejiang 310036 China School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai 200240 China Key Laboratory of Intelligent Computing Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China Department of Electronics Engineering Northwestern Polytechnical University Xían 710072 China Grain Economics Institute Nanjing University of Finance and Economics Nanjing 210003 China
The degree of similarity between fuzzy numbers plays an important role in fuzzy information fusion. In this paper, improved ROG-based similarity measure developed from the current ROG method is presented. It is shown ... 详细信息
来源: 评论