咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3581-3590 订阅
排序:
Urban road network extraction from SAR image
Urban road network extraction from SAR image
收藏 引用
MIPPR 2007: Remote Sensing and GIS Data Processing and Applications;and Innovative Multispectral technology and Applications
作者: Cheng, Pengxue Hu, Maolin Lab. of Intelligent Computing and Signal Processing Anhui University Hefei Anhui 230039 China Key Laboratory of Wireless Sensor Network and Communication Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai 200050 China
In this paper, a technique for the extraction of roads in a high resolution synthetic aperture radar (SAR) image is presented. And a three-step method is developed for the extraction of road network from space borne S... 详细信息
来源: 评论
Point matching of two images under large different resolution
Point matching of two images under large different resolutio...
收藏 引用
MIPPR 2007: Automatic Target Recognition and Image Analysis;and Multispectral Image Acquisition
作者: Ruan, Lei Hu, Maolin Lab. of Intelligent Computing and Signal Processing AnHui University Hefei AnHui 230039 China Key Laboratory of Wireless Sensor Network and Communication Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai 200050 China
Image matching is the first step in almost any 3D computer vision task, and hence has received extensive attention. In this paper, the problem is addressed from a novel perspective, which is different from the classic... 详细信息
来源: 评论
Cryptanalysis of a robust protocol for generating shared RSA parameters
Cryptanalysis of a robust protocol for generating shared RSA...
收藏 引用
2007 IET Conference on Wireless, Mobile and Sensor networks (CCWMSN07)
作者: Fanyu Kong Jia Yu Guangqing Zhang Daxing Li Ministry of Education Key Laboratory of Cryptographic Technology and Information Security Jinan China Institute of Network Security Shandong University Jinan China College of Information Engineering Qingdao University of China Qingdao China
At IMA-Crypto & Coding' 99, A. M. Barmawi et al. proposed a robust protocol for generating shared RSA parameters, which was claimed to be secure and robust from cheaters and malicious parties. In this paper, w...
来源: 评论
A Partial Coverage Based Approach to Classification
A Partial Coverage Based Approach to Classification
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Yu Huang Gongde Guo Daniel Neagu School of Mathematics and Computer Science Fujian Normal University Fuzhou Fujian China Key Laboratory of Network Security and Cryptography Fujian Normal University Fuzhou Fujian China Department of Computing University of Bradford West Yorkshire UK
The k-nearest neighbour (kNN) method is simple but effective for classification. The bottleneck of kNN is it needs a good similarity measure which could be problematic in some cases especially for datasets containing ... 详细信息
来源: 评论
Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology
Research on Usage Control Model with Delegation Characterist...
收藏 引用
IFIP International Conference on network and Parallel computing Workshops (NPC Workshops)
作者: Zhiyong Zhang Lin Yang Qingqi Pei Jianfeng Ma Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an China Electron. Information Engineering Coll. Henan University of Science and Technology Luoyang China The Research Institute Renesas Technology Corporation Beijing China
UCON ABC is a basic framework of next generation access control policy Usage Control that is composed of Authorization-oBlige-Condition components, but so far it lacks of important delegation characteristic. The pape... 详细信息
来源: 评论
Robust Disaster Recovery System Model
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第1期11卷 170-174页
作者: WANG Kun SU Rui-dan LI Zeng-xin CAI Zhen ZHOU Li-hua Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi' an 710071 Shaanxi China National Information Security Engineering and Technology Research Center Beijing 100093 China
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarante... 详细信息
来源: 评论
Study of dynamic timeout strategy based on flow rate metrics in high-speed networks  06
Study of dynamic timeout strategy based on flow rate metrics...
收藏 引用
1st International Conference on Scalable Information Systems, InfoScale '06
作者: Zhou, Ming-Zhong Gong, Jian Ding, Wei Southeast Univ. and Jiangsu Province Key Laboratory of Computer Networking Technology and Jiangsu Province Key Laboratory of Network and Information Security Nanjing Jiangsu China
The measurements based on flow characteristics are playing more and more important roles in the analysis of network Behavior. As one of main methods for flow recognition, the timeout strategies have a significant impa... 详细信息
来源: 评论
Information-Theoretic Secure Verifiable Secret Sharing over RSA Modulus
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1849-1852页
作者: QIU Gang WANG Hong WEI Shimin XIAO Guozhen State Key Laboratory of Integrated Sevice Network Xidian University Xi'an 710071 Shaanxi China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China Department of Computer Science and Technology Huaibei Coal Normal College Huaibei 235000 Anhui China
The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoret... 详细信息
来源: 评论
Fuzzy Model for Trust Evaluation
收藏 引用
Railway Engineering Science 2006年 第1期000卷 23-28页
作者: Zhang Shibin He Dake Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu 610031 China Department of Network Engineering Chengdu University of Information Technology Chengdu 610225 China Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu 610031 China
Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy ... 详细信息
来源: 评论
Fuzzy Model for Trust Evaluation
收藏 引用
Journal of Southwest Jiaotong University(English Edition) 2006年 第1期14卷 23-28页
作者: 张仕斌 何大可 Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu 610031 ChinaDepartment of Network Engineering Chengdu University of Information Technology Chengdu 610225 China Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu 610031 China
Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy ... 详细信息
来源: 评论