咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 182 篇 期刊文献

馆藏范围

  • 788 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 267 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 33 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 679 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
788 条 记 录,以下是731-740 订阅
排序:
Dense small cell networks: From noise-limited to dense interference-limited
Dense small cell networks: From noise-limited to dense inter...
收藏 引用
作者: Yang, Bin Mao, Guoqiang Ding, Ming Ge, Xiaohu Tao, Xiaofeng School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan430074 China School of Computing and Communication University of Technology Sydney UltimoNSW2007 Australia Data61 CSIRO CanberraACT2601 Australia National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing100876 China
Considering both non-line-of-sight (NLoS) and line-of-sight (LoS) transmissions, the transitional behaviors from noise-limited regime to dense interference-limited regime have been investigated for the fifth generatio... 详细信息
来源: 评论
A rich ranking model based on the matthew effect optimization  7th
A rich ranking model based on the matthew effect optimizatio...
收藏 引用
7th International Conference on Computational Data and Social networks, CSoNet 2018
作者: Li, Jinzhong Liu, Guanjun Department of Computer Science and Technology College of Electronic and Information Engineering Jinggangshan University Ji’an343009 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu610054 China Department of Computer Science and Technology College of Electronic and Information Engineering Tongji University Shanghai201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China
Most existing approaches of learning to rank treat the effectiveness of each query equally which results in a relatively lower ratio of queries with high effectiveness (i.e. rich queries) in the produced ranking model... 详细信息
来源: 评论
Efficient attribute-based encryption with blackbox traceability  12th
Efficient attribute-based encryption with blackbox traceabil...
收藏 引用
12th International Conference on Provable security, ProvSec 2018
作者: Xu, Shengmin Yang, Guomin Mu, Yi Liu, Ximeng Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong Wollongong Australia School of Information Systems Singapore Management University Singapore Singapore College of Mathematics and Computer Science Fuzhou University FuzhouFujian China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceability w... 详细信息
来源: 评论
A Multi-label Classifier for Human Protein Subcellular Localization Based on LSTM networks
A Multi-label Classifier for Human Protein Subcellular Local...
收藏 引用
2018 International Conference on Advanced Control, Automation and Artificial Intelligence (ACAAI2018)
作者: Zhiying Gao Lijun Sun Zhihua Wei Department of Computer Science and Technology Tongji University Research Center of Big Data and Network Security Tongji University Key Laboratory of Embedded System and Service Computing Tongji University
Nowadays, with the increasing number of protein sequences all over the world, more and more people are paying their attention to predicting protein subcellular location. Since wet experiment is costly and time-consumi... 详细信息
来源: 评论
A Study on Influential User Identification in Online Social networks
收藏 引用
Chinese Journal of Electronics 2016年 第3期25卷 467-473页
作者: WANG Nan SUN Qindong ZHOU Yadong SHEN Si Shaanxi Key Laboratory of Network Computing and Security Xi'an University of Technology Ministry of Education Key Laboratory For Intelligent Network and Network Security Xi'an Jiaotong University
Influential user evaluation is great importance in many application areas of online social *** order to identify influential users in a more adequate and practical way, we propose a Dynamic regional interaction model(... 详细信息
来源: 评论
An Improved Convolutional Neural network Algorithm for Multi-Label Classification
An Improved Convolutional Neural Network Algorithm for Multi...
收藏 引用
International Conference on Audio, Language and Image Processing, ICALIP
作者: Xinsheng Wang Lijun Sun Zhihua Wei Department of Computer Science and Technology Tongji University Shanghai China Research Center of Big Data and Network Security Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China
Recent years conventional neural network(CNN) has been applied to different natural language processing(NLP) tasks such as sentence classification, sentence modeling, etc. Some researchers use CNN to do multi-label cl... 详细信息
来源: 评论
Revisiting Recent and Current Anomaly Detection based on Machine Learning in Ad-Hoc networks
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1288卷
作者: Zhixiao Wang Mingyu Chen Wenyao Yan Wendong Wang Ang Gao Gaoyang Nie Feng Wang Shaobo Yang Xi'an University of Technology Xi'an 710048 China Goettingen University Goettingen 37077 Germany Xi'an Jiaotong University Xi'an 710049 China Shaanxi Provincial Key Laboratory of Network Computing and Security Technology Xi'an 710048 China College of Xi'an Innovation Yan'an University Xi'an 710100 China Yan'an University Yan'an 716000 China National Satellite Meteorological Center China Meteorological Administration Beijing 100081 China
Ad-Hoc network which is one kind of self-organized networks is much more vulnerable than the infrastructural network with the properties of highly changeable linkage, dynamic structure, and wireless connections so tha...
来源: 评论
Quantum private comparison based on quantum dense coding
收藏 引用
Science China(Information Sciences) 2016年 第11期59卷 195-207页
作者: Feng WANG Mingxing LUO Huiran LI Zhiguo QU Xiaojun WANG College of Mathematical Sciences Dezhou University Information Security and National Computing Grid Laboratory Southwest Jiaotong University Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Electronic Engineering Dublin City University
A serious problem in cloud computing is privacy information protection. This study proposes a new private comparison protocol using Einstein-Podolsky-Rosen(EPR) pairs. This protocol allows two parties to secretly comp... 详细信息
来源: 评论
Improved quantum ripple-carry addition circuit
收藏 引用
Science China(Information Sciences) 2016年 第4期59卷 104-111页
作者: Feng WANG Mingxing LUO Huiran LI Zhiguo QU Xiaojun WANG College of mathematical sciences Dezhou University Information Security and National Computing Grid Laboratory Southwest Jiaotong University Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology School of Electronic Engineering Dublin City University
A serious obstacle to large-scale quantum algorithms is the large number of elementary gates, such as the controlled-NOT gate or Toffoli gate. Herein, we present an improved linear-depth ripple-carry quantum addition ... 详细信息
来源: 评论
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1284卷
作者: Zhixiao Wang Wenyao Yan Wendong Wang Ang Gao Lei Yu Shaobo Yang GaoYang Nie School of Computer Science and Engineering Xi'an University of Technology 710048 Xi'an China Telematics Group the University of Goettingen 37077 Goettingen Germany Shaanxi Key Laboratory of Network Computing and Security 710048 Xi'an China School of Electronic and Information Engineering Xi'an Jiaotong University 710048 Xi'an China College of Xi'an Innovation Yan'an University 710100 Xi'an China Yan'an University Yan'an 716000 China National Satellite Meteorological Center China Meteorological Administration Beijing 100081 China
Based on the huge volumes of user check-in data in LBSNs, users' intrinsic mobility patterns can be well explored, which is fundamental for predicting where a user will visit next given his/her historical check-in...
来源: 评论