咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 412 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 486 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 160 篇 信息与通信工程
    • 125 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 52 篇 生物工程
    • 29 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
    • 16 篇 化学工程与技术
  • 275 篇 理学
    • 168 篇 数学
    • 55 篇 生物学
    • 49 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 39 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 26 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 31 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...
  • 11 篇 shandong enginee...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 12 篇 yang xiaoyuan
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 902 篇 英文
  • 71 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1001 条 记 录,以下是741-750 订阅
排序:
Personalized travel sequence recommendation on multi-source big social media
收藏 引用
IEEE Transactions on Big Data 2016年 第1期2卷 43-56页
作者: Jiang, Shuhui Qian, Xueming Mei, Tao Fu, Yun Department of Electrical and Computer Engineering College of Engineering Northeastern University BostonMA02115 United States Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi'an Jiaotong University Xi'an710049 China Department of Electrical and Computer Engineering College of Computer and Information Science Northeastern University BostonMA02115 United States Microsoft Research Asia Beijing100080 China
Big data increasingly benefit both research and industrial area such as health care, finance service and commercial recommendation. This paper presents a personalized travel sequence recommendation from both travelogu... 详细信息
来源: 评论
On error linear complexity of new generalized cyclotomic binary sequences of period p2
arXiv
收藏 引用
arXiv 2017年
作者: Wu, Chenhuang Xu, Chunxiang Chen, Zhixiong Ke, Pinhui School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Provincial Key Laboratory of Applied Mathematics Putian University PutianFujian351100 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Mathematics and Informatics Fujian Normal University Fuzhou Fujian350117 China
We consider the k-error linear complexity of a new binary sequence of period p2, proposed in the recent paper "New generalized cyclotomic binary sequences of period p2", by Z. Xiao et al., who calculated the... 详细信息
来源: 评论
Energy Efficient Base Station On/Off with User Association under C/U Split
Energy Efficient Base Station On/Off with User Association u...
收藏 引用
Wireless Communications and networking Conference
作者: Haimeng Wu Xiaodong Xu Yan Sun Aini Li National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications School of Electronic Engineering and Computer Science Queen Mary University of London
The mobile traffic explosion leads to dense deployed heterogeneous networks that can support peak time traffic. However, the utilization of base stations (BSs) is very inefficient during off-peak time due to the tradi... 详细信息
来源: 评论
A community-powered search of machine learning strategy space to find NMR property prediction models
arXiv
收藏 引用
arXiv 2020年
作者: Bratholm, Lars A. Gerrard, Will Anderson, Brandon Bai, Shaojie Choi, Sunghwan Dang, Lam Hanchar, Pavel Howard, Addison Huard, Guillaume Kim, Sanghoon Kolter, Zico Kondor, Risi Kornbluth, Mordechai Lee, Youhan Lee, Youngsoo Mailoa, Jonathan P. Nguyen, Thanh Tu Popovic, Milos Rakocevic, Goran Reade, Walter Song, Wonho Stojanovic, Luka Thiede, Erik H. Tijanic, Nebojsa Torrubia, Andres Willmott, Devin Butts, Craig P. Glowacki, David R. Participants, Kaggle School of Chemistry University of Bristol Cantock’s Close BristolBS8 1TS United Kingdom School of Mathematics University of Bristol Fry Building Woodland Road BristolBS1 1UG United Kingdom Dept. of Computer Science University of Bristol Merchant Venturer’s Building BristolBS8 1UB United Kingdom Intangible Realities Laboratory University of Bristol Cantock’s Close BristolBS8 1TS United Kingdom Bosch Center for Artificial Intelligence PittsburghPA15222 United States Carnegie Mellon University PittsburghPA15213 United States National Institute of Supercomputing and Network Korea Institute of Science and Technology Information 245 Daehak-ro Yuseong-gu Daejeon34141 Korea Republic of BNP Paribas Cardif Fyusion Inc. Kaggle Google Inc. Mountain View United States Ebay Korea 34F Gangnam Finance Center 152 Teheran Ro Gangnam Gu Seoul Korea Republic of Department of Computer Science University of Chicago 5730 S Ellis Ave ChicagoIL60637 United States Department of Statistics University of Chicago 5747 S Ellis Ave ChicagoIL60637 United States Center for Computational Mathematics Flatiron Institute 162 5th Ave. New YorkNY10010 United States Bosch Research and Technology Center CambridgeMA02139 United States Department of Chemical and Biomolecular Engineering Korea Advanced Institute of Science and Technology 291 Daehak-ro Yuseong-gu Daejeon34141 Korea Republic of 111 Daedeok-daero 989beon-gil Yuseong-gu Daejeon Korea Republic of MINDS AND COMPANY 2621 Nambusunhwan-ro Gangnam-gu Seoul06267 Korea Republic of Totient Inc Sindjeliceva 9 Belgrade11000 Serbia KAIST Web Security & Privacy Lab 291 Daehak-ro Yuseong-guDaejeon34141 Korea Republic of *** Alicante Spain
The rise of machine learning (ML) has created an explosion in the potential strategies for using data to make scientific predictions. For physical scientists wishing to apply ML strategies to a particular domain, it c... 详细信息
来源: 评论
A geometric image segmentation method based on a bi-convex, fuzzy, variational principle with teaching-learning optimization
A geometric image segmentation method based on a bi-convex, ...
收藏 引用
作者: Jin, Haiyan Li, Yaning Xing, Bei Wang, Lei Department of Computer Science and Engineering Xi'An University of Technology No. 5 South Jinhua Road Xi'an Shaanxi710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
This paper proposes an efficient, bi-convex, fuzzy, variational (BFV) method with teaching and learning based optimization (TLBO) for geometric image segmentation. Firstly, we adopt a bi-convex, object function to pro... 详细信息
来源: 评论
Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction
arXiv
收藏 引用
arXiv 2017年
作者: Zhao, Yijia Zhang, Yichen Xu, Bingjie Yu, Song Guo, Hong State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China State Key Laboratory of Advanced Optical Communication System and Network School of Electronics Engineering and Computer Science Center for Quantum Information Technology Peking University Beijing100871 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China
The method of improving the performance of continuous-variable quantum key distribution protocols by post-selection has been recently proposed and verified. In continuous-variable measurement-device-independent quantu... 详细信息
来源: 评论
On the k-error linear complexity of generalised cyclotomic sequences
收藏 引用
International Journal of High Performance Computing and networking 2016年 第5-6期9卷 394-400页
作者: Liu, Longfei Yang, Xiaoyuan Du, Xiaoni Wei, Bin Key Laboratory of Network and Information Security of APF Engineering College of APF Xi'an710086 China Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an710071 China
Generalised cyclotomic binary sequences are divided into Whiteman-generalised cyclotomic and Ding-generalised cyclotomic. Firstly, two classes of error generalised cyclotomic sequences with length pq over Zpq are cons... 详细信息
来源: 评论
A secure route optimization mechanism for expressive internet architecture (XIA) mobility
A secure route optimization mechanism for expressive interne...
收藏 引用
作者: Meng, Hongwei Chen, Zhong Meng, Ziqian Song, Chuck School of Electronics Engineering and Computer Science Key Laboratory of High Confidence Software Technologies Ministry of Education MoE Key Laboratory of Network and Software Security Assurance Peking University Beijing China Carnegie Mellon University Pittsburgh United States
Motivated by the natural features of ID/location decoupling and self-certifying in Expressive Internet Architecture (XIA), we designs a secure mechanism to protect the binding update message for route optimization in ... 详细信息
来源: 评论
Performance of Resampling Algorithms Based on Particle Filter in Video Target Tracking
收藏 引用
Journal of Donghua University(English Edition) 2016年 第5期33卷 745-748页
作者: 韩华 王裕明 张玉金 胡一帆 School of Electronic and Electrical Engineering Shanghai University of Engineering Science Shanghai 201620 China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai 201203 China Shandong Provincial Key Laboratory of Computer Network Jinan 250014 China Shandong Computer Science Center (National Supercomputer Center in Jinan ) Jinan 250014 China
Particle filter is a common algorithm in video target *** there are still some shortcomings,for example,particle degradation *** solving this problem,the general solution is to introduce resampling *** present,four ki... 详细信息
来源: 评论
LC-KDE: A novel scheme for Wi-Fi localization
LC-KDE: A novel scheme for Wi-Fi localization
收藏 引用
International Symposium on Wireless Personal Multimedia Communications (WPMC)
作者: Hao Chen Yifan Zhang Wei Li Xiaofeng Tao Ping Zhang National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Department of Electrical and Computer Engineering University of Victoria
Signal strength difference (SSD) is widely utilized as the feature for Wi-Fi fingerprint localization to tackle the heterogeneity between training device and target device, but the correlation between SSDs is largely ... 详细信息
来源: 评论