咨询与建议

限定检索结果

文献类型

  • 661 篇 会议
  • 316 篇 期刊文献

馆藏范围

  • 977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 533 篇 工学
    • 402 篇 计算机科学与技术...
    • 340 篇 软件工程
    • 145 篇 信息与通信工程
    • 106 篇 电气工程
    • 66 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 36 篇 网络空间安全
    • 35 篇 机械工程
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 26 篇 安全科学与工程
    • 25 篇 交通运输工程
    • 22 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 动力工程及工程热...
  • 237 篇 理学
    • 149 篇 数学
    • 48 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 18 篇 化学
  • 127 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 6 篇 经济学
  • 6 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 62 篇 semantics
  • 53 篇 computational mo...
  • 45 篇 data models
  • 42 篇 federated learni...
  • 42 篇 training
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 21 篇 benchmark testin...
  • 20 篇 object detection
  • 20 篇 data mining
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 230 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 39 篇 school of comput...
  • 39 篇 school of comput...
  • 38 篇 shandong fundame...
  • 33 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 21 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 17 篇 xi'an key labora...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 wang lei

语言

  • 877 篇 英文
  • 90 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
977 条 记 录,以下是961-970 订阅
排序:
Analysis and computing of Association Degree of SMS Feature Words
Analysis and Computing of Association Degree of SMS Feature ...
收藏 引用
International Conference on networking and Services (ICNS)
作者: Qindong Sun Hongli Qiao Nan Wang Network Computing and Security Key Laboratory of Shaanxi Xi''an University of Technology Xi'an China MOE Key Laboratory of Intelligent and Network Security Xi''an Jiaotong University Xi'an China
How to judge the relationship between mobile short messages is the key technology of mobile short message topic detection. The characteristics of the mobile SMS text are discussed in this paper, and the association of... 详细信息
来源: 评论
The Algorithm of Short Message Hot Topic Detection Based on Feature Association
收藏 引用
Information technology Journal 2009年 第2期8卷 236-240页
作者: Sun, Qindong Wang, Qian Qiao, Hongli School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Network Computing and Security Key Lab of Shaanxi Xi'an University of Technology Xi'an 710048 China
Aiming at the mobile short message (SMS) hot topic extraction, the text features and statistical regularity of SMS are analyzed in this study. The formal description of SMS hot topic is given and an algorithm of SMS h... 详细信息
来源: 评论
SkyF2F: Censorship Resistant via Skype Overlay network
SkyF2F: Censorship Resistant via Skype Overlay Network
收藏 引用
WASE International Conference on Information Engineering, ICIE
作者: Shoufeng Cao Longtao He Zhongxian Li Yixian Yang Information Security Center State Key Laboratory of Networking and Switching Technology Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications China Research Center of Information Security Institute of Computing Technology Chinese Academy and Sciences Beijing China
Internet censorship is on the rise as an increasing number of countries and companies block or monitor access to parts of the Internet. Many censorship resistant systems have been proposed, which rely on deploying man... 详细信息
来源: 评论
Node-failure tolerance of topology in wireless sensor networks
收藏 引用
International Journal of network security 2008年 第2期7卷 261-264页
作者: Wang, Liang-Min Ma, Jian-Feng Guo, Yuan-Bo The Computer School Jiangsu University Zhenjiang 212013 China Key Laboratory of Computer Network and Information Security of Education Ministry Xidian University Xi'an Shaanxi 710071 China School of Electronic Technology Engineering University of PLA Zhengzhou 450004 China
Three basic questions are presented and answered in researching on nodefailure topology in wireless sensor network. First, what is the definition of nodefailure tolerance? Second, how to evaluate this tolerance abilit... 详细信息
来源: 评论
ID-based threshold proxy signcryption scheme from bilinear pairings
收藏 引用
International Journal of security and networks 2008年 第3期3卷 206-215页
作者: Li, Fagen Xin, Xiangjun Hu, Yupu School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 Sichuan China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou 450002 Henan China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 Shaanxi China
A (t, n) threshold proxy signcryption scheme allows t or more proxy signcrypters from a designated group of n proxy signcrypters to signcrypt messages on behalf of an original signcrypter. In this paper, a new identit... 详细信息
来源: 评论
AN ADULT SHORT MESSAGE RECOGNITION ALGORITHM BASED ON RESTRICTED CLOSE TEST OPTIMIZATION
AN ADULT SHORT MESSAGE RECOGNITION ALGORITHM BASED ON RESTRI...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: QIN-DONG SUN XIN-BO HUANG JIU-LONG ZHANG Network Computing and Security Tech.Key Lab.of Shaanxi Province Xi'an University of Technology Xi' College of Electronics and Information Xi'an Polytechnic University Xi'an 710048 China Network Computing and Security Tech.Key Lab.of Shaanxi Province Xi'an University of Technology Xi'
The flooding of adult short message has become an urgent problem of safety of message content. Existing researches on short message filtering pay much attention to rubbish and advertising short messages, and the granu... 详细信息
来源: 评论
Quick Finding of network Video Stream
Quick Finding of Network Video Stream
收藏 引用
International Conference on Computer Science and Information technology (CSIT)
作者: Qindong Sun Shengli Li Xiaojun Guo Network Computing and Security Key Laboratory of Shaanxi Xi'an University of Technology Xi'an China School of Electronics and Information Engineering Xi'an Jiaotong University Xi'an China Department of Research and Development Xi'an Anzhi Science and Technology Corporation Xi'an China
network video technology develops quickly in recent years and the applications of network video are various. The effectively managing of the application based on network video is necessary for network flow management,... 详细信息
来源: 评论
Provable Efficient Certificateless Group key Exchange Protocol
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 41-45页
作者: CAO Chunjie MA Jianfeng MOON Sangjae Key Laboratory of Computer Networks and InformationSecurity Ministry of Education Xidian University Xi' an 710071Shaanxi China Mobile Network Security Technology Research Center Kyungpook National University Daeyu 702701 Korea
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present ... 详细信息
来源: 评论
A pairing-based signcryption scheme using self-certified public keys
收藏 引用
International Journal of Computers and Applications 2007年 第3期29卷 278-282页
作者: Li, F. Xin, X. Hu, Y. School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu Sichuan 610054 China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou Henan 450002 China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an Shaanxi 710071 China
In recent years, many pairing-based signcryption schemes have been proposed. There is, however, an inherent weakness in these schemes: the private key escrow problem, in which the "trusted" private key gener... 详细信息
来源: 评论
Robust Disaster Recovery System Model
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第1期11卷 170-174页
作者: WANG Kun SU Rui-dan LI Zeng-xin CAI Zhen ZHOU Li-hua Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi' an 710071 Shaanxi China National Information Security Engineering and Technology Research Center Beijing 100093 China
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarante... 详细信息
来源: 评论