咨询与建议

限定检索结果

文献类型

  • 214 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 146 篇 工学
    • 65 篇 计算机科学与技术...
    • 27 篇 材料科学与工程(可...
    • 23 篇 电气工程
    • 20 篇 机械工程
    • 17 篇 信息与通信工程
    • 17 篇 网络空间安全
    • 15 篇 仪器科学与技术
    • 14 篇 电子科学与技术(可...
    • 12 篇 矿业工程
    • 11 篇 控制科学与工程
    • 9 篇 软件工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 生物医学工程(可授...
    • 7 篇 化学工程与技术
    • 7 篇 轻工技术与工程
    • 5 篇 冶金工程
    • 4 篇 生物工程
  • 60 篇 理学
    • 17 篇 生物学
    • 16 篇 数学
    • 13 篇 化学
    • 5 篇 物理学
    • 5 篇 天文学
    • 5 篇 生态学
  • 37 篇 医学
    • 22 篇 临床医学
    • 6 篇 基础医学(可授医学...
  • 28 篇 农学
    • 8 篇 作物学
    • 6 篇 植物保护
    • 5 篇 园艺学
    • 5 篇 畜牧学
    • 4 篇 农业资源与环境
  • 4 篇 法学
  • 4 篇 管理学
  • 2 篇 教育学
  • 2 篇 历史学
  • 1 篇 文学

主题

  • 8 篇 数字水印
  • 5 篇 信息隐藏
  • 5 篇 无底柱分段崩落法
  • 5 篇 马铃薯
  • 4 篇 文本数字水印
  • 4 篇 健壮
  • 4 篇 鲁棒性
  • 4 篇 家蚕
  • 3 篇 数字音频水印
  • 3 篇 软件水印
  • 3 篇 数据库水印
  • 3 篇 热压
  • 3 篇 pca
  • 3 篇 透明
  • 3 篇 长链非编码rna
  • 3 篇 版权保护
  • 3 篇 小波变换
  • 3 篇 差错控制
  • 3 篇 深度学习
  • 2 篇 能量比较

机构

  • 36 篇 湖南大学
  • 9 篇 湖北省农业科学院...
  • 8 篇 西南科技大学
  • 7 篇 山东工业职业学院
  • 7 篇 株洲工学院
  • 6 篇 甘肃省定西市植保...
  • 5 篇 school of comput...
  • 5 篇 中交公路规划设计...
  • 5 篇 南京信息工程大学
  • 4 篇 燕山大学
  • 4 篇 哈尔滨医科大学附...
  • 4 篇 怀化医学高等专科...
  • 4 篇 jiangsu engineer...
  • 3 篇 wuxi research in...
  • 3 篇 国防科技大学
  • 3 篇 大连海事大学
  • 3 篇 nanjing universi...
  • 3 篇 重庆大学
  • 3 篇 中山大学附属东华...
  • 3 篇 首钢集团有限公司...

作者

  • 51 篇 孙星明
  • 25 篇 xingming sun
  • 9 篇 胡兴明
  • 8 篇 陈星明
  • 8 篇 孙兴明
  • 8 篇 孙波
  • 7 篇 周洪英
  • 7 篇 吴洪丽
  • 7 篇 袁兴明
  • 6 篇 chengsheng yuan
  • 6 篇 白雪
  • 6 篇 王星明
  • 6 篇 李跃强
  • 5 篇 张志贵
  • 5 篇 魏周全
  • 5 篇 孙宇超
  • 5 篇 叶建美
  • 5 篇 孙静
  • 4 篇 肖湘蓉
  • 4 篇 姜兴明

语言

  • 182 篇 中文
  • 35 篇 英文
检索条件"作者=Xingming Sun"
217 条 记 录,以下是1-10 订阅
排序:
Fingerprint Liveness Detection Based on Multi-Scale LPQ and PCA
收藏 引用
China Communications 2016年 第7期13卷 60-65页
作者: Chengsheng Yuan Xingming Sun Rui Lv School of Computer and Software Nanjing University of Information Science & Technology Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology
Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints.However,this system has some security and privacy problems.For example,some artificial f... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Efficient Algorithm for K-Barrier Coverage Based on Integer Linear Programming
收藏 引用
China Communications 2016年 第7期13卷 16-23页
作者: Yanhua Zhang Xingming Sun Baowei Wang Nanjing University of Information Science&Technology NanjingChina Jiangsu Lightning Protection Center NanjingChina
Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in certain applications,barrier coverage cannot be satisfied af... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Coverless Information Hiding Based on the Molecular Structure Images of Material
收藏 引用
Computers, Materials & Continua 2018年 第2期54卷 197-207页
作者: Yi Cao Zhili Zhou Xingming Sun Chongzhi Gao School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNO.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Electrical and computer Engineering University of Windsor401 Sunset AvenueWindsorONCanada N9B 3P4 School of Computer Science Guangzhou UniversityWaihuanxi RoadNo.230Guangzhou510006China
The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steg... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Semantic and secure search over encrypted outsourcing cloud based on BERT
收藏 引用
Frontiers of Computer Science 2022年 第2期16卷 152-159页
作者: Zhangjie FU Yan WANG Xingming Sun Xiaosong ZHANG Engineering Research Center of Digital Forensice Ministry of EducationNanjing University of Information Science and TechnologyNanjing 210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 210044China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China
Searchable encryption provides an effective way for data security and privacy in cloud storage.Users can retrieve encrypted data in the cloud under the premise of protecting their own data security and privacy.However... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Steganography Algorithm Based on Instance Segmentation
收藏 引用
Computers, Materials & Continua 2020年 第4期63卷 183-196页
作者: Ruohan Meng Qi Cui Zhili Zhou Chengsheng Yuan Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Centre of Network Monitoring Nanjing210044China Department of Electrical and Computer Engineering University of WindsorWindsorCanada
Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and aro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection
收藏 引用
Computers, Materials & Continua 2022年 第5期71卷 3035-3050页
作者: Xiaorui Zhang Xun sun Xingming Sun Wei sun sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algori... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Robust Watermarking of Screen-Photography Based on JND
收藏 引用
Computers, Materials & Continua 2022年 第6期71卷 4819-4833页
作者: Siyu Gu JinHan Xingming Sun Yi Cao Nanjing University of Information Science&Technology Nanjing210044China Engineering Research Center of Digital Forensics Ministry of EducationNanjing201144China Department of Electrical and Computer Engineering University of Windsor401 Sunset AvenueWindsorONN9B 3P4Canada
With the popularity of smartphones,it is often easy to maliciously leak important information by taking pictures of the phone.Robust watermarking that can resist screen photography can achieve the protection of inform... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Quantum network coding for multi-unicast problem based on 2D and 3D cluster states
收藏 引用
Science China(Information Sciences) 2016年 第4期59卷 5-19页
作者: Jing LI Xiubo CHEN Xingming Sun Zongpeng LI Yixian YANG Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Department of Computer Science University of Calgary School of Computer and Software Nanjing University of Information Science & Technology
We mainly consider quantum multi-unicast problem over directed acyclic network, where each source wishes to transmit an independent message to its target via bottleneck channel. Taking the advantage of global entangle... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Fusion Steganographic Algorithm Based on Faster R-CNN
收藏 引用
Computers, Materials & Continua 2018年 第4期55卷 1-16页
作者: Ruohan Meng Steven G.Rice Jin Wang Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Mathematics and Computer Science Northeastern State University TahlequahOK 74464USA School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China
The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover media.The secret ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Rasterized Lightning Disaster Risk Method for Imbalanced Sets Using Neural
收藏 引用
Computers, Materials & Continua 2021年 第1期66卷 563-574页
作者: Yan Zhang Jin Han Chengsheng Yuan Shuo Yang Chuanlong Li Xingming Sun Nanjing University of Information Science&Technology Nanjing210044China Engineering Research Center of Digital Forensics Ministry of EducationNanjing201144China Waterford Institute of Technology WaterfordX91K0EKIreland
Over the past 10 years,lightning disaster has caused a large number of casualties and considerable economic loss worldwide.Lightning poses a huge threat to various industries.In an attempt to reduce the risk of lightn... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论