咨询与建议

限定检索结果

文献类型

  • 222 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 225 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 151 篇 工学
    • 55 篇 计算机科学与技术...
    • 25 篇 软件工程
    • 19 篇 机械工程
    • 19 篇 网络空间安全
    • 17 篇 材料科学与工程(可...
    • 13 篇 矿业工程
    • 12 篇 仪器科学与技术
    • 9 篇 控制科学与工程
    • 9 篇 化学工程与技术
    • 7 篇 环境科学与工程(可...
    • 6 篇 信息与通信工程
    • 6 篇 测绘科学与技术
    • 6 篇 地质资源与地质工...
    • 5 篇 生物工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 兵器科学与技术
    • 3 篇 水利工程
    • 3 篇 轻工技术与工程
  • 38 篇 农学
    • 14 篇 作物学
    • 7 篇 农业资源与环境
    • 7 篇 畜牧学
    • 6 篇 植物保护
    • 3 篇 兽医学
  • 34 篇 医学
    • 18 篇 临床医学
    • 5 篇 公共卫生与预防医...
    • 4 篇 护理学(可授医学、...
    • 3 篇 基础医学(可授医学...
  • 25 篇 理学
    • 10 篇 生物学
    • 4 篇 生态学
  • 12 篇 管理学
    • 9 篇 管理科学与工程(可...
  • 3 篇 艺术学
  • 2 篇 历史学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 8 篇 数字水印
  • 5 篇 马铃薯
  • 5 篇 信息隐藏
  • 5 篇 无底柱分段崩落法
  • 4 篇 鲁棒性
  • 4 篇 文本数字水印
  • 4 篇 健壮
  • 4 篇 深度学习
  • 4 篇 家蚕
  • 3 篇 透明
  • 3 篇 数字音频水印
  • 3 篇 软件水印
  • 3 篇 长链非编码rna
  • 3 篇 版权保护
  • 3 篇 小波变换
  • 3 篇 差错控制
  • 3 篇 数据库水印
  • 3 篇 热压
  • 2 篇 object detection
  • 2 篇 空间分布

机构

  • 36 篇 湖南大学
  • 9 篇 湖北省农业科学院...
  • 9 篇 山东工业职业学院
  • 8 篇 西南科技大学
  • 7 篇 中交公路规划设计...
  • 7 篇 株洲工学院
  • 6 篇 甘肃省定西市植保...
  • 5 篇 school of comput...
  • 5 篇 南京信息工程大学
  • 4 篇 jiangsu engineer...
  • 4 篇 燕山大学
  • 4 篇 哈尔滨医科大学附...
  • 4 篇 怀化医学高等专科...
  • 3 篇 复旦大学
  • 3 篇 wuxi research in...
  • 3 篇 国防科技大学
  • 3 篇 jiangsu collabor...
  • 3 篇 engineering rese...
  • 3 篇 清华大学
  • 3 篇 大连海事大学

作者

  • 51 篇 孙星明
  • 28 篇 xingming sun
  • 9 篇 孙兴明
  • 9 篇 胡兴明
  • 9 篇 袁兴明
  • 8 篇 孙波
  • 8 篇 陈星明
  • 7 篇 周洪英
  • 7 篇 吴洪丽
  • 6 篇 白雪
  • 6 篇 王星明
  • 6 篇 孙玉强
  • 6 篇 chengsheng yuan
  • 6 篇 李跃强
  • 6 篇 zichao li
  • 5 篇 张志贵
  • 5 篇 hongliang zhang
  • 5 篇 叶建美
  • 5 篇 jinjie li
  • 5 篇 zhanying zhang

语言

  • 185 篇 中文
  • 40 篇 英文
检索条件"作者=xingming SUN"
225 条 记 录,以下是1-10 订阅
排序:
Fingerprint Liveness Detection Based on Multi-Scale LPQ and PCA
收藏 引用
China Communications 2016年 第7期13卷 60-65页
作者: Chengsheng Yuan xingming sun Rui Lv School of Computer and Software Nanjing University of Information Science & Technology Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology
Fingerprint authentication system is used to verify users' identification according to the characteristics of their ***,this system has some security and privacy *** example,some artificial fingerprints can trick the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Semantic and secure search over encrypted outsourcing cloud based on BERT
收藏 引用
Frontiers of Computer Science 2022年 第2期16卷 152-159页
作者: Zhangjie FU Yan WANG xingming sun Xiaosong ZHANG Engineering Research Center of Digital Forensice Ministry of EducationNanjing University of Information Science and TechnologyNanjing 210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 210044China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Efficient Algorithm for K-Barrier Coverage Based on Integer Linear Programming
收藏 引用
China Communications 2016年 第7期13卷 16-23页
作者: Yanhua Zhang xingming sun Baowei Wang Nanjing University of Information Science&Technology NanjingChina Jiangsu Lightning Protection Center NanjingChina
Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of ***,in certain applications,barrier coverage cannot be satisfied after random **... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Robust Watermarking of Screen-Photography Based on JND
收藏 引用
Computers, Materials & Continua 2022年 第6期71卷 4819-4833页
作者: Siyu Gu JinHan xingming sun Yi Cao Nanjing University of Information Science&Technology Nanjing210044China Engineering Research Center of Digital Forensics Ministry of EducationNanjing201144China Department of Electrical and Computer Engineering University of Windsor401 Sunset AvenueWindsorONN9B 3P4Canada
With the popularity of smartphones,it is often easy to maliciously leak important information by taking pictures of the *** watermarking that can resist screen photography can achieve the protection of *** the screen ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection
收藏 引用
Computers, Materials & Continua 2022年 第5期71卷 3035-3050页
作者: Xiaorui Zhang Xun sun xingming sun Wei sun sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
The leakage of medical audio data in telemedicine seriously violates the privacy of *** order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algorithm is p... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Coverless Information Hiding Based on the Molecular Structure Images of Material
收藏 引用
Computers, Materials & Continua 2018年 第2期54卷 197-207页
作者: Yi Cao Zhili Zhou xingming sun Chongzhi Gao School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNO.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Electrical and computer Engineering University of Windsor401 Sunset AvenueWindsorONCanada N9B 3P4 School of Computer Science Guangzhou UniversityWaihuanxi RoadNo.230Guangzhou510006China
The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the *** this way,it is hard to resist the detection of steganalysi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Quantum network coding for multi-unicast problem based on 2D and 3D cluster states
收藏 引用
Science China(Information Sciences) 2016年 第4期59卷 5-19页
作者: Jing LI Xiubo CHEN xingming sun Zongpeng LI Yixian YANG Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Department of Computer Science University of Calgary School of Computer and Software Nanjing University of Information Science & Technology
We mainly consider quantum multi-unicast problem over directed acyclic network, where each source wishes to transmit an independent message to its target via bottleneck channel. Taking the advantage of global entangle... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection
收藏 引用
Computer Systems Science & Engineering 2022年 第6期41卷 1043-1056页
作者: Xiaorui Zhang Wenfang Zhang Wei sun xingming sun sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszowVoivodeship100031Poland
In a telemedicine diagnosis system,the emergence of 3D imaging enables doctors to make clearer judgments,and its accuracy also directly affects doctors’diagnosis of the *** order to ensure the safe transmission and s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
AMDnet:An Academic Misconduct Detection Method for Authors’Behaviors
收藏 引用
Computers, Materials & Continua 2022年 第6期71卷 5995-6009页
作者: Shihao Zhou Ziyuan Xu JinHan xingming sun Yi Cao Nanjing University of Information Science&Technology Nanjing210044China Engineering Research Center of Digital Forensics Ministry of EducationNanjing201144China Nanjing University(Suzhou)High and New Technology Research Institute Suzhou215123China Jiangsu Union Technical Institute Wuxi214145China Department of Electrical and Computer Engineering University of WindsorONN9B 3P4Canada
In recent years,academic misconduct has been frequently exposed by the media,with serious impacts on the academic *** research on academic misconduct focuses mainly on detecting plagiarism in article content through t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Fusion Steganographic Algorithm Based on Faster R-CNN
收藏 引用
Computers, Materials & Continua 2018年 第4期55卷 1-16页
作者: Ruohan Meng Steven G.Rice Jin Wang xingming sun School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Mathematics and Computer Science Northeastern State University TahlequahOK 74464USA School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China
The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover *** secret messag... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论