咨询与建议

限定检索结果

文献类型

  • 488 篇 期刊文献
  • 18 篇 会议

馆藏范围

  • 506 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 416 篇 工学
    • 181 篇 计算机科学与技术...
    • 103 篇 网络空间安全
    • 89 篇 软件工程
    • 59 篇 电子科学与技术(可...
    • 54 篇 信息与通信工程
    • 53 篇 控制科学与工程
    • 46 篇 仪器科学与技术
    • 43 篇 机械工程
    • 11 篇 地质资源与地质工...
    • 10 篇 化学工程与技术
    • 8 篇 光学工程
    • 8 篇 环境科学与工程(可...
    • 7 篇 动力工程及工程热...
    • 7 篇 矿业工程
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
  • 113 篇 理学
    • 48 篇 数学
    • 27 篇 物理学
    • 13 篇 系统科学
    • 6 篇 化学
    • 6 篇 生物学
    • 5 篇 大气科学
    • 5 篇 统计学(可授理学、...
  • 86 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 7 篇 公共管理
  • 28 篇 军事学
    • 28 篇 军队指挥学
  • 18 篇 医学
    • 12 篇 临床医学
  • 15 篇 农学
    • 6 篇 作物学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 5 篇 艺术学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 法学
  • 1 篇 历史学

主题

  • 16 篇 security
  • 14 篇 deep learning
  • 13 篇 data mining
  • 10 篇 blockchain
  • 10 篇 cloud computing
  • 9 篇 machine learning
  • 9 篇 cryptography
  • 7 篇 big data
  • 7 篇 authentication
  • 7 篇 encryption
  • 6 篇 privacy protecti...
  • 5 篇 mining
  • 5 篇 cryptanalysis
  • 5 篇 robustness
  • 4 篇 internet of thin...
  • 4 篇 intrusion detect...
  • 4 篇 power allocation
  • 4 篇 data security
  • 4 篇 optimization
  • 4 篇 feature extracti...

机构

  • 9 篇 guangxi key lab ...
  • 6 篇 school of comput...
  • 5 篇 college of compu...
  • 5 篇 ministry of educ...
  • 5 篇 state key labora...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 moe key lab for ...
  • 4 篇 state key labora...
  • 4 篇 institute of qua...
  • 4 篇 school of automa...
  • 4 篇 school of comput...
  • 4 篇 university of ch...
  • 4 篇 institute of inf...
  • 4 篇 china informatio...
  • 4 篇 beijing key lab ...
  • 4 篇 school of comput...
  • 4 篇 school of cyber ...
  • 4 篇 school of electr...
  • 4 篇 genome institute...

作者

  • 10 篇 kai ye
  • 7 篇 xiaofei yang
  • 5 篇 jian yu
  • 5 篇 huifang ma
  • 5 篇 zhixin li
  • 5 篇 wei chen
  • 4 篇 wei li
  • 4 篇 xianxian li
  • 4 篇 xiaohong guan
  • 4 篇 peng jia
  • 4 篇 zhen chen
  • 4 篇 hai jin
  • 4 篇 liping jing
  • 4 篇 lei zhang
  • 4 篇 kim-kwang raymon...
  • 3 篇 bin cao
  • 3 篇 junwei cao
  • 3 篇 yu wang
  • 3 篇 jiang wei
  • 3 篇 li guo

语言

  • 460 篇 英文
  • 46 篇 中文
检索条件"机构=Guangxi Key Lab of Multi‐Source Information Mining and Security"
506 条 记 录,以下是21-30 订阅
Pruning method for dendritic neuron model based on dendrite layer significance constraints
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第2期8卷 308-318页
作者: Xudong Luo Xiaohao Wen Yan Li Quanfu Li key lab of Education Blockchain and Intelligent Technology Ministry of EducationGuangxi Normal UniversityGuilinChina guangxi key lab of multi‐source information mining and security Guangxi Normal UniversityGuilinChina Teachers College for Vocational and Technical Education Guangxi Normal UniversityGuilinChina Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNew JerseryUSA College of Electronic Engineering Guangxi Normal UniversityGuilinChina
The dendritic neural model(DNM)mimics the non-linearity of synapses in the human brain to simulate the information processing mechanisms and procedures of *** enhances the understanding of biological nervous systems a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Method of multimodal Emotion Recognition in Video Learning Based on Knowledge Enhancement
收藏 引用
Computer Systems Science & Engineering 2023年 第11期47卷 1709-1732页
作者: Hanmin Ye Yinghui Zhou Xiaomei Tao School of information Science and Engineering Guilin University of TechnologyGuilin541004China guangxi key laboratory of Embedded Technology and Intelligent System Guilin University of TechnologyGuilin541004China guangxi key lab of multi-source information mining and security Guangxi Normal UniversityGuilin541004China
With the popularity of online learning and due to the significant influence of emotion on the learning effect,more and more researches focus on emotion recognition in online *** of the current research uses the commen... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Prospects on mangrove knowledge services in the smart era:From plant atlas to knowledge graphs
收藏 引用
Science China Earth Sciences 2025年 第1期68卷 111-127页
作者: Zhi-Wei HOU Wenlong JING Cheng-Zhi QIN Ji YANG Qing XIA Xiaoling YIN key laboratory of Guangdong for Utilization of Remote Sensing and Geographical information System Guangdong Open Laboratory of Geospatial Information Technology and ApplicationGuangzhou Institute of GeographyGuangdong Academy of SciencesGuangzhou510070China Southern Marine Science and Engineering Guangdong laboratory(Guangzhou) Guangzhou511458China State key laboratory of Resources and Environmental information System Institute of Geographic Sciences and Natural Resources ResearchChinese Academy of SciencesBeijing100101China College of Resources and Environment University of Chinese Academy of SciencesBeijing100049China School of Traffic&Transportation Engineering Changsha University of Science and TechnologyChangsha410114China
Mangroves are crucial to the ecological security of the Earth and human *** management,conservation,and restoration are of great importance and necessitate the support of spatio-temporal information and multidisciplin... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A secure image protection algorithm by steganography and encryption using the 2D-TSCC
收藏 引用
Chinese Physics B 2021年 第11期30卷 274-285页
作者: Qi Li Xingyuan Wang He Wang Xiaolin Ye Shuang Zhou Suo Gao Yunqing Shi School of information Science and Technology Dalian Maritime UniversityDalian 116026China guangxi key laboratory of multi-source information mining&security Guangxi Normal UniversityGuilin 541004China Dalian Hongwen Middle School Dalian 116000China School of Mathematical Sciences Chongqing Normal UniversityChongqing 401331China Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewark NJ 07102USA
Based on the two-dimensional(2D)tan-sin-cos-coupling(2D-TSCC),a new image protection method is designed,this method includes steganography and ***,a 2D-TSCC system is *** 2D-TSCC has a large parameter space in a hyper... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A multiple sensitive attributes data publishing method with guaranteed information utility
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第2期8卷 288-296页
作者: Haibin Zhu Tong Yi Songtao Shang Minyong Shi Zhucheng Li Wenqian Shang Department of Computer Science and Mathematics Nipissing UniversityNorth BayOntarioCanada key lab of Education Blockchain and Intelligent Technology Ministry of EducationGuangxi Normal UniversityGuilinChina guangxi key lab of multi‐source information mining and security Guangxi Normal UniversityGuilinChina School of Computer and Communication Engineering Zhengzhou University of Light IndustryZhengzhouChina School of Computer Science Communication University of ChinaBeijingChina Business College Beijing Union UniversityBeijingChina
Data publishing methods can provide available information for analysis while preserving *** multiple sensitive attributes data publishing,which preserves the relationship between sensitive attributes,may keep many rec... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A novel method for extracting skeleton of fruit treefrom 3D point clouds
收藏 引用
International Journal of Modeling, Simulation, and Scientific Computing 2020年 第6期11卷 78-89页
作者: Shenglian Lu Guo Li Jian Wang College of Computer Science and information Technology guangxi Normal University Guilin 541004P.R.China guangxi key lab of multi-source information mining and security No.15 Yucai Road Guilin 541004P.R.China Center of information Technology Beijing Municipal Bureau of Agriculture and Rural Affairs No.6 Yumin Middle Rood Beijing 100029P.R.China
Tree skeleton could be useful to agronomy researchers because the skeleton describes the shape and topological structure of a *** phenomenon of organs’mutual occlusion in fruit tree canopy is usually very serious,thi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Lateral Migration and Nonuniform Rotation of Square Particle Suspended in Poiseuille Flow
收藏 引用
Journal of Flow Control, Measurement & Visualization 2020年 第3期8卷 146-158页
作者: Yong Ye Huajie Zhou Sihao Zhou Zhangrong Qin Binghai Wen guangxi key lab of multi-source information mining & security Guangxi Normal University Guilin China Department of Computer Science and information Engineering Guangxi Normal University Guilin China
A square particle suspended in a Poiseuille flow is investigated by using the lattice Boltzmann method with the Galilean-invariant momentum exchange method. The lateral migration of Segré-Silberberg effect is observe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Copyright-Preserving and Fair Image Trading SchemeBased on Blockchain
收藏 引用
Tsinghua Science and Technology 2023年 第5期28卷 849-861页
作者: Feng Yu Jiahui Peng Xianxian Li Chunpei Li Bin Qu School of Computer Science&Engineering Guangxi Normal UniversityGuilin 541004Chinaand with the Key Lab of Education Blockchain and Intelligent TechnologyMinistry of EducationGuangxi Normal UniversityGuilin 541004Chinaand also with Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent ProcessingGuangxi Normal UniversityGuilin 541004China guangxi Power Grid Materials Co Ltd Nanning 530022China
With the proliferation of the Internet,particularly the rise of social media,digital images have gradually become an important part of life,and trading platforms have emerged for buying and selling ***,traditional ima... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
New Identity Based Proxy Re-Encryption Scheme from Lattices
收藏 引用
China Communications 2019年 第10期16卷 174-190页
作者: Liqiang Wu Xiaoyuan Yang Minqing Zhang Longfei Liu key lab of Network and information security Engineering University of Chinese Armed Police ForceXi’an 710086China key lab of Computer Network and information security Xi Dian UniversityXi’an 710071China
Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
On-line Modeling of Non-stationary Network Traffic with Schwarz information Criterion
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2010年 第2期15卷 213-217页
作者: 夏正敏 陆松年 李建华 铁玲 Department of Electronic Engineering key lab of information security Integrated Management Research Shanghai Jiaotong University School of information security Engineering key lab of information security Integrated Management Research Shanghai Jiaotong University
Modeling of network traffic is a fundamental building block of computer science. Measurements of network traffic demonstrate that self-similarity is one of the basic properties of the network traffic possess at large ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论