咨询与建议

限定检索结果

文献类型

  • 324 篇 期刊文献
  • 14 篇 会议

馆藏范围

  • 338 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 91 篇 计算机科学与技术...
    • 41 篇 电子科学与技术(可...
    • 37 篇 机械工程
    • 35 篇 软件工程
    • 34 篇 信息与通信工程
    • 34 篇 控制科学与工程
    • 34 篇 网络空间安全
    • 33 篇 仪器科学与技术
    • 20 篇 材料科学与工程(可...
    • 11 篇 化学工程与技术
    • 8 篇 光学工程
    • 7 篇 电气工程
    • 5 篇 交通运输工程
    • 4 篇 土木工程
    • 4 篇 船舶与海洋工程
    • 4 篇 公安技术
  • 81 篇 理学
    • 22 篇 物理学
    • 18 篇 数学
    • 10 篇 生物学
    • 8 篇 化学
    • 8 篇 系统科学
    • 6 篇 大气科学
    • 4 篇 地球物理学
  • 45 篇 医学
    • 31 篇 临床医学
    • 5 篇 药学(可授医学、理...
  • 35 篇 管理学
    • 34 篇 管理科学与工程(可...
  • 13 篇 军事学
    • 13 篇 军队指挥学
  • 11 篇 农学
    • 4 篇 作物学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 艺术学
  • 4 篇 法学
  • 1 篇 文学

主题

  • 19 篇 deep learning
  • 7 篇 blockchain
  • 5 篇 privacy protecti...
  • 5 篇 convolutional ne...
  • 4 篇 network
  • 4 篇 wireless sensor ...
  • 4 篇 security
  • 4 篇 data
  • 3 篇 analysis
  • 3 篇 structure
  • 3 篇 live forensics
  • 3 篇 programming
  • 3 篇 image segmentati...
  • 3 篇 path planning
  • 3 篇 time delay
  • 3 篇 smart contract
  • 3 篇 numerical simula...
  • 3 篇 feature extracti...
  • 3 篇 memory analysis
  • 3 篇 social network

机构

  • 10 篇 shandong provinc...
  • 8 篇 information secu...
  • 6 篇 school of comput...
  • 6 篇 shandong provinc...
  • 5 篇 school of physic...
  • 5 篇 shandong provinc...
  • 4 篇 state key labora...
  • 4 篇 university of ch...
  • 4 篇 college of infor...
  • 4 篇 shandong compute...
  • 4 篇 ieee
  • 4 篇 shandong provinc...
  • 4 篇 information secu...
  • 4 篇 school of comput...
  • 4 篇 school of optica...
  • 4 篇 school of comput...
  • 4 篇 shandong provinc...
  • 3 篇 qilu university ...
  • 3 篇 shandong provinc...
  • 3 篇 key laboratory o...

作者

  • 8 篇 yangjian cai
  • 6 篇 hong liu
  • 5 篇 jieren cheng
  • 5 篇 徐淑奖
  • 5 篇 hao zhang
  • 5 篇 xiu-bo chen
  • 5 篇 陈秀波
  • 5 篇 dongjie zhu
  • 5 篇 qiwen zhan
  • 5 篇 yang li
  • 5 篇 weijia zhou
  • 4 篇 jinghui zhang
  • 4 篇 jun liu
  • 4 篇 ning cao
  • 4 篇 钮心忻
  • 4 篇 chengliang zhao
  • 4 篇 wei wang
  • 4 篇 杨义先
  • 4 篇 xingyuan lu
  • 4 篇 li ye

语言

  • 303 篇 英文
  • 35 篇 中文
检索条件"机构=Shandong Computer Science Center Shandong Provincial Key Laboratory of computer Network"
338 条 记 录,以下是11-20 订阅
排序:
Path Recognition Algorithm of Tracking Robots Based on Image Sensor
收藏 引用
Journal of Donghua University(English Edition) 2014年 第2期31卷 137-140页
作者: 韩华 曹志强 胡一帆 方易圆 黄镇 College of Electronic and Electrical Engineering Shanghai University of Engineering Science shandong computer science center shandong provincial key laboratory of computer network
Path recognition is an inevitable core technology in the development of tracking robot. In this paper,the path tracking system of tracking robot can be realized by image sensor module based on camera to obtain lane im... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
PRNU Extraction from Stabilized Video:A Patch Maybe Better than a Bunch
收藏 引用
computer Systems science & Engineering 2021年 第1期36卷 189-200页
作者: Bin Ma Yuanyuan Hu Jian Li Chunpeng Wang Meihong Yang Yang Zheng Qilu University of Technology(shandong Academy of sciences) Shandong Provincial Key Laboratory of Computer NetworksJinan250353China shandong computer science center Shandong Provincial Key Laboratory of Computer NetworksJinan250014China University of Connecticut MansfieldCT06269USA
This paper presents an algorithm to solve the problem of Photo-Response Non-Uniformity(PRNU)noise facing stabilized *** stabilized video undergoes in-camera processing like rolling shutter ***,misalignment exists betw... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
收藏 引用
Chinese Physics B 2013年 第6期22卷 199-202页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information Security center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications shandong provincial key laboratory of computer network Shandong Computer Science Center State key laboratory of Information Security (Institute of Information EngineeringChinese Academy of Sciences)
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of PRIMATEs
收藏 引用
science China(Information sciences) 2020年 第1期63卷 130-139页
作者: Yanbin LI Meiqin WANG Wenqing LIU Wei WANG key laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University shandong provincial key laboratory of computer networks
PRIMATEs is a family of authenticated encryption design submitted to competition for authenticated encryption: security, applicability, and robustness. The three modes of operation in PRIMATEs family are: APE, HANUMAN... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
收藏 引用
Communications in Theoretical Physics 2013年 第5期59卷 547-553页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information Security center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications shandong provincial key laboratory of computer network Shandong Computer Science Center State key laboratory of Information Security (Institute of Information Engineering Chinese Academy of Sciences)
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States
收藏 引用
Communications in Theoretical Physics 2016年 第6期65卷 705-710页
作者: 徐淑奖 陈秀波 王连海 丁青艳 张淑慧 shandong provincial key laboratory of computer networks Shandong Computer Science Center (National Supercomputer Center in Jinan) Information Security center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good sym... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
High-efficiency quantum steganography based on the tensor product of Bell states
收藏 引用
science China(Physics,Mechanics & Astronomy) 2013年 第9期56卷 1745-1754页
作者: XU ShuJiang CHEN XiuBo NIU XinXin YANG YiXian Information Security center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications shandong provincial key laboratory of computer network Shandong Computer Science Center State key laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first pa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
收藏 引用
computer Modeling in Engineering & sciences 2024年 第6期139卷 3311-3327页
作者: Shujiang Xu Ziye Wang Lianhai Wang Miodrag J.Mihaljevi′c Shuhui Zhang Wei Shao Qizheng Wang key laboratory of Computing Power network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China shandong provincial key laboratory of computer networks Shandong Fundamental Research Center for Computer ScienceJinan250014China Mathematical Institute The Serbian Academy of Sciences and ArtsBelgrade11000Serbia
Blockchain technology,with its attributes of decentralization,immutability,and traceability,has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business ***,transaction perfo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Planning the obstacle-avoidance trajectory of mobile anchor in 3D sensor networks
收藏 引用
science China(Information sciences) 2015年 第10期58卷 109-118页
作者: SHU MingLei CUI HuanQing WANG YingLong WANG Cheng-Xiang School of Information science and Engineering Shandong University shandong provincial key laboratory of computer networks Shandong Computer Science Center (National Supercomputer Center in Jinan) College of Information science and Engineering Shandong University of Science and Technology Institute of Sensors Signals and Systems School of Engineering & Physical SciencesHeriot-Watt University
Localization plays an important role in many applications of wireless sensor networks. Recently,mobile anchor assisted localization methods become promising, and the moving trajectory planning of anchor is an interest... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Neural network-Based State Estimation for Nonlinear Systems With Denial-of-Service Attack Under Try-Once-Discard Protocol
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第10期11卷 2182-2184页
作者: Xueli Wang Shangwei Zhao Ming Yang Xin Wang Xiaoming Wu the key laboratory of Computing Power network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan 250014 shandong provincial key laboratory of computer networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)*** specifically,to reduce the communication burden... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论