咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是131-140 订阅
排序:
Frequent itemset mining over stream data: Overview
Frequent itemset mining over stream data: Overview
收藏 引用
IET International Conference on Information and Communications Technologies, IETICT 2013
作者: Qu, Z.G. Niu, X.X. Deng, J. McArdle, C. Wang, X.J. Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China School of Electronic Engineering Dublin City University Dublin Ireland Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China
During the past decade, stream data mining has been attracting widespread attentions of the experts and the researchers all over the world and a large number of interesting research results have been achieved. Among t... 详细信息
来源: 评论
Privacy-preserving MAX/MIN aggregation in wireless sensor networks
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第6期4卷 272-280页
作者: Yao, Yonglei Ma, Li Liu, Jingfa Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
In-network data aggregation has been adopted widely to reduce communication overhead and improve efficiency in wireless sensor networks. On the other hand, security is another basic requirement for wireless sensor net... 详细信息
来源: 评论
Efficient and secure multi-keyword ranked search over encrypted office open XML data
收藏 引用
Journal of Computational Information Systems 2015年 第7期11卷 2701-2708页
作者: Xi, Jie Sun, Xingming Fu, Zhangjie Zhang, Youdong Xin, Lin Cao, Xinyue School of Computer & Software Nanjing University of Information Science & Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing China Department of Computer Engineering Huaiyin Institute of Technology Huaian China
As cloud computing goes increasingly mature, searchable encryption schemes have been widely applied to the real world. Those not only provide high efficiency but also protect users' privacy well. However, the exis... 详细信息
来源: 评论
Hybrid Additive Multi-Watermarking Decoder
Hybrid Additive Multi-Watermarking Decoder
收藏 引用
第十届全国信息隐藏暨多媒体信息安全学术大会CIHW2012
作者: Jinwei WANG Xingming SUN Yuhui ZHENG Jin HAN Zhihua XIA Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology College of Computer and Software Nanjing University of Information Science and Technology China
With the development of the cloud environment, the multi-copyright protection of the works should be further developing. The multi-watermarking is becoming a possible solution. In this paper, firstly, one novel hybrid... 详细信息
来源: 评论
A comparative study on routing protocols in underwater sensor networks
A comparative study on routing protocols in underwater senso...
收藏 引用
Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, HumanCom and EMC 2013
作者: Shen, Jian Wang, Jin Zhang, Jianwei Wang, Shunfeng School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China College of Mathematics and Statistics Nanjing University of Information Science and Technology Nanjing 210044 China College of Bin Jiang Nanjing University of Information Science and Technology Nanjing 210044 China
Underwater sensor networks (UWSNs) are a class of emerging networks that experience variable and high propagation delays and limited available bandwidth. Because of the different environment under the ocean, the whole... 详细信息
来源: 评论
A novel verifiably encrypted signature from weil pairing
A novel verifiably encrypted signature from weil pairing
收藏 引用
Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, HumanCom and EMC 2013
作者: Shen, Jian Wang, Jin Zheng, Yuhui Zhang, Jianwei Wang, Shunfeng School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Mathematics and Statistics Nanjing University of Information Science and Technology Nanjing 210044 China College of Bin Jiang Nanjing University of Information Science and Technology Nanjing 210044 China
A novel efficient verifiably encrypted signature (VES) which makes use of the Weil pairing is presented in this paper. VES can be used in optimistic contract signing protocols to enable fair exchange. Compared with th... 详细信息
来源: 评论
Efficient key management scheme for SCADA system
Efficient key management scheme for SCADA system
收藏 引用
Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, HumanCom and EMC 2013
作者: Shen, Jian Wang, Jin Ren, Yongjun Zhang, Jianwei Wang, Shunfeng School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Mathematics and Statistics Nanjing University of Information Science and Technology Nanjing 210044 China College of Bin Jiang Nanjing University of Information Science and Technology Nanjing 210044 China
Currently Supervisory Control And Data Acquisition (SCADA) system intends to be connected to the open operating environment. Thus, protecting SCADA systems from malicious attacks is getting more and more attention. A ... 详细信息
来源: 评论
The Development and Application of Quantum Masking
收藏 引用
Journal of Quantum Computing 2020年 第3期2卷 151-156页
作者: Tao Chen Zhiguo Qu Yi Chen School of Computer&Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China
To solve the problem of hiding quantum information in simplified subsystems,Modi et al.[1]introduced the concept of quantum *** masking is the encoding of quantum information by composite quantum states in such a way ... 详细信息
来源: 评论
Privacy-Preserving Genetic Algorithm Outsourcing in Cloud Computing
收藏 引用
Journal of Cyber Security 2020年 第1期2卷 49-61页
作者: Leqi Jiang Zhangjie Fu College of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China
Genetic Algorithm(GA)has been widely used to solve various optimization *** the solving process of GA requires large storage and computing resources,it is well motivated to outsource the solving process of GA to the c... 详细信息
来源: 评论
Location-aware routing protocol for underwater sensor networks
Location-aware routing protocol for underwater sensor networ...
收藏 引用
Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, HumanCom and EMC 2013
作者: Shen, Jian Wang, Jin Wang, Jingwei Zhang, Jianwei Wang, Shunfeng School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Mathematics and Statistics Nanjing University of Information Science and Technology Nanjing 210044 China College of Bin Jiang Nanjing University of Information Science and Technology Nanjing 210044 China
As the network communications technology developing, a new type of networks has appeared in the daily life which is named underwater sensor networks (UWSNs). Routing protocols in UWSNs should ensure the reliability of... 详细信息
来源: 评论