咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是2331-2340 订阅
排序:
The research of identity management services and its key devices for mobile internet
The research of identity management services and its key dev...
收藏 引用
2012 International Conference on Electrical Insulating Materials and Electrical Engineering, EIMEE 2012
作者: Yan, Ze-Ming Yang, Ming Hui Zou, Xiang The Third Research Institute of Ministry of Public Security Key Lab of Information Network Security of Ministry of Public Security Shanghai China
This paper presents an eID based solution to use for mobile internet, namely a platform structure and some key devices to realize the solution, in order to bring us an approach more secure and convenience to access on... 详细信息
来源: 评论
AOD estimation in WSN localization system with synthetic aperture technique
收藏 引用
Science China(information Sciences) 2012年 第10期55卷 2216-2225页
作者: WANG WenJie,YAO BoBin & YIN QinYe MOE key lab for Intelligent networks and network security,School of Electronic and information Engineering,Xi’an Jiaotong University,Xi’an 710049,China 1. MOE Key Lab for Intelligent Networks and Network Security School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an 710049 China
Angel of departure(AOD) based distributed localization scheme in wireless sensor networks allows the single antenna sensor node to estimate its own AOD information by an equivalent antenna array for further position *... 详细信息
来源: 评论
Nonlinearity profile test for an S-box
收藏 引用
2011 International Conference on Future Wireless networks and information Systems, ICFWI 2011
作者: Gao, Sheng Ma, Wenping Zhu, Jiwei Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China
A new security test for substitution boxes (S-boxes), the nonlinearity profile test, is presented, together with its results over the S-boxes of DES and AES. The test can be used to measure the global nonlinearity for... 详细信息
来源: 评论
Sparse SAR imaging based on L1/2 regularization
收藏 引用
Science China(information Sciences) 2012年 第8期55卷 1755-1775页
作者: ZENG JinShan,FANG Jian&XU ZongBen Institute for information and System Sciences&Ministry of Education key lab for Intelligent networks and network security,Xi'an Jiaotong University,Xi'an 710049,China 1. Institute for Information and System Sciences & Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an 710049 China
In this paper,a novel method for synthetic aperture radar(SAR)imaging is *** approach is based on L1/2 regularization to reconstruct the scattering field,which optimizes a quadratic error term of the SAR observation p... 详细信息
来源: 评论
Doppler Frequency Offsets Estimation for High-Mobility OFDM Systems
Doppler Frequency Offsets Estimation for High-Mobility OFDM ...
收藏 引用
2012 IEEE 11th International Conference on Signal Processing(ICSP 2012)
作者: Wei Guo Pengcheng Mu Qinye Yin Ke Deng Ministry of Education Key Lab for Intelligent Networks and Network Security School of Electronics and Information Engineering Xi’an Jiaotong University
In this paper, we investigate the problem of multiple Doppler frequency offsets estimation for high-mobility orthog-onal frequency division multiplexing (OFDM) systems. This scenario could arise when either the rece... 详细信息
来源: 评论
Research on the model of the survivable storage system (SSS) and its architecture
Research on the model of the survivable storage system (SSS)...
收藏 引用
3rd International Conference on computer Science and Its Applications, CSA 2011 and 2011 FTRA World Convergence Conference, WCC 2011
作者: Yang, Xiao-Yuan Wang, Jing-Jing Chen, Xiao-Feng Key Laboratory of Network and Information Security of CAPF Engineering College of CAPF Xi'an 710086 China Key Laboratory of Computer Networks and Information Security Xidian University Ministry of Education Xi'an 710071 China
In view of the present inconsistent understanding of the model definition of survivable storage network, a seven-tuple model definition and a kind of architecture of SSS were given, taking the characteristics, such as... 详细信息
来源: 评论
Robust evidence detection of copy-rotate-move forgery in image based on singular value decomposition
Robust evidence detection of copy-rotate-move forgery in ima...
收藏 引用
14th International Conference on information and Communications security, ICICS 2012
作者: Yong, Liu Meishan, Huang Bogang, Lin College of Mathematics and Computer Science Fuzhou University Fuzhou 350108 China Key Lab. of Information Security of Network Systems Fuzhou 350108 China
Region Copy-Move forgery, in which a part of the image is copied and then pasted to another part of the same image. Some important goals and sensitive objects can be hidden imperceptibly;this forgery is at the rather ... 详细信息
来源: 评论
Using IoT technologies to resolve the food safety problem - An analysis based on Chinese food standards
Using IoT technologies to resolve the food safety problem - ...
收藏 引用
2012 International Conference on Web information Systems and Mining, WISM 2012
作者: Gu, Yun Han, Weili Zheng, Lirong Jin, Bo Software School Fudan University China Key Lab of Information Network Security of Ministry of Public Security China Wuxi Institute of Fudan University China
Despite the complicated conditions in the food supply chain, we identify the risks in it based on the food related standards in China. We analyze the standards and summarize the types of the risks, then map them into ... 详细信息
来源: 评论
BIDE-based parallel mining of frequent closed sequences with MapReduce
BIDE-based parallel mining of frequent closed sequences with...
收藏 引用
12th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2012
作者: Yu, Dongjin Wu, Wei Zheng, Suhang Zhu, Zhixiang School of Computer Hangzhou Dianzi University Hangzhou China Zhejiang Provincial Key Laboratory of Network Technology and Information Security Hangzhou China
Parallel processing is essential to mining frequent closed sequences from massive volume of data in a timely manner. On the other hand, MapReduce is an ideal software framework to support distributed computing on larg... 详细信息
来源: 评论
Improving the security of n-user quantum key distribution with n quantum channels
Improving the security of n-user quantum key distribution wi...
收藏 引用
2012 2nd International Conference on computer Application and System Modeling, ICCASM 2012
作者: Liu, Xiaofen Chen, Licong Pan, Rijing Key Lab of Network Security and Cryptography School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China
In a recent paper [C.H. Hong et al., Opt. Commun. 283 (2010) 2644], a n-user quantum key distribution protocol with n quantum channels was presented. By analyzing its security, it is shown that this protocol is insecu... 详细信息
来源: 评论