咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是2351-2360 订阅
排序:
On the resistance of Boolean functions against fast algebraic attacks
On the resistance of Boolean functions against fast algebrai...
收藏 引用
14th International Conference on information security and Cryptology, ICISC 2011
作者: Du, Yusong Zhang, Fangguo Liu, Meicheng School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China Key Lab. of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
Boolean functions with large algebraic immunity resist algebraic attacks to a certain degree, but they may not resist fast algebraic attacks (FAA's). It is necessary to study the resistance of Boolean functions ag... 详细信息
来源: 评论
PASS: An adaptive multi-copy routing scheme for intermittently connected mobile Ad Hoc networks
收藏 引用
Journal of Convergence information Technology 2012年 第14期7卷 315-323页
作者: Xu, Jia Wang, Ru Chuan Sun, Li Juan College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing China Key Laboratory for Computer Network and Information Integration Southeast University Ministry of Education Nanjing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Intermittently Connected Mobile Ad Hoc networks (ICMANs) are mobile networks in which complete source-to-destination paths do not exist most of the time. This paper proposed a Predictable Adaptive Seed Spray routing (... 详细信息
来源: 评论
Binary particle swarm optimization with multiple evolutionary strategies
收藏 引用
Science China(information Sciences) 2012年 第11期55卷 2485-2494页
作者: ZHAO Jing1,HAN ChongZhao1 & WEI Bin2 1Ministry of Education key lab For Intelligent networks and network security,State key laboratory for Manufacturing Systems Engineering,Institute of Integrated Automation,School of Electronics and information Engineering,Xi'an Jiaotong University,Xi'an 710049,China 2Institute of System Engineering,School of Electronics and information Engineering,Xi'an Jiaotong University,Xi'an 710049,China 1. Ministry of Education Key Lab For Intelligent Networks and Network Security State Key Laboratory for Manufacturing Systems Engineering Institute of Integrated Automation School of Electronics and Information Engineering Xi’an Jiaotong University Xi’an 710049 China2. Institute of System Engineering School of Electronics and Information Engineering Xi’an Jiaotong University Xi’an 710049 China
This paper introduces a novel variation of binary particle swarm optimization(BPSO) algorithm and a further extension to improve its ***,mimicking the behaviors of some creatures group,multiple evolutionary strategies... 详细信息
来源: 评论
Intrusion-resilient identity-based signature: security definition and construction
Intrusion-resilient identity-based signature: Security defin...
收藏 引用
作者: Yu, Jia Kong, Fanyu Cheng, Xiangguo Hao, Rong Fan, Jianxi College of Information Engineering Qingdao University 266071 Qingdao China Shandong Provincial Key Laboratory of Computer Network 250014 Jinan China Institute of Network Security Shandong University 250100 Jinan China School of Computer Science and Technology Soochow University 215006 Suzhou China
Traditional identity-based signatures depend on the assumption that secret keys are absolutely secure. Once a secret key is exposed, all signatures associated with this secret key have to be reissued. Therefore, limit... 详细信息
来源: 评论
High capacity steganographic method based upon quantization error of JPEG
High capacity steganographic method based upon quantization ...
收藏 引用
2012 2nd International Conference on computer Application and System Modeling, ICCASM 2012
作者: Dong, Xiuze Liu, Shu Zhang, Ru Niu, Xinxin Wang, Lifeng Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China Electronic and Information Engineering Department Beijing Electronic Science and Technology Institute Beijing 100070 China Key Laboratory of Information Network Security Ministry of Public Security Shanghai 201204 China Computer Science and Technology Department Beijing Electronic Science and Technology Institute Beijing 100070 China
Quantizing Error during the process of JPEG compression is analyzed, and a new information hiding algorithm is proposed based on Quantizing Error of JPEG image. Experimental results show that the proposed algorithm ca... 详细信息
来源: 评论
SSOP: Secure Storage Outsourcing Protocols in Mobile Cloud Computing
SSOP: Secure Storage Outsourcing Protocols in Mobile Cloud C...
收藏 引用
2012 IEEE 14th International Conference on Communication Technology
作者: Xiao Liu Rui Jiang Huafeng Kong School of Information Science and Engineering Southeast University Key Lab of Information Network Security Ministry of Public Security
With the rapid spread of Smartphones and the development of access technologies such as 3G 4G Wifi and LTE,mobile cloud computing has greatly enhanced the storage and computing ability of mobile ***,a series of securi... 详细信息
来源: 评论
Efficient (t, n) secret sharing scheme against cheating
收藏 引用
Journal of Computational information Systems 2012年 第9期8卷 3815-3821页
作者: Liu, Yanxiao Zhang, Yuqing Hu, Yupu Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University China National Computer Network Intrusion Protection Center GUCAS China
A (t, n) secret sharing (SS) scheme can be divided into two protocols: share generation protocol and secret reconstruction protocol. In share generation protocol, a mutually trusted dealer selects a secret and distrib... 详细信息
来源: 评论
Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models
收藏 引用
Science China(information Sciences) 2012年 第4期55卷 911-920页
作者: WANG Chao 1,ZHANG HuanGuo 2,3 & LIU LiLi 4 1 key lab of Specialty Fiber Optics and Optical Access network,Ministry of Education,Shanghai University,Shanghai 200072,China 2 computer School of Wuhan University,Wuhan 430072,China 3 key laboratory of Aerospace information security and Trusted Computing Ministry of Education,Wuhan 430072,China 4 Huawei Technologies CO.LTD.,Shanghai 201206,China 1. Key Lab of Specialty Fiber Optics and Optical Access Network Ministry of Education Shanghai University Shanghai 200072 China2. Computer School of Wuhan University Wuhan 430072 China3. Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan 430072 China4. Huawei Technologies CO. LTD. Shanghai 201206 China
Considering potential attacks from cloud-computing and quantum-computing,it is becoming nec-essary to provide higher security elliptic *** hidden Markov models are introduced for designing the trace-vector computation... 详细信息
来源: 评论
Research on Separation of Three Powers Architecture for Trusted OS
收藏 引用
Physics Procedia 2012年 25卷 1168-1175页
作者: Yu Li Yong Zhao Siyuan Xin College of Computer Science and Technology Beijing University of Technology Beijing 100124 China Key Lab of Information Network Security Ministry of Public Security Shanghai 201204 China Institute of Electronic Technology the PLA Information Engineering University
The privilege in the operating system (OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control,... 详细信息
来源: 评论
A fault-tolerant multicast tree approach based on the family hierarchy tunnel
A fault-tolerant multicast tree approach based on the family...
收藏 引用
16th International Conference on Mechatronics Technology, ICMT 2012
作者: Zhou, Yan-Ling Shen, Yu-Feng Key Lab. of Network and Intelligent Information Processing Department of Computer Science and Technology University Hefei Anhui China Computer Science and Technology Anhui Sanlian University Hefei Anhui China
Fault-tolerant recovery in Multicast communication is an important issue. An ideal multicast fault-tolerant approach can save network resources, reduce the delay and cost, realize quick recovery. In this paper, we pro... 详细信息
来源: 评论