咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,140 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,863 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 508 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 95 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 265 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 64 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 33 篇 shandong provinc...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,485 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2863 条 记 录,以下是2371-2380 订阅
排序:
Trust Model Based on Structured Protection for High Level security System
收藏 引用
China Communications 2012年 第11期9卷 70-77页
作者: Liao Jianhua Zhao Yong Zhan Jing School of Electronics Engineering and Computer Science Peking University Beijing 100871 P. R. China School of Computer Science and Technology Beijing University of Technology Beijing 100124 P. R. China Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 P. R. China State Key Laboratory of Information Security Institute of So ware Chinese Academy of Sciences Beijing 100049 P. R. China
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro... 详细信息
来源: 评论
Generalized geometry-based optimal power control in wireless networks
Generalized geometry-based optimal power control in wireless...
收藏 引用
2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and networks, SECON 2012
作者: Wang, Wei Shin, Kang G. Zhang, Zhaoyang Wang, Wenbo Peng, Tao Department of Information Science and Electronic Engineering Zhejiang Provincial Key Laboratory of Information Network Technology Zhejiang University Hangzhou 310027 China Department of Electrical Engineering and Computer Science University of Michigan Ann Arbor MI 48109-2121 United States Wireless Signal Processing and Networking Lab Beijing University of Posts and Telecommunications Beijing 100876 China
Geometry-based optimal power control was proposed in [14] to transform the power-control problem to a new geometrical problem on the position relationship between a line and some points. This scheme provides a novel v... 详细信息
来源: 评论
Filter-Based information Selection Mechanism in Publish/Subscribe Middleware
Filter-Based Information Selection Mechanism in Publish/Subs...
收藏 引用
2012 3rd International Conference on information Technology for Manufacturing Systems(ITMS 2012)
作者: Jigang Xiao Yunqing Chen Zhuowei Shen Systems Engineering Research Institute China State Shipbuilding Corporation Key Lab of Computer Network and Information Integration MOE School of Computer Science and Engineering Southeast University
Publish/Subscribe middleware is getting more and more attentions for its feature of loose *** some scenarios,Subscribersof a topic need not all the information belonging to that topic, but only those of interest. To f... 详细信息
来源: 评论
Track-to-Track Association in the Presence of Sensor Bias and the Relative Bias Estimation
Track-to-Track Association in the Presence of Sensor Bias an...
收藏 引用
International Conference on information Fusion
作者: Yulan Han Hongyan Zhu Chongzhao Han Ministry of Education Key Lab For Intelligent Networks and Network Security State Key Laboratory for Manufacturing Systems Engineering Institute of Integrated Automation School of Electronics and Information Engineering Xi'an Jiaotong University Xi'an
Track to track association problem is crucial for multisensor data fusion, and become complicated in the presence of sensor bias, random errors, false tracks and missed tracks. In this paper, we apply the optimal Baye... 详细信息
来源: 评论
Improvement on masked S-box hardware implementation
Improvement on masked S-box hardware implementation
收藏 引用
International Conference on Innovations in information Technology
作者: Juanli Zeng Yi Wang Cheng Xu Renfa Li College of Information Science and Engineering Hunan University Changsha Hunan P. R. China Department of Electrical & Computer Engineering National University of Singapore Singapore Hunan Province Key Laboratory of Network and Information Security
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ... 详细信息
来源: 评论
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation
收藏 引用
China Communications 2012年 第10期9卷 33-39页
作者: Zhao Wentao Fu Shaojing Li Chao Qu Longjiang College of Computer National University of Defense Technology Changsha 410073 P. R. China Department of Mathematics and System Science National University of Defense Technology Changsha 410073 P. R. China Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 P. R. China State key Laboratory of Information Security Chinese Academy of Science Beijing 100049 P. R. China
To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation o... 详细信息
来源: 评论
Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
Identity-based proxy cryptosystems with revocability and hie...
收藏 引用
作者: Wang, Lihua Wang, Licheng Mambo, Masahiro Okamoto, Eiji Network Security Research Institute Koganei-shi 184-8795 Japan State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Faculty of Electrical and Computer Engineering Institute of Science and Engineering Kanazawa University Kanazawa-shi 920-1192 Japan School of Systems and Information Engineering University of Tsukuba Tsukuba-shi 305-8573 Japan
Proxy cryptosystems are classified into proxy decryption systems and proxy re-encryption systems on the basis of a proxy's role. In this paper, we propose an ID-based proxy cryptosystem with revocability and hiera... 详细信息
来源: 评论
A load-balanced data aggregation scheduling for duty-cycled wireless sensor networks
A load-balanced data aggregation scheduling for duty-cycled ...
收藏 引用
2012 4th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2012
作者: Chen, Zhengyu Yang, Geng Chen, Lei Xu, Jian Wang, Haiyong Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts AndTelecommunications Nanjing 210046 China College of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210046 China School of Information Technology Jinling Institute of Technology Nanjing 211169 China
To bridge the gap between limited energy supplies of the sensor nodes and the system lifetime, duty-cycle Wireless Sensor networks (WSNs) with data aggregation are studied in this paper. We proposed a load-balanced an... 详细信息
来源: 评论
Tightly secure non-interactive multisignatures in the plain public key model
收藏 引用
Informatica (Netherlands) 2012年 第3期23卷 443-460页
作者: Qian, Haifeng Li, Xiangxue Huang, Xinli Department of Computer Science and Technology East China Normal University Shanghai 200241 China Hangzhou Key Lab of E-business and Information Security Hangzhou Normal University Hangzhou 310036 China
Multisignature scheme allows a group of signers to generate a compact signature on a common document that certifies they endorsed the message. However, the existing state of the art multisignatures often suffers from ... 详细信息
来源: 评论
Privacy-Preserving Multi-set Operations
Privacy-Preserving Multi-set Operations
收藏 引用
2012 IEEE 14th International Conference on Communication Technology
作者: Meishan Huang Bogang Lin College of Mathematics and Computer Science Fuzhou University Key Lab of Information Security of Network System Fuzhou University
We consider several multiset operations in secure two- party setting where Alice and Bob each have a multiset and they want to perform some private computations over the two multisets without revealing and private inf... 详细信息
来源: 评论