咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是2381-2390 订阅
排序:
Towards energy-fairness in asynchronous duty-cycling sensor networks
Towards energy-fairness in asynchronous duty-cycling sensor ...
收藏 引用
IEEE Conference on computer Communications, INFOCOM 2012
作者: Li, Zhenjiang Mo, Li Liu, Yunhao School of Computer Engineering Nanyang Technological University Singapore Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong MOE Key Lab. for Information System Security School of Software Tsinghua University China
In this paper, we investigate the problem of controlling node sleep intervals so as to achieve the min-max energy fairness in asynchronous duty-cycling sensor networks. We propose a mathematical model to describe the ... 详细信息
来源: 评论
An new anonymous authentication scheme for cloud computing
An new anonymous authentication scheme for cloud computing
收藏 引用
2012 7th International Conference on computer Science and Education, ICCSE 2012
作者: Zhang, Zhi-Hua Li, Jian-Jun Jiang, Wei Zhao, Yong Gong, Bei China Tobacco Zhejiang Iidustrial Co. Ltd. Hangzhou 310009 China College of Computer Science Beijing University of Technology Beijing 100124 China Key Laboratory of Information and Network Security 3rd Research Institute Ministry of Public Security Beijing 100124 China Beijing 100124 China
Cloud computing is a hot topic of current research, for anonymous authentication is required in many applications scenarios of e-business based on cloud computing, users do not want to expose their identity, users jus... 详细信息
来源: 评论
A generic approach for providing revocation support in secret handshake
A generic approach for providing revocation support in secre...
收藏 引用
14th International Conference on information and Communications security, ICICS 2012
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Ding, Xuhua Zhou, Jianying Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai China School of Information Systems Singapore Management University Singapore Singapore
Privacy protection and user revocation are essentially conflicting requirements in many cryptographic protocols. It is a particularly challenging problem to harmonize them in a secret handshake protocol that is geared... 详细信息
来源: 评论
Sentence alignment for web page text based on vector space model
Sentence alignment for web page text based on vector space m...
收藏 引用
2012 International Conference on computer Science and information Processing, CSIP 2012
作者: Zhang, Guanhong Odbal Department of Computer Science and Technology Key Lab of Network and Intelligent Information Processing Hefei University Anhui Hefei 230601 China Hefei Institutes of Physical Science of Chinese Academy Science Anhui Hefei 230031 China
There exist noisy, unparallel sentences in parallel web pages. Web page structure is subjected to some limitation for sentences alignment task for web page text. The most straightforward way of aligning sentences is u... 详细信息
来源: 评论
A password authentication scheme against smart card security breach
A password authentication scheme against smart card security...
收藏 引用
3rd International Conference on information Computing and Applications, ICICA 2012
作者: Shen, Jing Du, Yusong South China Institute of Software Engineering Guangzhou University Guangzhou 510990 China School of Information Management Sun Yat-sen University Guangzhou 510006 China Key Lab. of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China
Remote user authentication is very important for identifying whether communicating parties are genuine and trustworthy. Using a password and a smart card between a login user and a remote server is necessary. Recently... 详细信息
来源: 评论
RFID-based electronic identity security cloud platform in cyberspace
收藏 引用
Journal of networks 2012年 第7期7卷 1131-1138页
作者: Chen, Bing Tan, Chengxiang Jin, Bo Zou, Xiang Dai, Yuebo The 3rd research institute of ministry of public security Shanghai China Key laboratory of information network security Ministry of Public Security Shanghai China Dept. of computer science and engineering Tongji University Shanghai China
With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated w... 详细信息
来源: 评论
RGH: An efficient RSU-aided group-based hierarchical privacy enhancement protocol for VANETs
RGH: An efficient RSU-aided group-based hierarchical privacy...
收藏 引用
13th International Conference on Web-Age information Management, WAIM 2012
作者: Yang, Tao Kong, Lingbo Yu, Liangwen Hu, Jianbin Chen, Zhong MoE Key Lab. of High Confidence Software Technologies Peking University 100871 Beijing China MoE Key Lab. of Computer Networks and Information Security Peking University 100871 Beijing China School of Electronics Engineering and Computer Science Peking University 100871 Beijing China School of Software Engineering Beijing Jiaotong University 100044 Beijing China
VANETs are gaining significant prominence from both academia and industry in recent years. In this paper, we introduce an Efficient RSU-aided Group-based Hierarchical Privacy Enhancement Protocol for VANETs. The proto... 详细信息
来源: 评论
An improved masked S-box for AES and hardware implementation
收藏 引用
Journal of Convergence information Technology 2012年 第10期7卷 338-344页
作者: Zeng, Juanli Xu, Cheng Embedded System and Network Laboratory Hunan Province Key Lab. of Network and Information Security College of Inf. Sci. and Engineering Hunan University Changsha 410082 China
Masking in gate level is popularly used to protect AES S-box against power analysis attacks. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. ... 详细信息
来源: 评论
Biorthogonal nonunifrom b-spline wavelets with small supports
Biorthogonal nonunifrom b-spline wavelets with small support...
收藏 引用
2012 2nd International Conference on computer Application and System Modeling, ICCASM 2012
作者: Pan, Rijing Yao, Zhiqing College of Mathematics and Computer Science Fujian Normal University Fuzhou Fujian 350007 China Faculty of Software Fujian Normal University Fuzhou Fujian 350007 China Key Lab of Network Security and Cryptology Fujian Normal University Fuzhou Fujian 350007 China
A kind of biorthogonal nonuniform B-spline wavelets with small supports is constructed. And the performances of the wavelets are analyzed. In additional to having small supports, the proposed wavelets are simple and e... 详细信息
来源: 评论
PKU-STRAW-L: a simulative platform evaluate the power-saving rate of the intelligent street lamp system
PKU-STRAW-L: a simulative platform evaluate the power-saving...
收藏 引用
International Conference on Ubiquitous Intelligence & Computing
作者: Yang Tao Lingbo Kong Yinyang Wang Hu Jian-Bin Chen Zhong MoE Key Lab of High Confidence Software Technologies Peking University MoE Key Lab of Computer Networks and Information Security Peking University
A Low-Carbon Economy (LCE) has been a heated economy topic throughout the world. The street lamp system is a large energy consumption system although it is indispensable part of the basic facilities of a city. So it i... 详细信息
来源: 评论