咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,134 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,857 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,864 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 94 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 263 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 65 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 54 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 32 篇 shandong provinc...
  • 30 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 27 篇 pca lab key lab ...
  • 22 篇 peng cheng labor...
  • 22 篇 shandong fundame...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 24 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,479 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2857 条 记 录,以下是2391-2400 订阅
排序:
An efficient coverage control algorithm for three-dimensional underwater sensor networks
收藏 引用
Advances in information Sciences and Service Sciences 2012年 第10期4卷 393-399页
作者: Xiao, Fu Yang, Yang Sun, Li Wang, Ruchuan Nanjing University of Posts and Telecommunications Nanjing 210003 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing 210003 China
Strategy of sensor nodes deployment is directly related to the cost and performance for underwater wireless sensor networks, which is largely determined the various service-quality improvement of wireless sensor netwo... 详细信息
来源: 评论
A public cryptosystem from R-LWE
A public cryptosystem from R-LWE
收藏 引用
IEEE International Conference on Communication Software and networks
作者: Wei, Ping Wu, Liqiang Yang, Xiaoyuan Hao, Bin Key Laboratory of Network and Information Security of APF Engineering College of APF Xi'an 710086 China Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China
Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on R-LWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer par... 详细信息
来源: 评论
Analysis and study on detection of credict fraud in E-commerce
Analysis and study on detection of credict fraud in E-commer...
收藏 引用
International Conference on Future computer Science and Education
作者: Deng, Kaiyong Zhang, Ru Zhang, Dongfang Jiang, Wen Feng Niu, Xinxin Guo, Hong Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China Key Lab. of Information Network Security of Ministry of Public Security Shanghai China
An algorithm of applying Bedford's law to detect credit fraud in e-commerce is proposed in the paper and the feasibility is studied. The weakness of the algorithm for detecting financial fraud via Benford correlat... 详细信息
来源: 评论
Agent Modeling of User Preferences Based on Fuzzy Classified ANNs in Automated Negotiation
收藏 引用
Journal of Donghua University(English Edition) 2011年 第1期28卷 45-48页
作者: 顾铁军 汤兵勇 马溪骏 李毅 Glorious Sun School of Business and Management Donghua University Institute of Computer Network System Hefei University of Technology Information Security System Testing Lab The Third Research Institute of Ministry of Public Security
In agent-based automated negotiation research area,a key problem is how to make software agent more adaptable to represent user preferences or suggestions,so that agent can take further proposals that reflect user req... 详细信息
来源: 评论
Spatial domain image steganalysis based on wavelet coefficient dependency
收藏 引用
Guangdianzi Jiguang/Journal of Optoelectronics Laser 2012年 第5期23卷 972-979页
作者: Zhang, Min-Qing Lei, Yu Computer College of Northwestern Polytechnical University Xi'an Shaanxi 710072 China Key Laboratory of Network and Information Security of Armed Police Force Engineering University of Armed Police Force Xi'an 710086 China
Based on wavelet coefficient dependency, a novel general image steganalysis technique for spatial domain steganography is proposed. First, the mutual information is exploited to analyze the change on the scale and ori... 详细信息
来源: 评论
Text content filtering based on chinese character reconstruction from radicals
Text content filtering based on chinese character reconstruc...
收藏 引用
作者: He, Wenlei Liu, Gongshen Luo, Jun Lin, Jiuchuan School of Information Security Engineering Shanghai Jiao Tong University China Key Lab of Information Network Security of Ministry of Public Security Third Research Institute of Ministry of Public Security China
Content filtering through keyword matching is widely adopted in network censoring, and proven to be successful. However, a technique to bypass this kind of censorship by decomposing Chinese characters appears recently... 详细信息
来源: 评论
L-WMxD: Lexical based Webmail XSS Discoverer
L-WMxD: Lexical based Webmail XSS Discoverer
收藏 引用
2011 IEEE Conference on computer Communications Workshops, INFOCOM WKSHPS 2011
作者: Tang, Zhushou Zhu, Haojin Cao, Zhenfu Zhao, Shuai Department of Computer Science and Engineering Shanghai Jiao Tong University China Key Laboratory of Information Network Security Ministry of Public Security China
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail... 详细信息
来源: 评论
Feature selection based on particle swarm optimal with multiple evolutionary strategies
Feature selection based on particle swarm optimal with multi...
收藏 引用
International Conference on information Fusion
作者: Jing Zhao Chongzhao Han Bin Wei Qi Zhao Peng Xiao Kedai Zhang MOE Key Lab For Intelligent Networks and Network Security SKLMSE Institute of Integrated Automation School of Elect. and Info. Engineering Xi'an Jiaotong University Xi'an China System Engineering Institute of Electronic and Information Engineering School Xi'an Jiaotong University Xi'an China Beijing Institute of Graphics Beijing China
Feature selection is an effective data preprocessing step to reduce the dimension of feature space and save storage space. Binary particle swarm optimization (BPSO) has been applied successfully to solve feature selec... 详细信息
来源: 评论
An architecture description language based on dynamic description logics for self-healing systems
收藏 引用
International Journal of Advancements in Computing Technology 2012年 第18期4卷 89-96页
作者: Wang, Zhuxiao Peng, Hui Guo, Jing Wu, Kehe Cui, Wenchao Wang, Xiaofeng School of Control and Computer Engineering State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources North China Electric Power University Beijing 102206 China Education Technology Center Beijing International Studies University Beijing 100024 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China School of Control and Computer Engineering Institute of Electric Information Security Engineering Research Center of Power Information North China Electric Power University Beijing 102206 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
As biological systems exhibit adaptation, healing and robustness in the face of changing environmental behavior, this paradigm has actuated research dealing with the concept of self-healing systems, which attempt to h... 详细信息
来源: 评论
The availability of fast-flux service networks
The availability of fast-flux service networks
收藏 引用
2011 International Conference on Selected Topics in Mobile and Wireless networking, iCOST 2011
作者: Xu, Yunfeng Lu, Yansheng Guo, Zhengbiao School of Computer Science and Technology Hua Zhong University of Science and Technology Wuhan China Hubei Province Public Security Bureau to Defend the Corps Cyber Security Key Lab of Information NetWork Security Ministry of Public Security China
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov... 详细信息
来源: 评论