咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,140 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,863 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 508 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 95 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 265 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 64 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 33 篇 shandong provinc...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,485 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2863 条 记 录,以下是2401-2410 订阅
排序:
Spatial domain image steganalysis based on wavelet coefficient dependency
收藏 引用
Guangdianzi Jiguang/Journal of Optoelectronics Laser 2012年 第5期23卷 972-979页
作者: Zhang, Min-Qing Lei, Yu Computer College of Northwestern Polytechnical University Xi'an Shaanxi 710072 China Key Laboratory of Network and Information Security of Armed Police Force Engineering University of Armed Police Force Xi'an 710086 China
Based on wavelet coefficient dependency, a novel general image steganalysis technique for spatial domain steganography is proposed. First, the mutual information is exploited to analyze the change on the scale and ori... 详细信息
来源: 评论
Text content filtering based on chinese character reconstruction from radicals
Text content filtering based on chinese character reconstruc...
收藏 引用
作者: He, Wenlei Liu, Gongshen Luo, Jun Lin, Jiuchuan School of Information Security Engineering Shanghai Jiao Tong University China Key Lab of Information Network Security of Ministry of Public Security Third Research Institute of Ministry of Public Security China
Content filtering through keyword matching is widely adopted in network censoring, and proven to be successful. However, a technique to bypass this kind of censorship by decomposing Chinese characters appears recently... 详细信息
来源: 评论
L-WMxD: Lexical based Webmail XSS Discoverer
L-WMxD: Lexical based Webmail XSS Discoverer
收藏 引用
2011 IEEE Conference on computer Communications Workshops, INFOCOM WKSHPS 2011
作者: Tang, Zhushou Zhu, Haojin Cao, Zhenfu Zhao, Shuai Department of Computer Science and Engineering Shanghai Jiao Tong University China Key Laboratory of Information Network Security Ministry of Public Security China
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail... 详细信息
来源: 评论
Feature selection based on particle swarm optimal with multiple evolutionary strategies
Feature selection based on particle swarm optimal with multi...
收藏 引用
International Conference on information Fusion
作者: Jing Zhao Chongzhao Han Bin Wei Qi Zhao Peng Xiao Kedai Zhang MOE Key Lab For Intelligent Networks and Network Security SKLMSE Institute of Integrated Automation School of Elect. and Info. Engineering Xi'an Jiaotong University Xi'an China System Engineering Institute of Electronic and Information Engineering School Xi'an Jiaotong University Xi'an China Beijing Institute of Graphics Beijing China
Feature selection is an effective data preprocessing step to reduce the dimension of feature space and save storage space. Binary particle swarm optimization (BPSO) has been applied successfully to solve feature selec... 详细信息
来源: 评论
An architecture description language based on dynamic description logics for self-healing systems
收藏 引用
International Journal of Advancements in Computing Technology 2012年 第18期4卷 89-96页
作者: Wang, Zhuxiao Peng, Hui Guo, Jing Wu, Kehe Cui, Wenchao Wang, Xiaofeng School of Control and Computer Engineering State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources North China Electric Power University Beijing 102206 China Education Technology Center Beijing International Studies University Beijing 100024 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China School of Control and Computer Engineering Institute of Electric Information Security Engineering Research Center of Power Information North China Electric Power University Beijing 102206 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
As biological systems exhibit adaptation, healing and robustness in the face of changing environmental behavior, this paradigm has actuated research dealing with the concept of self-healing systems, which attempt to h... 详细信息
来源: 评论
The availability of fast-flux service networks
The availability of fast-flux service networks
收藏 引用
2011 International Conference on Selected Topics in Mobile and Wireless networking, iCOST 2011
作者: Xu, Yunfeng Lu, Yansheng Guo, Zhengbiao School of Computer Science and Technology Hua Zhong University of Science and Technology Wuhan China Hubei Province Public Security Bureau to Defend the Corps Cyber Security Key Lab of Information NetWork Security Ministry of Public Security China
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov... 详细信息
来源: 评论
Defense Against Objective Function Attacks in Cognitive Radio networks
收藏 引用
电子学报(英文版) 2011年 第1期20卷 138-142页
作者: PEI Qingqi LI Hongning MA Jianfeng FAN Kefeng Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an China Institute of China Electronic System Engineering Corporation Beijing China China Electronics Standardization Institute Beijing China
Cognitive radio (CR) is a technology for identifying opportunities using the "spectrum holes" for communication by cognition. Consequently, we can increase spectrum resource utilization rate with CR. However... 详细信息
来源: 评论
security issues and solutions of the key management protocols in IEEE 802.16j multi-hop relay network*
Security issues and solutions of the key management protocol...
收藏 引用
作者: Fu, Anmin Zhang, Yuqing Feng, Jingyu Key Lab of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China National Computer Network Intrusion Protection Center GUCAS Beijing 100049 China
The recent IEEE 802.16j-2009 adds multi-hop relay capabilities to IEEE 802.16 systems, which aims to offer improved coverage and capacity over single-hop radio access systems. In this paper, we point out several secur... 详细信息
来源: 评论
Quantum Secure Direct Communication with Five-Qubit Entangled State
收藏 引用
Chinese Physics Letters 2011年 第3期28卷 17-20页
作者: LIN Song GAO Fei LIU Xiao-Fen School of Mathematics and Computer Science Fujian Normal UniversityFuzhou 350007 Key Lab of Network Security and Cryptography Fujian Normal UniversityFuzhou 350007 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[***.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state *** we build a quantum... 详细信息
来源: 评论
Recursive representation of transformation matrices of periodic B-spline bases
Recursive representation of transformation matrices of perio...
收藏 引用
2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce, AIMSEC 2011
作者: Pan, Rijing Liu, Xiaofen College of Mathematics and Computer Science Fujian Normal University Key Lab of Network Security and Cryptology Fuzhou China
With periodic B-spline bases closed B-spline curves can be represented compactly. The transformation matrices of periodic B-spline bases provide a mathematical model for the conversion between different representation... 详细信息
来源: 评论