咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2411-2420 订阅
排序:
An automated black-box testing approach for WSN security protocols
An automated black-box testing approach for WSN security pro...
收藏 引用
2011 7th International Conference on Computational Intelligence and security, CIS 2011
作者: Ji, Shirui Pei, Qingqi Zeng, Yong Yang, Chao Bu, Shu-Po State Key Laboratory of Integrated Service Networks Xidian University Xi'an China Key Lab. of Computer Networks and Information Security of Ministry of Education China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou 215104 China
security protocols for wireless sensor network are designed to provide a variety of security services to secure communications in an unsafe network. It is demanded to verify whether an implementation of a security pro... 详细信息
来源: 评论
A fast handoff method based on RSSI and LQI in wireless sensor network
A fast handoff method based on RSSI and LQI in wireless sens...
收藏 引用
2011 7th International Conference on Computational Intelligence and security, CIS 2011
作者: Miao, Zhang Li, Jingying School of Mechanical Engineering Northwestern Polytechnical University Xi'an Shaanxi 710072 China Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian Univ. Xi'an Shaanxi 710071 China
The thesis also puts forward a fast handoff method based on RSSI and LQI, which makes improvements on preset parameters, subnet selection, decision standards and reparation of switching failure. The new method which c... 详细信息
来源: 评论
Projection kernel regression/or image registration and fusion in video-based criminal investigation
Projection kernel regression/or image registration and fusio...
收藏 引用
2011 International Conference on Multimedia and Signal Processing, CMSP 2011
作者: Liu, Benyong Zhang, Ling Liao, Xiang Department of Computer Science Institute ofintelligent Information Processing Guizhou University Guiyang 550025 China Provincial Key Lab of Audio-Visual Material Examination Guizhou Public Security Department Guiyang 550001 China
A projection kernel regression framework is set and applied for image registration and fusion in video-based criminal investigation. In image registration, a dominant point is defined to capture the local variation pr... 详细信息
来源: 评论
Low-cost authentication protocol of RFID system using One block Hash function
Low-cost authentication protocol of RFID system using One bl...
收藏 引用
International Conference on computer Sciences and Convergence information Technology (ICCIT)
作者: Shi-mei Jin Mo You Yong-zhen Li Network & Information Security Lab. Department of Computer Science and Technology Yanbian University Yanji Jilin China
RFID has been widely used in personal life. To the security problems of RFID, there are many different kinds of strategies and protocol, This article point out the disadvantages of these protocols, then come up with O... 详细信息
来源: 评论
The availability of fast-flux service networks
The availability of fast-flux service networks
收藏 引用
International Conference on Selected Topics in Mobile and Wireless networking (iCOST)
作者: Yunfeng Xu Yansheng Lu Zhengbiao Guo Hubei Province Public Security Bureau To Defend The Corps Cyber Security Key Lab of Information NetWork Security Ministry of Public Security China School of Computer Science and Technology Hua Zhong University of Science and Technology Wuhan China
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov... 详细信息
来源: 评论
A Trust Model Based on Cloud Model and Bayesian networks
A Trust Model Based on Cloud Model and Bayesian Networks
收藏 引用
2011 2nd International Conference on Challenges in Environmental Science and computer Engineering (CESCE 2011)
作者: Bo Jin Yong Wang Zhenyan Liu Jingfeng Xue Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) Shanghai School of Software Beijing Institute of Technology
the Internet has been becoming the most important infrastructure for distributed applications which are composed of online services. In such open and dynamic environment, service selection becomes a challenge. The app... 详细信息
来源: 评论
Cube Cryptanalysis of the Hitag2 Stream Cipher
Cube Cryptanalysis of the Hitag2 Stream Cipher
收藏 引用
第三届编码与密码的数学理论研讨会
作者: Sun Siwei Hu Lei Xie Yonghong Zeng Xiangyong State Key Lab of Information Security Gucas Faculty of Mathematics and Computer Science Hubei University
来源: 评论
Research on remote data possession checking
收藏 引用
Journal of Convergence information Technology 2011年 第12期6卷 42-50页
作者: Chen, Lanxiang Zhou, Shuming School of Mathematics and Computer Science Fujian Normal University Fuzhou 350108 Key Lab of Network Security and Cryptology Fuzhou 350108 China
Storage as a service (SaaS) or storage service provider (SSP) model enables users to access their data anywhere and at any time. It also can comply with a growing number of regulations. For users whose storage require... 详细信息
来源: 评论
A new method of aggregation of fuzzy number based on the dempster/shafer theory
A new method of aggregation of fuzzy number based on the dem...
收藏 引用
2011 Chinese Control and Decision Conference, CCDC 2011
作者: Kang, Bing Yi Deng, Yong Zhang, Ya Juan Dang, Xin Yang Wu, Ji Yi Sun, Xiao Hong School of Computer and Information Sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou Zhejiang 310036 China College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China
There exists lots of fuzzy and imprecise information with the development of society and technology. How to combine and evaluate these information becomes significant. This paper takes the proportion of the membership... 详细信息
来源: 评论
Constructions of two-output Bent functions
收藏 引用
Journal of Computational information Systems 2011年 第12期7卷 4178-4184页
作者: Zhang, Fengrong Hu, Yupu Zhao, Yongbin Xie, Min Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Information Science and Technology Shijiazhuang Tiedao University Shijiazhuang 050043 China
Bent functions, which have the highest nonlinearity, play an important role in coding theory, sequence design and cryptography. On the basis of a given 2n-variable Maiorana-McFarland (M-M) Bent function and the 2n ... 详细信息
来源: 评论