咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2421-2430 订阅
排序:
A general sharing model based on proxy re-encryption
A general sharing model based on proxy re-encryption
收藏 引用
7th International Conference on Intelligent information Hiding and Multimedia Signal Processing, IIHMSP 2011
作者: Ma, Guojun Pei, Qingqi Wang, Yuchen Jiang, Xiaohong State Key Laboratory of Integrated Services Networks Xidian University Xi'an China School of Electronic Engineering University of Electronic Science and Technology of China Chengdu China Key Lab. of Computer Networks and Information Security Ministry of Education Xidian University Xi'an China
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are t... 详细信息
来源: 评论
Updatable key Management Scheme with Intrusion Tolerance for Unattended Wireless Sensor network
Updatable Key Management Scheme with Intrusion Tolerance for...
收藏 引用
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
作者: Liang-min Wang Tao Jiang Xiao-yan Zhu Department of Computer Science Jiangsu University Zhenjiang China Key Laboratory of Computer Network and Information Security of Education Ministry Xidian University Xi'an China
An Unattended Wireless Sensor network (UWSN) collects the sensing data by using mobile sinks (MSs). It differs from the traditional multi-hop wireless sensor networks in which unbalanced traffic makes the sensors clos... 详细信息
来源: 评论
Conflict-free transmission schedule based on network coding in wireless networks
Conflict-free transmission schedule based on network coding ...
收藏 引用
International Conference on Communications and Mobile Computing
作者: Wang, Jing Liu, Xiangyang Wang, Xinmei School of Information Engineering Chang'an University Xi'an China Computer Network Teaching Office Xi'an Communication College Xi'an China State Key Lab. of Integrated Service Networks Xidian University Xi'an China
In wireless networks, the cross-layer design of joint medium access control and network coding can avoid destructive interferences among concurrent transmissions. Wireless network codes in conjunction with conflict-fr... 详细信息
来源: 评论
An efficient remote data possession checking in cloud storage
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2011年 第4期5卷 43-50页
作者: Chen, Lanxiang Guo, Gongde School of Mathematics and Computer Science Fujian Normal University Fuzhou 350108 China Key Lab of Network Security and Cryptology Fuzhou 350108 China
As cloud storage can achieve the goal that getting all storage resources in a plug-and-play way, it becomes a focus of attention. It has the advantages of high scalability, ease-of-use, cost-effectiveness and simplify... 详细信息
来源: 评论
RepHi: A Novel Attack against P2P Reputation Systems
RepHi: A Novel Attack against P2P Reputation Systems
收藏 引用
IEEE Conference on computer Communications Workshops
作者: Jingyu Feng Yuqing Zhang Shenglong Chen Anmin Fu Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China
Reputation systems are having increasing influence on guarding P2P networks. However, reputation systems themselves are vulnerable to attack. Due to the nature of aggregating ratings, the reputation scores of certain ... 详细信息
来源: 评论
Abuse-freeness Electronic Payment Protocol
Abuse-freeness Electronic Payment Protocol
收藏 引用
International Conference on Intelligent networking and Collaborative Systems (INCOS)
作者: Kai Fan Yue Wang Hui Li Ministry of Edu. Key Laboratory of Computer Network and Information Security Xidian University Xi'an China Shaanxi Telecom Limited Xi'an China
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in ... 详细信息
来源: 评论
A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless networks
A Privacy Preserving Handover Authentication Scheme for EAP-...
收藏 引用
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
作者: Qi Jing Yuqing Zhang Anmin Fu Xuefeng Liu Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China National Computer Network Intrusion Protection Center GUCAS Beijing China
Extensible Authentication Protocol (EAP) is a framework which aims to provide a flexible authentication for wireless networks. Due to the involvement of an EAP server and several round trips between a mobile node (MN)... 详细信息
来源: 评论
Forward Secure Proxy Blind Signature Scheme
Forward Secure Proxy Blind Signature Scheme
收藏 引用
International Conference on Intelligent networking and Collaborative Systems (INCOS)
作者: Kai Fan Yue Wang Hui Li Ministry of Edu. Key Laboratory of Computer Network and Information Security Xidian University Xi'an China Shaanxi Telecom Limited Xi'an China
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper prop... 详细信息
来源: 评论
Genetic Algorithm-Based Power Management in Cloud Platform
Genetic Algorithm-Based Power Management in Cloud Platform
收藏 引用
International Conference on Internet Technology and Applications (iTAP)
作者: Zili Xiong Zhang Zhang Huafeng Kong Deqing Zou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Laboratory of Information Network Security Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Cloud computing is a novel computing pattern, and it can provide underlying hardware resource for cloud users on demand. Virtualization is the key technology of cloud computing, and it provides the technical support f... 详细信息
来源: 评论
Mining dynamical frequent itemsets based on ant colony algorithm
Mining dynamical frequent itemsets based on ant colony algor...
收藏 引用
IEEE International Conference on computer Science and Automation Engineering (CSAE)
作者: Chen, Shengbing Wang, Xiaofeng Wang, Xiaofang Key Lab of Network and Intelligent Information Processing Hefei University Hefei 230601 China Department of Computer Science and Technology Hefei University Hefei 230601 China Intelligent Computing Lab Institute of Intelligent Machines Chinese Academy of Sciences Hefei 230031 China Department of Computer Artillery Academy Hefei 230031 China
Mining frequent itemsets is a core problem in many data mining tasks, most existing works on mining frequent itemsets can only capture the long-term and static frequency itemsets, they do not suit the task whose frequ... 详细信息
来源: 评论