咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,134 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,857 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,864 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 94 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 263 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 65 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 54 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 32 篇 shandong provinc...
  • 30 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 27 篇 pca lab key lab ...
  • 22 篇 peng cheng labor...
  • 22 篇 shandong fundame...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 24 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,479 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2857 条 记 录,以下是2431-2440 订阅
排序:
Research on privacy-preserving cloud storage framework supporting ciphertext retrieval
Research on privacy-preserving cloud storage framework suppo...
收藏 引用
International Conference on network Computing and information security
作者: Huang, Ruwei Gui, Xiaolin Yu, Si Zhuang, Wei Department of Electronics and Information Engineering Xian Jiaotong University Xian China Shaaxi Key Lab of Computer Network Xian Jiaotong University Xian China School of Computer Electronics and Information GuangXi University GuangXi China
Privacy security is a key issue for cloud storage. Encryption is a well established technology for protecting sensitive data. But it gives some new problems: how data owner and storage service provider to operate on e... 详细信息
来源: 评论
Application information flow non-interference transmission model
Application information flow non-interference transmission m...
收藏 引用
2011 International Conference on Electronic and Mechanical Engineering and information Technology, EMEIT 2011
作者: Gong, Lei Tian, Lu Zhang, Fulian Institute of Electronic Technology Information Engineering University Zhengzhou China Key Lab of Information Network Security Ministry of Public Security Shanghai China China Mobile Group Hebei Co. Ltd. Tangshan Branch Tangshan China Co. Ltd Tangshan China
In the security field of computer application systems, how to guarantee legal transmission of information flow among different application programs is a significant problem. In this paper, firstly, non-interference th... 详细信息
来源: 评论
Speech signal representation via dictionary learning in STFT transformed domain
Speech signal representation via dictionary learning in STFT...
收藏 引用
International Conference on Multimedia and Signal Processing
作者: Xu, Jing Liu, Benyong Liao, Xiang College of Computer Science and Information Institute of Intelligent Information Processing Guizhou University Guiyang China Provincial Key Lab of Audio-Visual Material Examination Guizhou Public Security Department Guiyang China
Speech signal representation is basic step for speech signal processing. We discuss an overcomplete dictionary learning algorithm to sparsely represent speech signal in short-time Fourier transform (STFT) transformed ... 详细信息
来源: 评论
Analysis and Study on Detection of Credict Fraud in E-commerce
Analysis and Study on Detection of Credict Fraud in E-commer...
收藏 引用
2011 International Conference on Future computer Sciences and Application(ICFCSA 2011)
作者: Kaiyong Deng Ru Zhang Dongfang Zhang WenFeng Jiang Xinxin Niu Kaiyong Deng Ru Zhang Hong Guo Key Laboratory of network and information attack& defence technology of MOE Beijing University of Posts and Telecommunications Key Lab of Information Network Security of Ministry of Public Security
An algorithm of applying Bedford's law to detect credit fraud in e-commerce is proposed in the paper and the feasibility is *** weakness of the algorithm for detecting financial fraud via Benford correlation coeff... 详细信息
来源: 评论
A survey on context awareness
A survey on context awareness
收藏 引用
2011 International Conference on computer Science and Service System, CSSS 2011
作者: Liu, Wei Li, Xue Huang, Daoli School of Automation Beijing University of Posts and Telecommunications Beijing China Artistic Design Department Beijing University of Posts and Telecommunications Beijing China Key Lab of Information Network Security Ministry of Public Security Third Research Institute Shanghai China
We have reviewed the research of context awareness of recent years in this paper. First of all, we describe the definitions of context and context awareness which are made by different scholars in different fields, an... 详细信息
来源: 评论
The Linear Span of a Class of Optimal Frequency Hopping Sequences
收藏 引用
China Communications 2011年 第2期8卷 147-151页
作者: 高军涛 胡予濮 李雪莲 Key Lab. of Computer Networks & Information Security of Xidian University Ministry of Education Department of Applied Mathematics of Xidian University
For the anti-jamming purpose,frequency hopping sequences are required to have a large linear span. In this paper,we firstly give the linear span of a class of optimal frequency hopping sequences. The results show that... 详细信息
来源: 评论
Koblitz Elliptic Curves Generating Based on Evolutionary Cryptography Theory and Verifying Parameters Recommended by NIST
收藏 引用
China Communications 2011年 第4期8卷 41-49页
作者: 王潮 张焕国 刘礼黎 Key Lab of Specialty Fiber Optics and Optical Access Network Ministry of Education Shanghai University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Computer School Wuhan University Huawei Technologies Co. Ltd
Elliptic curve cryptography is one of the most important public-key *** Koblitz Curve is a special kind of elliptic curve in ECC and its security mainly depends on the base *** on Evolutionary Cryptography theory,whic... 详细信息
来源: 评论
security enhancement on an authentication method for proxy mobile IPv6
Security enhancement on an authentication method for proxy m...
收藏 引用
作者: Jiang, Qi Ma, Jianfeng Li, Guangsong Ye, Ayong Xidian University Xi'an 710071 China Department of Information Research Zhengzhou Information Science and Technology Institute Zhengzhou 450002 China Key Lab. of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China
Proxy Mobile IPv6 (PMIPv6) is an emerging network-based localized mobility management scheme. Recently, Zhou, Zhang and Qin proposed an authentication method for PMIPv6. However, this paper shows that their scheme fai... 详细信息
来源: 评论
A Public Cryptosystem from R-LWE
A Public Cryptosystem from R-LWE
收藏 引用
2011 IEEE 3rd International Conference on Communication Software and networks(2011第三届通信软件与网络国际会议 ICCSN2011)
作者: Ping Wei Liqiang Wu Xiaoyuan Yang Bin Hao Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an 710086 Ch Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an 710086Chi Key Laboratory of Computer Network & Information Security of the Ministry of Education Xidian Unive Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an 710086 C
Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on RLWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer p... 详细信息
来源: 评论
Two Quantum Dialogue Schemes Based on Bell States and Two-Qutrit Entangled States Without information Leakage
Two Quantum Dialogue Schemes Based on Bell States and Two-Qu...
收藏 引用
中国密码学会2011年会
作者: He Wang Yu-Qing Zhang Yu-Pu Hu Yang-Li Tian Zhen-Chao Zhu Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University X National Computer Network Intrusion Protection Center GUCAS Beijing 100049 China Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University X
1 Introduction With the development of QSDC, the bidirectional QSDC protocol[8] was proposed in 2004, in which the two communicators can exchange their secret messages simultaneously, it is also called quantum ***, th...
来源: 评论