咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,134 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,857 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,864 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 94 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 263 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 65 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 54 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 32 篇 shandong provinc...
  • 30 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 27 篇 pca lab key lab ...
  • 22 篇 peng cheng labor...
  • 22 篇 shandong fundame...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 24 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,479 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2857 条 记 录,以下是2441-2450 订阅
排序:
An identity-based secure routing protocol in WSNs
An identity-based secure routing protocol in WSNs
收藏 引用
2011 7th International Conference on Computational Intelligence and security, CIS 2011
作者: Li, Weichang Li, Hongning Xie, Min Bu, Shupo Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou China
It has been proved that Asymmetric cryptography can be used in Wireless Sensor networks (WSNs). In this paper, we propose a secure Identity-based routing protocol, which can ensure that the nodes in routing discovery ... 详细信息
来源: 评论
A topic partition algorithm based on average Sentence similarity for interactive text
A topic partition algorithm based on average Sentence simila...
收藏 引用
2011 7th International Conference on Computational Intelligence and security, CIS 2011
作者: Zhu, Haiping Chen, Yan Yang, Yang Gao, Chao Department of Computer Science and Technology Xi'an Jiaotong University Shaanxi Province Key Lab. of Satellite and Terrestrial Network Tech. R and D Xi'an China Ministry of Education Key Lab. for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an 710049 China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China
Based on the research and analysis of interactive text properties, the word frequency statistics and synonyms merger are imported to obtain the keywords of interactive text. The Sentence similarity is used to describe... 详细信息
来源: 评论
A Trust Model Based on Cloud Model and Bayesian networks
收藏 引用
Procedia Environmental Sciences 2011年 11卷 452-459页
作者: Bo Jin Yong Wang Zhenyan Liu Jingfeng Xue Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) Shanghai China School of Software Beijing Institute of Technology Beijing China
the Internet has been becoming the most important infrastructure for distributed applications which are composed of online services. In such open and dynamic environment, service selection becomes a challenge. The app... 详细信息
来源: 评论
Design of bijective S-boxes satisfying the strict avalanche criterion
收藏 引用
Journal of Computational information Systems 2011年 第6期7卷 1967-1973页
作者: Gao, Sheng Ma, Wenping Shen, Dongsu School of Telecommunications Engineering Xidian University Xi'an 710071 China Key Lab. of Computer Network and Information Security Xidian University Xi'an 710071 China
Much of the security of many block ciphers depends on the cryptographic properties of the substitution boxes (S-boxes). Although many design methods of S-boxes with desirable properties have been studied, there are fe... 详细信息
来源: 评论
Blurring length estimation using ringing artifacts in a deblurred image
Blurring length estimation using ringing artifacts in a debl...
收藏 引用
3rd International Conference on Image Analysis and Signal Processing, IASP 2011
作者: Yang, Shuangxue Liu, Hong Liu, Benyong Liao, Xiang School of Computer Science and Information Institute of Intelligent Information Processing Guizhou University Guiyang 550025 China Key Lab. of Sound-Image Material Examination and Authentication Ministry of Public Security of PRC Guiyang 550001 China
The restoration quality of a motion-blurred image is highly dependent on the estimation accuracy of the motion blurring parameter. This manuscript presents a novel and precise method for estimation of the motion blurr... 详细信息
来源: 评论
Study on Model-Based security Assessment of information Systems
Study on Model-Based Security Assessment of Information Syst...
收藏 引用
The 2011 International Conference on Computing,information and Control(ICCIC 2011)
作者: Xiangdong Li Xinchao Han Qiusheng Zheng Zhengzhou Key Lab of Computer Network Security Assessment School of Computer Science Zhengzhou University of Technology
security problems of an information system are mainly due to its internal vulnerabilities, by exploiting which external threats do harm to the system. security Assessment of Vulnerabilities(SAV) is, with appropriate m... 详细信息
来源: 评论
Efficient and secure group key management based on EBS and attribute encryption
Efficient and secure group key management based on EBS and a...
收藏 引用
IEEE International Conference on computer Science and Automation Engineering (CSAE)
作者: Chen, Yanli Yang, Geng College of Computer Nanjing University of Posts and Telecommunications Nanjing China Key Lab of Network Security and Cryptology Fujian Normal University FuZhou China Department of Technology Nanjing University of Posts and Telecommunications Nanjing China
Exclusion Basis Systems (EBS) is a combinatorial optimization methodology for key management of group communication. The EBS approach proves to be very scalable for large networks and enables great flexibility in netw... 详细信息
来源: 评论
Reasonable routing in delay/disruption tolerant networks
收藏 引用
Frontiers of Materials Science 2011年 第3期5卷 327-334页
作者: Haizheng YU Jianfeng MA Hong BIAN College of Mathematics and System Sciences Xinjiang University Urumqi 830046 China Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China School of Mathematical Sciences Xinjiang Normal University Urumqi 830054 China
Delay/disruption tolerant networking (DTN) is an approach to networking where intermittent connectivity exists: it is often afforded by a store and forward technique. Depending on the capability of intermediary nod... 详细信息
来源: 评论
On balanced semi-bent functions with high algebraic degrees
收藏 引用
IEICE Transactions on Fundamentals of Electronics, Communications and computer Sciences 2011年 第3期E94-A卷 1019-1022页
作者: YeFeng, H.E. WenPing, M.A. Ministry of Education Key Lab Computer Network and Information Security Xidian University Xi'an 710071 China School of Telecommunications and Information Engineering Xi'an Institute of Posts and Telecommunications Xi'an 710121 China
A class of balanced semi-bent functions with an even number of variables is proposed. It is shown that they include one subclass of semi-bent functions with maximum algebraic degrees. Furthermore, an example of semi-b... 详细信息
来源: 评论
A Block Gathering Based on Mobile Web Page Segmentation Algorithm
A Block Gathering Based on Mobile Web Page Segmentation Algo...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Libing Wu Yalin Ke Yanxiang He Nan Liu School of Computer Science Wuhan University Wuhan China Key Laboratory of Information Network Security Ministry of Public Security Shanghai China
Compared to html page, the mobile web page has different features. The mobile web page is arranged through some important tags such as ;N ;, which are called Gathering Node in this paper. Based on these Gathering Node... 详细信息
来源: 评论