咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2451-2460 订阅
排序:
Identification and extraction of topic elements for Chinese interactive text
Identification and extraction of topic elements for Chinese ...
收藏 引用
2nd International Conference on Multimedia Technology, ICMT 2011
作者: Zhu, Haiping Yang, Yang Chen, Yan Yu, Xiaolu Department of Computer Science and Technology Xi'an Jiaotong University Min. of Education Key Lab for Intelligent Networks and Network Security of xi'An Jiaotong University Xi'an China
This paper is based on identification and extraction of topic elements for Chinese interactive text. A topic segmentation method based on time sequence is achieved. Then a novel identification and extraction algorithm... 详细信息
来源: 评论
A survey on cloud storage
收藏 引用
Journal of computers 2011年 第8期6卷 1764-1771页
作者: Ju, Jiehui Wu, Jiyi Fu, Jianqing Lin, Zhijie School of Information and Electronic Engineering Zhejiang University of Science and Technology Hangzhou China Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou China School of Computer Science and Technology Zhejiang University Hangzhou China
As interest in the cloud increases, there has been a lot of talk about the maturity and trustworthiness of cloud storage technologies. Is it still hype or is it real? Many endusers and IT managers are getting very exc... 详细信息
来源: 评论
An anonymity and authentication mechanism for internet of things
收藏 引用
Journal of Convergence information Technology 2011年 第3期6卷 98-105页
作者: Wang, Xiaoliang Sun, Xingming Yang, Hengfu Shah, Saeed Arif College of Information Engineering Xiangtan University Xiangtan 411105 China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjin 210044 China Department of Information Science and Engineering Hunan First Normal University Changsha 410205 China Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy... 详细信息
来源: 评论
SWP2P: P2P anonymous trace system based on superposition watermarking
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2011年 第8期5卷 116-126页
作者: Wang, Xiaoliang Sun, Xingming Yang, Hengfu Shah, Saeed Arif College of Information Engineering Xiangtan University Xiangtan 411105 China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjin 210044 China Department of Information Science and Engineering Hunan First Normal University Changsha 410205 China Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous a... 详细信息
来源: 评论
Secret and reliable coding mechanism for noncoherent multisource network coding
Secret and reliable coding mechanism for noncoherent multiso...
收藏 引用
IEEE International Conference on Communication Software and networks
作者: Chen, Siguang Wu, Meng Lu, Weifeng Jin, Yi College of Computer Science Nanjing University of Posts and Telecommunications Nanjing China College of Telecommunications and Information Engineering Nanjing Univ. of Posts and Telecommunications Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education China College of Informatics and Electronics Zhejiang Sci-Tech University Hangzhou China
This work considers the communication scenario where multiple sources transmit information to one or more receivers and these receivers request the information from all the sources. We construct a secret and reliable ... 详细信息
来源: 评论
Distributed Angle Estimation for Wireless Sensor network Localization with Multipath Fading
Distributed Angle Estimation for Wireless Sensor Network Loc...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Weile Zhang Qinye Yin Hongyang Chen Wenjie Wang Tomoaki Ohtsuki MOE Key Laboratory for Intelligent Networks and Network Security Xi''an Jiaotong University Xi'an China Institute of Industrial Science University of Tokyo Tokyo Japan Department of Information and Computer Science Keio University Yokohama Japan
In this paper, we propose a distributed angle estimation method for wireless sensor network localization with multipath fading. The multiple antenna system is equipped at the anchor and the angle of departure (AOD) ca... 详细信息
来源: 评论
Strong security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation
Strong Security Enabled Certificateless Aggregate Signatures...
收藏 引用
International Conference on Intelligent networking and Collaborative Systems (INCOS)
作者: Hu Xiong Qianhong Wu Zhong Chen Key Laboratory of Network and Software Security Assurance of the Ministry of Education Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Department of Computer Engineering and Mathematics UNESCO Chair in Data Pr Universitat Rovira i Virgili Tarragona Spain Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University of China China
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
A New Method of Aggregation of Fuzzy Number Based on the Dempster/Shafer Theory
A New Method of Aggregation of Fuzzy Number Based on the Dem...
收藏 引用
2011 China Control and Decision Conference(2011中国控制与决策会议 CCDC)
作者: Yong Deng Bing Yi Kang Ya Juan Zhang Xin Yang Deng Ji Yi Wu Xiao Hong Sun School of Computer and Information Sciences Southwest University Chongqing 400715 China School of Computer and Information Sciences Southwest University Chongqing 400715 China Key Subj Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou Zheji College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China
There exists lots of fuzzy and imprecise information with the development of society and technology. How to combine and evaluate these information becomes significant. This paper takes the proportion of the membership... 详细信息
来源: 评论
Evaluation for Multi-objective Threat Based on Min-Distance among Interval Numbers
Evaluation for Multi-objective Threat Based on Min-Distance ...
收藏 引用
2011 China Control and Decision Conference(2011中国控制与决策会议 CCDC)
作者: Bing Yi Kang Xin Yang Deng Ya Juan Zhang Ji Yi Wu Xiao Hong Sun Yong Deng School of Computer and Information Sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou Zheji College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China School of Computer and Information Sciences Southwest University Chongqing 400715 China Key Subj
Evaluation for target threat is an important part in the defensive decision making. As to each target, there are multiple attributes described by fuzzy or uncertain information which is represented with interval numbe... 详细信息
来源: 评论
E-commerce security assessment under group decision making
收藏 引用
Journal of information and Computational Science 2011年 第1期8卷 7-15页
作者: Zhang, Yajuan Deng, Xinyang Li, Ya Wu, Jiyi Sun, Xiaohong Deng, Yong School of Computer and Information Sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou Zhejiang 310036 China Key Subject Lab. of National defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang Sichuan 621010 China College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China School of Electronics and Information Technology Shanghai Jiaotong University Shanghai 200240 China
Inherent complexity and uncertainty of E-commerce security necessitate the participation of many experts in multi criteria decision making. One of the key problems in the assessment of E-commerce security is how to su... 详细信息
来源: 评论