咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2461-2470 订阅
排序:
RPWIPS:A Reverse Proxy Architecture Based Web Intrusion Prevention System
RPWIPS:A Reverse Proxy Architecture Based Web Intrusion Prev...
收藏 引用
2011 4th IEEE International Conference on computer Science and information Technology(ICCSIT 2011)
作者: Yao Linlin Wang Yong He Qian Zhou Qinglun School of Computer and Engineering Guilin University of Electronic Technology Guangxi Key Lab of Information and Communications Technology Guilin University of Electronic Technology Network Center Guilin University of Electronic Technology
The traditional Firewall and Intrusion Detection System(IDS) working at the network layer can’t fully understand the application layer protocols, and there must be some omissions and errors about SQL Injection, cross... 详细信息
来源: 评论
Distributed lite CA key management scheme in mobile Ad Hoc networks
收藏 引用
Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition) 2011年 第6期43卷 133-139页
作者: Han, Lei Liu, Ji-Qiang Zhao, Jia Wei, Xue-Ye School of Electronics and Info. Eng. Beijing Jiaotong Univ. Beijing 100044 China School of Computer and Info. Technol. Beijing Jiaotong Univ. Beijing 100044 China Key Lab. of Network Security and Cryptology Fujian Normal Univ. Fuzhou 35007 China
In order to solve the problem of asymmetric key management in mobile ad hoc networks, a new distributed asymmetric key management scheme based on lite CA public key authentication framework and Shamir secret sharing s... 详细信息
来源: 评论
A security testing approach for WSN protocols based on object-oriented attack model
A security testing approach for WSN protocols based on objec...
收藏 引用
International Conference on Computational Intelligence and security
作者: Yue Qi Qingqi Pei Yong Zeng Chao Yang Shu-po Bu State Key Laboratory of Integrated Service Networks Xidian University Xi'an China Key Laboratory of Computer Networks and Information Security of Ministry of Education China Key Lab. of Comput. Networks & Inf. Security Minist. of Educ. Guangzhou China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou China
In this paper, we propose an object-oriented attack model to represent a protocol attack in WSN detailedly. The model describes multiple attributes of an attack, including its principle, impact, interdependent relatio... 详细信息
来源: 评论
Blind Carrier Frequency Offset Estimation for MIMO OFDMA Uplink
Blind Carrier Frequency Offset Estimation for MIMO OFDMA Upl...
收藏 引用
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
作者: Weile Zhang H. Chen Qinye Yin T. Ohtsuki MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China The State Key Laboratory of Integrated Services Networks Xidian University China Institute of Industrial Science University of Tokyo Tokyo Japan Department of Information and Computer Science Keio University Yokohama Japan
In this paper, we develop a new subspace based multiuser carrier frequency offset (CFO) estimation scheme for multi-input multi- output (MIMO) orthogonal frequency division multiple access (OFDMA) uplink transmission.... 详细信息
来源: 评论
Runtime-Based Boot Components Re-measurement Scheme for Trusted Platform
Runtime-Based Boot Components Re-measurement Scheme for Trus...
收藏 引用
2011 International Conference on Informatics,Cybernetics,and computer Engineering(ICCE 2011)
作者: Peng Weiping Zhou Yajian Wang Cong Yang Yixian Key Laboratory of Network and Information Attack & Defence Technology of MOE Beijing University of Posts and Telecommunications School of Computer Science and Technology Henan Polytechnic University Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions(binary code) is measured a... 详细信息
来源: 评论
Recent advances in cloud security
收藏 引用
Journal of computers 2011年 第10期6卷 2156-2163页
作者: Wu, Jiyi Shen, Qianli Wang, Tong Zhu, Ji Zhang, Jianlin Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou China School of Computer Science and Technology Zhejiang University Hangzhou China Alibaba Business School Hangzhou Normal University Hangzhou China Information and Communication Engineering College Harbin Engineering University Harbin 150001 China
Cloud computing emerges as a new computing paradigm which aims to provide reliable, customized and QoS guaranteed dynamic computing environments for endusers. Although cloud computing industry promises tremendous pros... 详细信息
来源: 评论
Cryptanalysis and Improvement of a Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations
收藏 引用
Chinese Physics Letters 2010年 第6期27卷 13-15页
作者: ZHU Zhen-Chao ZHANG Yu-Qing Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 National Computer Network Intrusion Protection Center Graduate University Chinese Academy of Sciences Beijing 100049
In a recent paper [Chin. Phys. Lett 25(2008)1187], a quantum secret sharing scheme between multiparty and multiparty was presented. We show that the protocol is not secure because the last member in Alice's group c... 详细信息
来源: 评论
Multi-User Private keyword Search for Cloud Computing
Multi-User Private Keyword Search for Cloud Computing
收藏 引用
IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
作者: Yanjiang Yang Haibing Lu Jian Weng Institute for Infocomm Research Singapore Department of Operations Management and Information Systems The Leavey School of Business Santa Clara University USA State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Department of Computer Science and Emergency Technology Research Center of Risk Department of Computer Science and Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
A General Sharing Model Based on Proxy Re-encryption
A General Sharing Model Based on Proxy Re-encryption
收藏 引用
International Conference on Intelligent information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Guojun Ma Qingqi Pei Yuchen Wang Xiaohong Jiang The State Key Laboratory of Integrated Services Networks Xidian University Xi'an China School of Electronic Engineering University of Electronic Science and Technology of China Chengdu China Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are t... 详细信息
来源: 评论
Modeling of failure detector based on message delay prediction mechanism
Journal of Software
收藏 引用
Journal of Software 2011年 第9期6卷 1821-1828页
作者: Liu, Bin Yang, Shifei Shi, Lei Ding, Xiaoguang Zhang, Qian Shengda Economics Trade and Management College Zhengzhou University Zhengzhou 451191 China School of Information Engineering Zhengzhou University Zhengzhou 450001 China School of Computer Science and Technology Beijing Institute of Technology Beijing 100081 China Henan Provincial Key Lab on Information Network Zhengzhou 450052 China
Failure detection is a key technology in tolerant system. Failure detectors without adaptive mechanism cannot meet the requirements of QOS (quality of service) of applications because of the variations of the network ... 详细信息
来源: 评论