咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2471-2480 订阅
排序:
Developing environmental indices based on fuzzy set theory and evidential reasoning
Developing environmental indices based on fuzzy set theory a...
收藏 引用
2011 China Control and Decision Conference(2011中国控制与决策会议 CCDC)
作者: Xin Yang Deng Bing Yi Kang Ya Juan Zhang Ji Yi Wu Xiao Hong Sun Yong Deng School of Computer and Information Sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou Zheji College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China School of Computer and Information Sciences Southwest University Chongqing 400715 China Y.Deng i
Environmental indices (EI) are used as a communication tool to describe overall status of the environmental systems. Due to the uncertainty in the process of determination of EI, a fuzzy evidential method is proposed ... 详细信息
来源: 评论
Image edge detection using variation-adaptive ant colony optimization
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2011年 6910卷 27-40页
作者: Tian, Jing Yu, Weiyu Chen, Li Ma, Lihong School of Computer Science and Technology Wuhan University of Science and Technology 430081 China School of Electronic and Information Engineering South China University of Technology Guangzhou 510641 China Guangdong Key Lab of Wireless Network and Terminal School of Electronic and Information Engineering South China University of Technology Guangzhou 510641 China
Ant colony optimization (ACO) is an optimization algorithm inspired by the natural collective behavior of ant species. The ACO technique is exploited in this paper to develop a novel image edge detection approach. The... 详细信息
来源: 评论
Digital image hiding arithmetic based on hermite chaotic neural networks
收藏 引用
ICIC Express Letters, Part B: Applications 2011年 第1期2卷 165-170页
作者: Zou, Ajin Luo, Yixiang Xie, Dongqing Peng, Lingxi Information College Guangdong Ocean University No. 40 East Jiefang Road Xiashan District Zhanjiang 524088 China School of Computer Science Educational Software Guangzhou University No. 230 Wai Huan Xi Road Guangzhou 510006 China Network and Data Security Key Laboratory of Sichuan Province Chengdu 611731 China
An image hidden information algorithm inspired by chaotic neural networks, referred as DiaHao, is presented. The secret information of digital image is XOR en- crypted by chaotic stream cipher sequence that is generat... 详细信息
来源: 评论
A more effective definition of evidential conflict combined with evidential distance
收藏 引用
Journal of information and Computational Science 2011年 第9期8卷 1729-1734页
作者: Chen, Yuxin Wu, Jiyi Cong, Jian Jie, Wenjing Deng, Yong School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai 20024 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou 310036 China College of Food Science and Technology Shanghai Ocean University 999 Hucheng Huan Road Shanghai 201306 China Key Subject Laboratory of National Defense for Radioactive Waste and Environment Security Southwest University of Science and Technology Mianyang 621010 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China College of Computer and Information Sciences Southwest University Chongqing 400715 China
Evidence theory is widely used in many application systems such as information fusion and decision making under uncertainty environment. However, the classical Dempster combination rule is not efficient to deal with h... 详细信息
来源: 评论
Optimal aggregation of interval numbers based on genetic algorithm in group decision
收藏 引用
Journal of information and Computational Science 2011年 第5期8卷 842-849页
作者: Kang, Bingyi Zhang, Yajuan Deng, Xinyang Wu, Jiyi Sun, Xiaohong Li, Ya Deng, Yong College of Computer and Information Sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou 310036 China College of Food Science and Technology Shanghai Ocean University 999 Hucheng Huan Road Shanghai 201306 China Key Subject Laboratory of National Defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China School of Electronics and Information Technology Shanghai Jiaotong University Shanghai 200240 China
A group of decision-makers may differ in their choice of alternatives while making a decision. As a result, how to aggregate opinions of different experts is still an open issue. Due to the uncertainty in the process ... 详细信息
来源: 评论
A NEW THRESHOLD AUTHENTICATED ENCRYPTION SCHEME USING labOR-DIVISION SIGNATURE
收藏 引用
Journal of Systems Science & Complexity 2010年 第6期23卷 1183-1194页
作者: Zuowen TAN School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China.
This paper shows several security weaknesses of a threshold authenticated encryption scheme. A new threshold authenticated encryption scheme using labor-division signature is proposed without redundancy added to messa... 详细信息
来源: 评论
Recursive constructions and counting of orthomorphic permutations
收藏 引用
Tongxin Xuebao/Journal on Communications 2011年 第11 A期32卷 204-208页
作者: Zhang, Feng-Rong Hu, Yu-Pu Ma, Hua Xie, Min Gao, Jun-Tao Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Science Xidian University Xi'an 710071 China State Key Laboratory of Information Security Graduate University of Chinese Acad. of Sci. Beijing 100049 China
The properties and known constructions of orthomorphic permutations were investigated. On this basis, a new recursive method to construct an n-variable orthomorphic permutations from two (n-2)-variable ones is present... 详细信息
来源: 评论
A new fuzzy risk analysis method based on generalized fuzzy numbers
Journal of Software
收藏 引用
Journal of Software 2011年 第9期6卷 1755-1762页
作者: Su, Xiaoyan Jiang, Wen Xu, Jianling Xu, Peida Deng, Yong Key Laboratory of Digital Agricultural Early-warning Technology Ministry of Agriculture of China Beijing China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Zhejiang China School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai China School of Electronics and Information Technology Northwestern Polytechnical University Xi'an 710072 China Grain Economics Institute Nanjing University of Finance and Economics Nanjing China College of computer and information sciences Southwest University Chongqing China
Risk analysis plays an important role in many application systems. The current researches prefer to use fuzzy set theory for risk analysis. In this paper, we present a new fuzzy risk analysis method based on generaliz... 详细信息
来源: 评论
Fair Non-Repudiation for Web Services Transactions
收藏 引用
Wuhan University Journal of Natural Sciences 2010年 第5期15卷 385-392页
作者: SU Ruidan,FU Shaofeng,ZHOU Lihua key laboratory of computer network and information security of the Ministry of Education,Xidian University,Xi’an 710071,Shaanxi,China Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi’an Shaanxi China
To safeguard the interests of transacting parties,non-repudiation mechanisms need to assure fairness and *** non-repudiation service currently implemented usually does not consider the requirement of fairness and the ... 详细信息
来源: 评论
An improved radius of gyration similarity measure between generalized fuzzy numbers and its application to multisource data fusion
收藏 引用
Journal of computers 2011年 第8期6卷 1732-1739页
作者: Yong, Deng Dong, Sun Wen, Jiang Jianling, Xu College of computer and information sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hanzhou Zhejiang 310036 China School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai 200240 China Key Laboratory of Intelligent Computing Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China Department of Electronics Engineering Northwestern Polytechnical University Xían 710072 China Grain Economics Institute Nanjing University of Finance and Economics Nanjing 210003 China
The degree of similarity between fuzzy numbers plays an important role in fuzzy information fusion. In this paper, improved ROG-based similarity measure developed from the current ROG method is presented. It is shown ... 详细信息
来源: 评论