咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2481-2490 订阅
排序:
A geometric distortion resilient image watermark algorithm based on DWT-DFT
Journal of Software
收藏 引用
Journal of Software 2011年 第9期6卷 1805-1812页
作者: Hu, Yuping Wang, Zhijian Liu, Hui Guo, Guangjun Guangdong Province Key Lab of EC Market Application Technology GuangDong University of Business Studies Guangzhou 510320 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou 310036 China Department of Electronics and Communication Engineering Changsha College Changsha Hunan 410003 China Department of Computer Science and Technology Hunan Institute of Humanities Science and Technology Loudi Hunan 41700 China
In this paper, a robust watermarking algorithm against geometric distortions and common signal processing is proposed. This algorithm is based on two method to solve the synchronization of the original watermarking im... 详细信息
来源: 评论
Short-ciphertext and BDH-based CCA2 secure certificateless encryption
收藏 引用
Science China(information Sciences) 2010年 第10期53卷 2005-2015页
作者: SUN YinXia & LI Hui 1 key lab of computer networks and information security, Ministry of Education, Xidian University, Xi’an 710071, China 1. Key Lab of Computer Networks and Information Security Ministry of Education Xidian University Xi’an 710071 China
Certificateless public key cryptosystem actually belongs to identity based cryptography, with an attractive characteristic that the private key generator does not have access to any user’s full private key. Most of t... 详细信息
来源: 评论
Secure Certificateless Encryption with Short Ciphertext
收藏 引用
电子学报(英文版) 2010年 第2期19卷 313-318页
作者: SUN Yinxia ZHANG Futai School of Mathematics and Computer Science Nanjing Normal University Nanjing China Key Lab of Computer Networks and Information Security Ministry of Education Xidian University Xi'an China
Certificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography while enjoying the most attractive certificateless property. In this paper, we present a secure Cer... 详细信息
来源: 评论
Reinforcing software quality measure by indirect coupling metrics
收藏 引用
Journal of Convergence information Technology 2011年 第12期6卷 229-237页
作者: Chen, Jianguo Wang, Hui Qian, Xiaoyao Wang, Chao Bruda, Stefan D. College of Information Engineering China Jiliang University Hangzhou 310018 China Key Lab of Specialty Fiber Optics and Optical Access Network Shanghai University Shanghai 200072 China Department of Computer Science Bishop's University Sherbrooke J1M 1Z7 Canada
Internal metrics of the software artifact quality may allow the users to measure the quality of the intermediate deliverables and thereby predict the quality of the final product. Therefore corrective actions may be i... 详细信息
来源: 评论
Research on structured storage and index of data flow in disaster tolerance system
Research on structured storage and index of data flow in dis...
收藏 引用
2010 International Conference on computer, Mechatronics, Control and Electronic Engineering, CMCE 2010
作者: Hou, Fangyuan Li, Dong Yu, Xiangzhan Computer Network and Information Security Lab. Harbin Institute of Technology Harbin China
Based on the problem that the storage of data flow lacks structure and the data retrieval speed is slow in some disaster tolerance systems, a structured data storage and high efficient data retrieval model is proposed... 详细信息
来源: 评论
Video steganography using motion vector and linear block codes
Video steganography using motion vector and linear block cod...
收藏 引用
2010 IEEE International Conference on Software Engineering and Service Sciences, ICSESS 2010
作者: Pan, Feng Xiang, Li Yang, Xiao-Yuan Guo, Yao Key Laboratory of Network and Information Security of APF Engineering College of the Armed Police Force Xi'an China Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China
A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the motion vectors of cover media during the process of H.264 comp... 详细信息
来源: 评论
A comprehensive model to assess e-commerce security based on ahp and evidential reasoning: First results
收藏 引用
ICIC Express Letters, Part B: Applications 2011年 第1期2卷 19-24页
作者: Zhang, Yajuan Deng, Xinyang Jiang, Wen Deng, Yong School of Computer and Information Sciences Southwest University No. 2 Tiansheng Road Beibei District Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University No. 16 Xuelin Street Hanzhou 310036 China School of Electronics and Information Technology Northwestern Polytechnical University No. 127 Youyixi Road Xi'an 710072 China School of Electronics and Information Technology Shanghai Jiao Tong University No. 800 Dongchuan Road Shanghai 200240 China
E-Commerce security has become one of the most important issues in the development of E-Commerce. In this paper, a new model is proposed to facilitate the assessment of E-Commerce security. In our model, both AHP meth... 详细信息
来源: 评论
Full rate and full diversity STBC in decode-and-forward relay systems
Full rate and full diversity STBC in decode-and-forward rela...
收藏 引用
2010 International Conference on Communications and Intelligence information security, ICCIIS 2010
作者: Wang, Yong Li, Hui Ministry of Education Key Lab. of Computer Network and Information Security School of Telecommunications Engineering Xidian University Xi'an China
Diversity techniques are very effective tools to increase signal reception quality in Rayleigh fading channels. A novel space-time block coding method for cooperative relay networks is proposed which guarantees full d... 详细信息
来源: 评论
An efficient automated trust negotiation framework supporting adaptive policies
An efficient automated trust negotiation framework supportin...
收藏 引用
2nd International Workshop on Education Technology and computer Science, ETCS 2010
作者: Liu, Bailing Lu, Hongwei Zhao, Yizhu College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Lab of Information Network Security Ministry of Public Security Shanghai China
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. Prev... 详细信息
来源: 评论
A key-chain based key management scheme for heterogeneous sensor network
A key-chain based key management scheme for heterogeneous se...
收藏 引用
2010 IEEE International Conference on information Theory and information security, ICITIS 2010
作者: Ou, Guohua Huang, Jie Li, Juan Key Lab. of Information Network Security Ministry of Public Security China School of Information Science and Engineering Southeast University China
key management poses a main concern for security operation in wireless sensor networks. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors in homogeneous sensor network... 详细信息
来源: 评论