咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2491-2500 订阅
排序:
Optimal combination of conflicting evidence based on genetic algorithm
收藏 引用
ICIC Express Letters 2011年 第4 A期5卷 1145-1150页
作者: Jiang, Wen Peng, Jinye Deng, Yong School of Electronics and Information Northwestern Polytechnical University No. 127 Youyixi Road Xi'an 710072 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University No. 16 Xuelin Street Xiasha Higher Education Zone Hanzhou 310036 China Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Xiangtan University Xiangtan 411105 China School of Computer and Information Sciences Southwest University No. 2 Tiansheng Road Beibei District Chongqing 400715 China School of Electronics and Information Technology Shanghai Jiao Tong University No. 800 Dongchuan Road Shanghai 200240 China
The Dempster-Shafer (D-S) evidence theory is widely used in many fields of information fusion. However, counter-intuitive results may be obtained by the classical Dempster combination rule when collected evidences are... 详细信息
来源: 评论
Improving efficiency of security schemes in automated trust negotiation
Improving efficiency of security schemes in automated trust ...
收藏 引用
2nd International Workshop on Education Technology and computer Science, ETCS 2010
作者: Liu, Bailing Lu, Hongwei Zhao, Yizhu Ge, Feng College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Lab. of Information Network Security Ministry of Public Security Shanghai China
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. When... 详细信息
来源: 评论
A wideband beamforming method based on directional uniform circular arrays
收藏 引用
Science China(information Sciences) 2010年 第12期53卷 2600-2609页
作者: MU PengCheng ,YIN QinYe & ZHANG JianGuo Ministry of Education key lab for Intelligent networks and network security,School of Electronics and information Engineering,Xi’an Jiaotong University,Xi’an 710049,China 1. Ministry of Education Key Lab for Intelligent Networks and Network Security School of Electronics and Information Engineering Xi’an Jiaotong University Xi’an 710049 China
A new method for solving the wideband beamforming problem is proposed in this paper based on directional uniform circular *** basic idea is designing a narrowband beamforming spatial filter at a specific frequency and... 详细信息
来源: 评论
Achieving fair non-repudiation for web services transaction
Achieving fair non-repudiation for web services transaction
收藏 引用
2010 2nd International Conference on Education Technology and computer, ICETC 2010
作者: Su, Rui-Dan Fu, Shao-Feng Zhou, Li-Hua Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University 710071 Xian Shaanxi China
For safeguarding the interests of web services transaction parties, non-repudiation mechanism need assure fairness and timeliness. The non-repudiation service implemented currently mostly does not consider the require... 详细信息
来源: 评论
Formal description for trusted application environment
Formal description for trusted application environment
收藏 引用
International Conference on information Engineering and computer Science
作者: Gong, Lei Zhao, Yong Institute of Electronic Technology Information Engineering University Zhengzhou China Key Lab of Information Network Security Ministry of Public Security Shanghai China Institute of Computer Science Beijing University of Technology Beijing China
Application environment is the necessary condition for an application system running. If the application environment can be trusted, then the application system could run safely and reliably. This paper firstly analyz... 详细信息
来源: 评论
Aggregation of interval numbers in group decision making
收藏 引用
ICIC Express Letters 2011年 第4 A期5卷 1057-1062页
作者: Deng, Yong Wu, Jiyi Sun, Xiaohong Xu, Peida Zhang, Yajuan College of Computer and Information Sciences Southwest University Tiansheng Road Beibei District Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University No. 16 Xuelin Street Xiasha Higher Education Zone Hanzhou 310036 China Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Xiangtan University Xiangtan 411105 China College of Food Science and Technology Shanghai Ocean University Hu Cheng Loop-road Lingang New City Shanghai 201306 China School of Electronics and Information Technology Shanghai Jiao Tong University Dongchuan Rd. Shanghai 200240 China
A group of decision-makers may differ in their choice of alternatives while taking a decision. So, in any decision-making problem concerning decisions made by a group, the question arises how best we can aggregate ind... 详细信息
来源: 评论
Quantum broadcast communication with authentication
收藏 引用
Chinese Physics B 2010年 第7期19卷 63-67页
作者: 杨宇光 王叶红 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Two simple quantum broadcast communication schemes are proposed. A central party can broadcast his secret message to all the legitimate receivers simultaneously. Compared with the three schemes proposed recently (Wan... 详细信息
来源: 评论
Application of D-S Evidence theory to uncertainty of assessment result in E-government
Application of D-S Evidence theory to uncertainty of assessm...
收藏 引用
7th Web information Systems and Applications Conference, WISA 2010, 5th Workshop on Semantic Web and Ontology, SWON 2010, 4th Workshop on Electronic Government Technology and Application, EGTA 2010
作者: Xia, Bing Pan, Heng Zheng, Qiusheng Miao, Fengjun School of Computer Science Zhongyuan University of Technology Zhengzhou Key Lab of Computer Network Security Assessment Zhengzhou China
How to solve uncertainty of assessment result is an important issue in E-government. Current qualitative assessment are based on subjective qualitative evaluation and the rigid division of the quantitative data, howev... 详细信息
来源: 评论
Analysis of network user behavior
Analysis of network user behavior
收藏 引用
2010 IEEE Youth Conference on information, Computing and Telecommunications, YC-ICT 2010
作者: Liu, Wei Huang, Daoli Leyuan, Zhang School of Automation Beijing University of Post Technology China Key Lab. of Information Network Security of Ministry of Public Security China
For better user personalization, this paper explores the collecting and processing method of network users' behavior data with multi-source heterogeneity and analyzes network user behavior on the basis of context ... 详细信息
来源: 评论
Research on fuzzy comprehensive evaluation of user experience
Research on fuzzy comprehensive evaluation of user experienc...
收藏 引用
2010 IEEE Youth Conference on information, Computing and Telecommunications, YC-ICT 2010
作者: Liu, Wei Huang, Daoli Zhang, Yan School of Automation Beijing University of Post Technology China Key Lab. of Information Network Security of Ministry of Public Security China
A fuzzy comprehensive evaluation method of user experience is proposed to the problem on user experience quality which is difficult to accurately evaluate on the E-commerce web using. Firstly, being accordance with us... 详细信息
来源: 评论