咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2501-2510 订阅
排序:
A sub-spectrum sensing scheme based on reputation in Cognitive Radio networks
A sub-spectrum sensing scheme based on reputation in Cogniti...
收藏 引用
International Conference on Computational Intelligence and security
作者: Li, Hongning Pei, Qingqi Jiang, Xiaohong Liang, Rui Geng, Peng Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
With the existing Cognitive Radio networks development, we present a sub-spectrum sensing scheme based on reputation, which takes advantage in energy consumption, security and fairness from spectrum sensing, data fusi... 详细信息
来源: 评论
Predicting the semantic orientation of movie reviews
Predicting the semantic orientation of movie reviews
收藏 引用
2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010
作者: Liu, Gongshen Lai, Huoyao Luo, Jun Lin, Jiuchuan School of Information Security Engineering Shanghai Jiao Tong University Shanghai China Key Lab. of Information Network Security of Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Online reviews are one of the important information resources for people. This paper focuses on a specific domain-movie review and presents a new model for predicting semantic orientation of reviews, i.e., classifying... 详细信息
来源: 评论
Behavior-based attack detection and reporting in wireless sensor networks
Behavior-based attack detection and reporting in wireless se...
收藏 引用
International Symposium on Electronic Commerce and security
作者: Yang, Liu Kai, Han School of Information Sciences and Engineering Henan University of Technology Zhengzhou China Zhengzhou Key Lab of Computer Network Security Assessment Zhongyuan University of Technology Zhengzhou China
Providing security for wireless sensor networks is challenging due to the resource limitations of sensor nodes. Leveraging the broadcast nature of wireless communication, we propose a behavior-based approach for attac... 详细信息
来源: 评论
An immune danger theory inspired model for network security monitoring
An immune danger theory inspired model for network security ...
收藏 引用
2010 International Conference on Challenges in Environmental Science and computer Engineering, CESCE 2010
作者: Sun, Feixian Han, Xinchao Wang, Jianhong School of Computer Science Zhongyuan University of Technology Zhengzhou China Zhengzhou Key Lab of Computer Network Security Assessment Zhengzhou China
In order to overcome the deficiencies of the traditional Artificial Immune Systems (AIS) in the security field of computer information system, an immune danger theory inspired model for network security monitoring is ... 详细信息
来源: 评论
Performance analysis of optimal antenna scheme in transmit diversity systems
Performance analysis of optimal antenna scheme in transmit d...
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Wang, Yong Li, Hui Wang, Xiyuan Key Lab. of Computer Network and Information Security School of Telecommunications Engineering Xidian University Xi'an China Science Research Department Xidian University Xi'an China
The performance of transmit antenna selection is investigated. The exact closed-form expressions for the average BER and average SNR in MRT systems and EGT systems are proposed. The minimum number of increased transmi... 详细信息
来源: 评论
Integrity measurement model based on trusted virtual platform
Integrity measurement model based on trusted virtual platfor...
收藏 引用
International Conference on Genetic and Evolutionary Computing
作者: Qiu, Gang Wang, Yulei Zhou, Lihua Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an China Network Information Center Nanyang Institute of Technology Nanyang China School of Computer Science and Technology Xidian University Xi'an China
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to as... 详细信息
来源: 评论
An efficient control method of multi-copy routing in DTN
An efficient control method of multi-copy routing in DTN
收藏 引用
2nd International Conference on networks security, Wireless Communications and Trusted Computing, NSWCTC 2010
作者: Bian, Hong Yu, Haizheng School of Maths-physics and Information Sciences Xinjiang Normal University Urumqi China Key Laboratory of Computer Network and Information Security Xidian University Xi'an China
Delay/Disruption Tolerant networks (DTN) often use multi-copy routing protocols to improve the efficiency that the messages are delivered successfully, but the network load is increased by vast message copies. A new s... 详细信息
来源: 评论
Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers
收藏 引用
Communications in Theoretical Physics 2010年 第7期54卷 84-88页
作者: 杨宇光 王园 腾义伟 柴海平 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collabo... 详细信息
来源: 评论
TCFOM: A robust traffic classification framework based on OC-SVM combined with MC-SVM
TCFOM: A robust traffic classification framework based on OC...
收藏 引用
2010 International Conference on Communications and Intelligence information security, ICCIIS 2010
作者: Lu, Gang Zhang, Hongli Sha, Xuefu Chen, Cheng Peng, Lizhi State Key Lab. of Computer Information Content Security Department of Computer Science Harbin Institute of Technology Harbin China
New application traffic occurring on Internet frequently challenges the traditional traffic classifiers based on machine learning. These classifiers always identify it inaccurately and assign it into one of their know... 详细信息
来源: 评论
The extended FDH sequences
The extended FDH sequences
收藏 引用
作者: Ma, WenPing He, YeFeng Sun, Shaohui Education Key Lab. of Computer Network and Information Security Xidian University Xi'an 710071 China Datang Mobile Communications Equipment Co. Lid. China
A new construction method for polyphase sequences with two-valued periodic auto- and crosscorrelation functions is proposed. This method gives L families of polyphase sequences for each prime length L which is bigger ... 详细信息
来源: 评论