咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2511-2520 订阅
排序:
A robust and secure overlay storage scheme based on erasure coding
A robust and secure overlay storage scheme based on erasure ...
收藏 引用
5th International Conference on Pervasive Computing and Applications, ICPCA10
作者: Li, Chuanyou Wang, Yun School of Computer Science and Engineering Southeast University Key Lab of Computer Network and Information Integration Nanjing 210096 China
Recently, in classical P2P overlay networks, with applying replication technique, a single peer is replaced by a cluster of peers in order to tolerant Byzantine failures. In this paper, a novel robust and secure schem... 详细信息
来源: 评论
Bundle transport model of satellite delay tolerant networks
Bundle transport model of satellite delay tolerant networks
收藏 引用
2010 2nd International Conference on Future computer and Communication, ICFCC 2010
作者: Yu, Haizheng Ma, Jianfeng Bian, Hong Key Laboratory of Computer Network and Information Security Xidian University Xi'an China School of Mathematical Sciences Xinjiang Normal University Urumqi China
The data is transmitted between a small satellite near earth and the ground stations. For transmitting reliably, the data is divided into many fragments, and these fragments are encapsulated as multiple bundles with t... 详细信息
来源: 评论
A Stream Pattern Matching Method for Traffic Analysis
收藏 引用
China Communications 2010年 第6期7卷 86-93页
作者: Zhu Hui Li Hui Mo Can Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 P. R. China
In order to identify any traces of suspicious activities for the networks security, network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applicati... 详细信息
来源: 评论
Group key management using proxy re-encryption for dynamic networks
Group key management using proxy re-encryption for dynamic n...
收藏 引用
2nd International Workshop on Education Technology and computer Science, ETCS 2010
作者: Zhang, Minqing Wu, Xuguang Han, Yiliang Yang, Xiaoyuan Key Laboratory of Network and Information Security of APF Engineering College of APF China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China
Decentralized group key management mechanisms offer beneficial solutions to enhance the scalability and reliability of a secure multicast framework by dividing the whole group into subgroups. However, many of the prev... 详细信息
来源: 评论
A digital rights management scheme based on rational share content
A digital rights management scheme based on rational share c...
收藏 引用
2010 International Conference on High Performance Computing and Simulation, HPCS 2010
作者: Ma, Guojun Jian, Li Pei, Qingqi Ma, Jianfeng Key Lab of Computer Networks and Information Security Ministry of Education Xidian University Xi'an China ZTE Corporation China
In the traditional DRM(Digital Rights Management) scheme, each user must buy a license for a digital content ,and can not share this content with his friends. But,with the development of digital content industry ,this... 详细信息
来源: 评论
Service price discrimination in wireless network
Service price discrimination in wireless network
收藏 引用
International Conference on Computational Science and Engineering
作者: Chen, Zhide Xu, Li Key Lab. of Network Security and Cryptography School of Mathematics and Computer Science Fujian Normal University Fujian Province Fuzhou China
This paper discusses the price discrimination in wireless service allocation on the basis of game theory. The wireless service providers can supply the service with different prices. Two service price discrimination m... 详细信息
来源: 评论
Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of computer Science & Technology 2010年 第6期25卷 1293-1304页
作者: 王怀习 朱岩 冯荣权 Stephen S.Yau LMAM School of Mathematical SciencesPeking University Electronic Engineering Institute Institute of Computer Science and Technology Peking University Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education Information Assurance Center and School of Computing Informatics and Decision Systems Engineering Arizona State University
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***... 详细信息
来源: 评论
key management scheme in WSN based on property of circle
Key management scheme in WSN based on property of circle
收藏 引用
International Conference on Computational Intelligence and Software Engineering
作者: Su, Meibo Yang, Xiaoyuan Wei, Lixian Yang, Heng Key Lab. of Network and Information Security Dept. of Electronics Technology Engineering College of Armed Police Force ShanXi Xi'an China
In view of the situation that wireless sensor networks have some features like limited resources, the vulnerability, the frequent changes in network topology, this paper puts forward a designed key management in WSN w... 详细信息
来源: 评论
Research on high-speed network data stream capture based on multi-queue NIC and multi-core processor
Research on high-speed network data stream capture based on ...
收藏 引用
2010 2nd IEEE International Conference on information Management and Engineering, ICIME 2010
作者: Huang, Chungang Yu, Xiangzhan Luo, Hao Computer Network and Information Security Lab. Harbin Institute of Technology Harbin China Institute of Computing Technology Chinese Academy of Science Beijing China
The technique of high-speed network data stream capture has been a main topic of network research. This paper finds out some key technical problems that exist on high-speed network data stream capture and makes some i... 详细信息
来源: 评论
New construction of single-and multi-output Boolean functions with high algebraic immunity
New construction of single-and multi-output Boolean function...
收藏 引用
作者: He, Yefeng Ma, Wenping Ministry of Education Key Lab. of Computer Network and Information Security Xidian University Xi'an 710071 China School of Communication and Information Engineering Xi'an Institute of Post and Telecommunications Xi'an 710121 China
In order to respond to algebraic attacks, it is important to construct Boolean functions with high algebraic immunity of the graphs. In this paper, the complicated problem of algebraic immunity of the graph is convert... 详细信息
来源: 评论