咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2531-2540 订阅
排序:
An ID-based broadcast encryption scheme for hierarchical wireless sensor networks
An ID-based broadcast encryption scheme for hierarchical wir...
收藏 引用
2nd International Conference on information Science and Engineering, ICISE2010
作者: Li, Da-Wei Yang, Geng Su, Hong-Yi Chen, Yan-Li College of Computer Science Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Lab. of Network Security and Cryptology Fujian Normal University FuZhou 350007 China
Most WSNs are organized in hierarchical topology, in which broadcast communication is the most efficient way to send messages. Since broadcast communication using public channel, it is important to protect the broadca... 详细信息
来源: 评论
RESEARCH ON FUZZY COMPREHENSIVE EVALUATION OF USER EXPERIENCE
RESEARCH ON FUZZY COMPREHENSIVE EVALUATION OF USER EXPERIENC...
收藏 引用
2010 IEEE Youth Conference on information,Computing and Telecommunications(2010 IEEE青年信息、计算和通信技术大会)
作者: Wei Liu Daoli Huang Yan Zhang School of Automation Beijing University of Post Technology Key Lab of Information Network Security Key Lab of Information Network Security of Ministry of Public Security School of Automation Beijing University of Post Technology
A fuzzy comprehensive evaluation method of user experience is proposed to the problem on user experience quality which is difficult to accurately evaluate on the E– commerce web using. Firstly, being accordance with ... 详细信息
来源: 评论
ANALYSIS OF network USER BEHAVIOR
ANALYSIS OF NETWORK USER BEHAVIOR
收藏 引用
2010 IEEE Youth Conference on information,Computing and Telecommunications(2010 IEEE青年信息、计算和通信技术大会)
作者: Wei Liu Daoli Huang Leyuan zhang School of Automation Beijing University of Post Technology Key Lab of Information Network Security Key Lab of Information Network Security of Ministry of Public Security School of Automation Beijing University of Post Technology
For better user personalization, this paper explores the collecting and processing method of network users’ behavior data with multi-source heterogeneity and analyzes network user behavior on the basis of context by ... 详细信息
来源: 评论
Design of the late-model key exchange algorithm based on the polymorphic cipher
Design of the late-model key exchange algorithm based on the...
收藏 引用
IEEE International Conference on Industrial Engineering and Engineering Management, IEEM2010
作者: Yin, Yifeng Gan, Yong Liu, Hongyan Hu, Yupu School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China NO.202 Institute of China Ordnance Industry Xian'yang China Key Laboratory of Computer Network and Information Security Xidian University Xi'an China
Diffie-Hellman key exchange algorithm, which is used in regular scenes base on the discrete logarithm problem, demands that typically two communication parties should struck up a lively conversation leading to a long-... 详细信息
来源: 评论
Quantum secure direct communication with cluster states
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2010年 第7期53卷 1271-1275页
作者: CAO WeiFeng YANG YuGuang WEN QiaoYan College of Electric and Information Engineering Zhengzhou University of Light IndustryZhengzhou 450002China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China College of Computer Science and Technology Beijing University of TechnologyBeijing 100124China State Key Laboratory of Integrated Services Network Xidian UniversityXi’an 710071China State key Laboratory of Information Security Gradute University of Chinese Academy of Sciences Beijing 100049China
A quantum secure direct communication protocol with cluster states is *** with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(***.,2009,7:689),this protocol ca... 详细信息
来源: 评论
A novel AHP and GRA based handover decision mechanism in heterogeneous wireless networks  1
收藏 引用
1st International Conference on information Computing and Applications, ICICA 2010
作者: Fu, Jianqing Wu, Jiyi Zhang, Jianlin Ping, Lingdi Li, Zhuo School of Computer Science and Technology Zhejiang University Hangzhou 310008 China Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou 310036 China
The next-generation of wireless systems represents a heterogeneous environment with different access networks technologies that differ in bandwidth, latency or cost. The most challenging problem is the seamless vertic... 详细信息
来源: 评论
Research on Structured Storage and Index of Data Flow in Disaster Tolerance System
Research on Structured Storage and Index of Data Flow in Dis...
收藏 引用
2010 International Conference on computer,Mechatronics,Control and Electronic Engineering(2010计算机、机电、控制与电子工程国际会议 CMCE 2010)
作者: Fangyuan Hou Dong Li Xiangzhan Yu Computer Network and Information Security Lab Harbin Institute of Technology Harbin China
Based on the problem that the storage of data flow lacks structure and the data retrieval speed is slow in some disaster tolerance systems, a structured data storage and high efficient data retrieval model is prop... 详细信息
来源: 评论
Risk analysis of E-commerce project development based on fuzzy set theory and analytic hierarchy process
收藏 引用
Journal of information and Computational Science 2010年 第11期7卷 2207-2215页
作者: Deng, Xinyang Zhang, Yajuan Li, Ya Wu, Jiyi Sun, Xiaohong Deng, Yong School of Computer and Information Science Southwest University Chongqing 400715 China Hangzhou Key Lab. of E-Business and Information Security Hangzhou Normal University Hangzhou Zhejiang 310036 China Key Subject Laboratory of National Defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China School of Electronics and Information Technology Shanghai Jiaotong University Shanghai 200240 China
Risk analysis is one of the most important stages in E-commerce (EC) project development. In this paper, a new method, based on Fuzzy Set Theory (FST) and Analytic Hierarchy Process (AHP), is proposed for the risk ana... 详细信息
来源: 评论
A key-Chain Based key Management Scheme for Heterogeneous Sensor network
A Key-Chain Based Key Management Scheme for Heterogeneous Se...
收藏 引用
2010 IEEE International Conference on information Theory and information security(2010 IEEE 国际信息论与信息安全会议)
作者: Guohua Ou Jie Huang Juan Li Key Lab of Information Network Security Ministry of Public Security School of Information Science and Engineering Southeast University China
Abstract -key management poses a main concern for security operation in wireless sensor networks. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors in homogeneous sens... 详细信息
来源: 评论
New OS self-immune model against computer viruses
收藏 引用
Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology 2010年 第SUPPL. 2期36卷 109-113+133页
作者: Li, Yu Zhao, Yong Han, Pei-Sheng College of Computer Science Beijing University of Technology Beijing 100124 China Key Lab of Information Network Security The Third Research Institute of Public Security Ministry of Public Security Shanghai 201204 China Institute of Electronic Technology The PLA Information Engineering University Zhengzhou 450004 China
Gaining increased attention, the problem of the computer viruses has attracted lots of security models to solve, most of which are not effective. There are two main reasons. 1) Some of them can not stop the viruses fr... 详细信息
来源: 评论