咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2551-2560 订阅
排序:
Enhance information Flow Tracking with Function Recognition
收藏 引用
China Communications 2010年 第6期7卷 24-29页
作者: Zhou Kan Huang Shiqiu Huang Shan Qi Zhengwei Gu Jian Guan Haibing School of software Shanghai Jliao Tong University Shanghai 200240 P. R. China Key Lab of Information Network Security Ministry of Public Security Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai 200240 P. R China Shanghai Key Laboratory of Scalable Computing & System Shanghai P. R. China
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput... 详细信息
来源: 评论
Incremental intrusion detecting method based on SOM/RBF
Incremental intrusion detecting method based on SOM/RBF
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: Tian, Li-Ye Liu, Wei-Peng Dept. of Electronic and Information Engineering Naval Aeronautical and Astronautical University Yantai 264001 China State Key Laboratory of Information Security GUCAS Beijing 100039 China Trusted Computing Lab. College of Computer Beijing University of Technology Beijing 100022 China
An incremental intrusion detecting model is proposed in this paper. This model integrates unsupervised Self Organizing Map and supervised Radial Basis Function to complete incremental learning. Self Organizing Map can... 详细信息
来源: 评论
Improving Efficiency of security Schemes in Automated Trust Negotiation
Improving Efficiency of Security Schemes in Automated Trust ...
收藏 引用
International Workshop on Education Technology and computer Science, ETCS
作者: Bailing Liu Hongwei Lu Yizhu Zhao Feng Ge College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Laboratory of Information Network Security Ministry of Public Security Shanghai China
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. When... 详细信息
来源: 评论
An Efficient Automated Trust Negotiation Framework Supporting Adaptive Policies
An Efficient Automated Trust Negotiation Framework Supportin...
收藏 引用
International Workshop on Education Technology and computer Science, ETCS
作者: Bailing Liu Hongwei Lu Yizhu Zhao College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Laboratory of Information Network Security Ministry of Public Security Shanghai China
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. Prev... 详细信息
来源: 评论
Hierarchical certificateless signatures
Hierarchical certificateless signatures
收藏 引用
International Workshop on Wireless network Algorithm and Theory
作者: Zhang, Lei Wu, Qianhong Domingo-Ferrer, Josep Qin, Bo UNESCO in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain Wuhan University School of Computer Key Lab. of Aerospace Information Security and Trusted Computing China Xi'an University of Technology School of Science Department of Maths China
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In... 详细信息
来源: 评论
Efficient and identity-based signcryption with provably-secure
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2010年 第7期4卷 148-153页
作者: Wen, Yiling Ma, Jianfeng Moon, Sangjae Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University Daegu 702-701 Korea Republic of
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more efficient than using an encryption scheme combined with a signature scheme. We present an identity-based signcryption so... 详细信息
来源: 评论
Integrity Measurement Model Based on Trusted Virtual Platform
Integrity Measurement Model Based on Trusted Virtual Platfor...
收藏 引用
International Conference on Genetic and Evolutionary Computing (ICGEC)
作者: Gang Qiu Yulei Wang Lihua Zhou Ministry of Education Key Laboratory of Computer Network & Information Security Xidian University Xi'an China Network Information Center Nanyang Institute of Technology Nanyang China School of Computer Science and Technology Xidian University Xi'an China
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to as... 详细信息
来源: 评论
Bundle transport model of satellite delay tolerant networks
Bundle transport model of satellite delay tolerant networks
收藏 引用
International Conference on Future computer and Communication, ICFCC
作者: Haizheng Yu Jianfeng Ma Hong Bian Key Laboratory of Computer Network and Information Security Xidian University Xi'an China School of Mathematical Sciences Xinjiang Normal University Urumqi China
The data is transmitted between a small satellite near earth and the ground stations. For transmitting reliably, the data is divided into many fragments, and these fragments are encapsulated as multiple bundles with t... 详细信息
来源: 评论
Constructions of Maiorana-McFarland's Bent Functions of Prescribed Degree
Constructions of Maiorana-McFarland's Bent Functions of Pres...
收藏 引用
International Conference on Computational Intelligence and security
作者: Feng-rong Zhang Yu-pu Hu Hua Ma Min Xie Key laboratory of computer network and information security Ministry of Education Xidian University Xi'an China School of science Xidian University Xi'an China
A Boolean function with an even number n = 2k of variables is called Bent if it is maximally nonlinear. A technique on constructing Maiorana-McFarland's Bent functions of arbitrary degree is described. Based on th... 详细信息
来源: 评论
Novel identity-based blind signature for electronic voting system
Novel identity-based blind signature for electronic voting s...
收藏 引用
2nd International Workshop on Education Technology and computer Science, ETCS 2010
作者: Zhang, Leyou Hu, Yupu Tian, Xu'an Yang, Yang Department of Mathematical Science Xidian University Xi'an ShaanXi 710071 China Key Lab. of Computer Networks and Information Security Ministry of Education Xidian University Xi'an ShaanXi 710071 China Xi'an Communications Institute Xi'an ShaanXi 710106 China
Blind signature allows the user to obtain a signature of a message in a way that the signer learns neither the message nor the resulting signature. At present, many electronic voting systems(E-voting) based on the bli... 详细信息
来源: 评论