咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2641-2650 订阅
排序:
pService: Towards similarity search on peer-to-peer web services discovery
pService: Towards similarity search on peer-to-peer web serv...
收藏 引用
1st International Conference on Advances in P2P Systems, AP2PS 2009
作者: Zhou, Gang Yu, Jianjun National Digital Switching System Engineering and Technological Research Center 450002 France State Key Lab. of Software Development Environment Beihang University 100191 China Computer Network Information Center Chinese Academy of Sciences 100190 China
We present the design of pService system for P2P Web services discovery supporting similarity earch with its locality-preserving feature based on modified Skip Graph. In pService, the most important property (e.g. ser... 详细信息
来源: 评论
An Efficient Anonymous Routing Protocol for Mobile Ad Hoc networks
An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Ne...
收藏 引用
The Fifth International Conference on information Assurance and security(第五届信息保障与安全国际会议)
作者: Xiaoqing Li Hui Li Jianfeng Ma Weidong Zhang Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xi'anP.R.China
Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malic... 详细信息
来源: 评论
Improvement of MODIS 8-day LAI/FPAR product with temporal filters to generate high quality time-series product
Improvement of MODIS 8-day LAI/FPAR product with temporal fi...
收藏 引用
2009 Joint Urban Remote Sensing Event
作者: Huifang, Zhang Runhe, Shi Honglin, Zhong Peiqing, Qu Juan, Sun Wenpeng, Lin Su, Li Key Lab. of Geographic Information Science Ministry of Education East China Normal University Shanghai China Key Laboratory of Ecosystem Network Observation and Modeling IGSNRR CAS Beijing China Key Lab. of Urban Ecology and Environment Restoration Shanghai Normal University Shanghai China Computer College Beijing Technology and Business University Beijing China
Numerous studies have reported that the timeseries terrestrial parameters such as the Normalized Difference Vegetation Index (NDVI), Leaf Area of Index (LAI), Fraction of Absorbed Photosynthetic Active Radiation (FPAR... 详细信息
来源: 评论
Support vector machine for suppressing error method
Support vector machine for suppressing error method
收藏 引用
1st International Conference on information Science and Engineering, ICISE2009
作者: Lu, Shuxia Shi, Pu Chen, Ming Key Lab. of Machine Learning and Computational Intelligence College of Mathematics and Computer Science Hebei University Baoding China Baoding Pascali Cable TV Integrater Information Network Co. Ltd. Baoding China College of Mathematics and Computer Science Hebei University Baoding China
Support Vector Machine (SVM) is sensitive to noises and outliers. For reducing the effect of noises and outliers, we propose a novel SVM for suppressing error function. The error function is limited to the interval of... 详细信息
来源: 评论
A novel key pre-distribution scheme using one-way hash chain and bivariate polynomial for wireless sensor networks
A novel key pre-distribution scheme using one-way hash chain...
收藏 引用
IEEE International Workshop on Anti-counterfeiting, security, Identification, ASID
作者: Xu Li Jinbo Shen Key Lab of Network Security and Cryptology Fujian Normal University Fuzhou China Department of Computer Science Fujian Normal University Fuzhou China
security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric cryptographic protocols are not suitable for the ... 详细信息
来源: 评论
The Algorithm of Short Message Hot Topic Detection Based on Feature Association
收藏 引用
information Technology Journal 2009年 第2期8卷 236-240页
作者: Sun, Qindong Wang, Qian Qiao, Hongli School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Network Computing and Security Key Lab of Shaanxi Xi'an University of Technology Xi'an 710048 China
Aiming at the mobile short message (SMS) hot topic extraction, the text features and statistical regularity of SMS are analyzed in this study. The formal description of SMS hot topic is given and an algorithm of SMS h... 详细信息
来源: 评论
Ideal Perfect Multilevel Threshold Secret Sharing Scheme
Ideal Perfect Multilevel Threshold Secret Sharing Scheme
收藏 引用
The Fifth International Conference on information Assurance and security(第五届信息保障与安全国际会议)
作者: Changlu Lin Lein Harn Dingfeng Ye Key Laboratory of Network Security and Cryptology Fujian Normal University China State Key Laborat Department of Computer Science Electrical Engineering University of Missouri-Kansas CityUSA State Key Laboratory of Information Security Graduate University of Chinese Academy of SciencesChin
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,... 详细信息
来源: 评论
Combining opportunistic routing with dynamic source routing for wireless mesh networks
Combining opportunistic routing with dynamic source routing ...
收藏 引用
Institution of Engineering and Technology International Communication Conference on Wireless Mobile and Computing
作者: Shen, Qiang Fang, Xuming Kim, Sunmyeng He, Rong Provincial Key Lab. of Information Coding and Transmission Southwest Jiaotong University Chengdu 610031 China High Performance Network Lab. Institute of Acoustics Chinese Academy of Sciences Beijing 100190 China School of Computer and Software Engineering Kumoh National Institute of Technology Gyeongbuk 730701 Korea Republic of
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting bro... 详细信息
来源: 评论
security Analysis of Two Remote User Authentication Schemes Using Bilinear Pairings
Security Analysis of Two Remote User Authentication Schemes ...
收藏 引用
International Conference on Management of e-Commerce and e-Government, ICMECG
作者: Zuowen Tan Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou China School of Information Technology Jiangxi University of Finance and Economics Nanchang Jiangxi China State Key Laboratory of Information Security Institute of Software of Chinese Academy of Sciences Beijing China
Recently, Das et al. and Tseng et al. proposed a remote user authentication scheme using bilinear pairings, respectively. They can provide a flexible password change option to the users without any help from the remot... 详细信息
来源: 评论
A practical electronic payment scheme
A practical electronic payment scheme
收藏 引用
International Symposium on Communications and information Technologies (ISCIT)
作者: Jingwei Liu Kyung Sup Kwak Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an China UWB Wireless Communications Research Center Inha University Incheon South Korea
In this paper, by converse using blind signature, we propose a practical electronic payment scheme for electronic commerce. This scheme is different from the existing schemes used widely in the Internet at present and... 详细信息
来源: 评论