咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2651-2660 订阅
排序:
P2P Traffic Identification Based on the Signatures of key Packets
P2P Traffic Identification Based on the Signatures of Key Pa...
收藏 引用
IEEE International Workshop on computer-Aided Modeling, Analysis, and Design of Communication Links and networks, CAMAD
作者: Pinghui Wang Xiaohong Guan Tao Qin MOE Key Lab for Intelligent Networks and Network Security State Key Lab for Manufacturing Systems Xi''an Jiaotong University China Department of Automation Tsinghua National Lab for Information Science and Technology Tsinghua University Beijing China
Peer-to-Peer (P2P) protocol is widely used in many network applications and P2P traffic is becoming dominating in the current Internet and may cause serious congestion. Recently, P2P applications tend to intentionally... 详细信息
来源: 评论
Towards a Source-Code Oriented Attestation
收藏 引用
China Communications 2009年 第4期6卷 82-87页
作者: Ruan Anbang Shen Qingni Wang Li Qin Chao Gu Liang Chen Zhong School of Software and Microelectronics Peking University Beijing 102600 China Network and Information Security Laboratory Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of High Confidence Software Technologies of the Ministry of Education Peking University Beijing 100871 China First Research Institute of Ministry of Public Security of China Beijing 100048 China
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports ... 详细信息
来源: 评论
Density Adjustable Pseudorandom Sequence and Its Applications in information Hiding
Density Adjustable Pseudorandom Sequence and Its Application...
收藏 引用
The First International Conference on Multimedia information networking and security(第一届国际多媒体网络信息安全会议 MINES 2009)
作者: Chen Yu Qu Fang Hu Jianbin Chen Zhong Network and Information Security Lab School of EECS Peking University Key Laboratory of High Con.dence Software Technologies Ministry of Education China Beijing 100871 China
Pseudorandom sequence plays an important role in information hiding. But in many circumstances, what we need is pseudorandom sequence with adjustable density other than balanced pseudorandom sequence. Compared with th... 详细信息
来源: 评论
Anonymous and authenticated routing protocol for mobile ad hoc networks
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 81-85页
作者: Li, Xiao-Qing Li, Hui Ma, Jan-Feng Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Aimed at the anonymous of open environment of mobile ad hoc networks was not considered in the routing protocol of ARAN, and it was a low efficiency protocol in searching a routing. An new anonymous and authenticated ... 详细信息
来源: 评论
An Improved Identity-Based Group Signature Scheme
An Improved Identity-Based Group Signature Scheme
收藏 引用
International Conference on Computational Intelligence and security
作者: Zuowen Tan Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou Fujian China School of Information Technology Jiangxi University of Finance and Economics Nanchang Jiangxi China
In a group signature scheme, a group member signs messages anonymously on behalf of the group. However, in the case of a dispute, the actual group signer's identity can be revealed by a designated entity. In this ... 详细信息
来源: 评论
A Novel Biometric-based Authentication Scheme with Privacy Protection
A Novel Biometric-based Authentication Scheme with Privacy P...
收藏 引用
The Fifth International Conference on information Assurance and security(第五届信息保障与安全国际会议)
作者: Li Huixian Pang Liaojun School of Computer Science and Engineering Northwestern Polytechnical University Xi'an China The Ministry of Education Key Lab.of Comput.Networks and Information Security Xidian University Xi'a
Since biometric data are unique and permanent characteristics of individuals, the privacy protection of biometric authentication schemes has become a common concern of the public. Recently, Tang et al. proposed a biom... 详细信息
来源: 评论
Layer key Management Scheme on Wireless Sensor networks
Layer Key Management Scheme on Wireless Sensor Networks
收藏 引用
The Fifth International Conference on information Assurance and security(第五届信息保障与安全国际会议)
作者: Qingqi Pei Lei Wang Liaojun Pang Hong Tang Hao Yin Institute of China Electronic System Engineering Corporation Beijing 100039China Key Lab of Compute Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xi' Institute of China Electronic System Engineering Corporation Beijing 100039China
Wireless sensor networks are open architectures, so any potential threat can easily intercept, wiretap and counterfeit the information. Therefore, the safety of WSN is very important. Since any single key system canno... 详细信息
来源: 评论
Fuzzy analytic hierarchy process-based utilities evaluation and adoption for DRM security policies
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第1 A期30卷 126-131页
作者: Zhang, Zhi-Yong Ye, Chuan-Qi Fan, Ke-Feng Zhang, Li-Li Niu, Dan-Mei Electronics Information Engineering College Henan University of Science and Technology Luoyang 471003 China Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China Information Security Center for the State Key Laboratory of Network and Exchange Beijing Post and Telecom University Beijing 100158 China
The utility evaluation of DRM security policies based on fuzzy analytic hierarchy process (FAHP) and their game-theoretic adoptions were proposed from a novel perspective of the different level security and utilities&... 详细信息
来源: 评论
An Improved Identity-based Society Oriented Signature Scheme
An Improved Identity-based Society Oriented Signature Scheme
收藏 引用
The First International Conference on Multimedia information networking and security(第一届国际多媒体网络信息安全会议 MINES 2009)
作者: Zuowen Tan School of Information Technology Jiangxi University of Finance & Economics Nanchang 330013Jiangxi Province P.R. China Key Lab of Network Security and Cryptology Fujian Normal University Fuzhou 350007Fujian Province P.R. China
In a society oriented signature scheme, a signature is produced by several co-signers simultaneously in a group. Saeednia proposed an identity-based society oriented signature scheme. However, there are some security ... 详细信息
来源: 评论
security and trust in digital rights management: A survey
收藏 引用
International Journal of network security 2009年 第3期9卷 247-263页
作者: Zhang, Zhiyong Pei, Qingqi Ma, Jianfeng Yang, Lin Ministry Of Education Key Laboratory of Computer Network and Information Security Xidian University Taibai South Road No.2 Xi'an Shannxi 710071 China Electronic Information Engineering College Henan University of Science and Technology Xiyuan Road No.48 Luoyang Henan 471003 China The Research Institute China Electronic Equipment and Systems Engineering Corporation Dacheng Road 13 Beijing 100141 China
A successful transaction of digital contents is primarily dependent on security policies, trust relationships and benefit equilibriums among various participants in a DRM (Digital Rights Management)-enabling contents ... 详细信息
来源: 评论