咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2661-2670 订阅
排序:
Hybrid wireless mesh protocol
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 133-139页
作者: Yang, Kai Ma, Jian-Feng School of Computer Science Xidian University Xi'an 710071 China Key Lab. of Computer Networks and Information Security of Ministry of Education Xi'an 710071 China
Hybrid wireless mesh protocol (HWMP), the default routing protocol of IEEE 802.11s, was described. HWMP provided two routing modes: on-demand and proactive. An efficient cooperation method of the two routing modes was... 详细信息
来源: 评论
ECBSC: ECDSA-based verifiable broadcast signcryption
收藏 引用
Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition) 2009年 第4期10卷 324-328页
作者: Yang, Xiao-Yuan Li, Mao-Tang Wei, Li-Xian Key Lab. of Network and Information Security College of Armed Police Force Engineering Xi'an 710086 China State Key Lab. of Integrated Service Networks Xidian University Xi'an 710071 China
The formal definition of broadcast signcryption was proposed, and based on ECDSA, a verifiable broadcast signcryption ECBSC was constructed which could signcrypt and broadcast messagers to multiple recipients. Without... 详细信息
来源: 评论
ECC-based new designated verifier signature scheme
收藏 引用
Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition) 2009年 第3期10卷 228-231页
作者: Yang, Xiao-Yuan Yu, Qing-Fei Key Lab. of Network and Information Security College of Armed Police Force Engineering Xi'an 710086 China State Key Lab. of Integrated Service Networks Xidian Univ. Xi'an 710071 China
To avoid the problem of transferability of verification right, the way to ensure that only those who had designated verifier's private keys could verify the validity of signatures was researched. An ECC-based new ... 详细信息
来源: 评论
Survey on secure node positioning in wireless sensor networks
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第10 A期30卷 74-84页
作者: Ye, A-Yong Ma, Jian-Feng Pei, Qing-Qi Xu, Li School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China Key Lab. of the Ministry of Education for Computer Networks and Information Security Xidian University Xi'an 710071 China
The security issues of location discovery were investigated, including challenges, possible security attacks and security requirements. Also, the principles, features and limitations of typical secure positioning meth... 详细信息
来源: 评论
Analysis method of multi-source flow characteristics and its application in anomaly detection
收藏 引用
Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition) 2009年 第4期10卷 350-355页
作者: Niu, Guo-Lin Guan, Xiao-Hong Long, Yi Qin, Tao MOE Key Lab. for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an 710049 China Tsinghua National Lab. for Information Science and Technology Tsinghua University Beijing 100084 China
Based on tradeoffs analysis of abnormal behavior and detection methods, a multi-source traffic features analysis and abnormal detection method was proposed. The distribution characteristics of the flow size, IP addres... 详细信息
来源: 评论
Combining opportunistic routing with dynamic source routing for wireless mesh networks
Combining opportunistic routing with dynamic source routing ...
收藏 引用
IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2009)
作者: Qiang Shen Xuming Fang Sunmyeng Kim Rong He High Performance Network Lab Institute of Acoustics Chinese Academy and Sciences Beijing China Provincial Key Laboratory of Information Coding and Transmission Southwest Jiaotong University Chengdu China School of Computer and Software Engineering Kumoh National Institute of Technology Gyeongbuk South Korea
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting bro...
来源: 评论
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer networks
收藏 引用
Transactions of Tianjin University 2008年 第1期14卷 66-72页
作者: 王方伟 张运凯 马建峰 Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Network Center Hebei Normal University
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... 详细信息
来源: 评论
A link analysis for passive UHF RFID system in LOS indoor environment
A link analysis for passive UHF RFID system in LOS indoor en...
收藏 引用
2008 International Conference on Wireless Communications, networking and Mobile Computing, WiCOM 2008
作者: Hong, Gang Wang Chang, Xing Petitioner Chang, Hua Zhu Ministry of Education Key Lab. Computer Network and Information Security Xidian University Xi'an China
A link analysis model for passive UHF RFID system in LOS indoor environment is developed and demonstrated. Using this model, the power received by tag and the read performance are investigated. The multipath fading an... 详细信息
来源: 评论
Cryptanalysis of a Type of CRT-Based RSA Algorithms
收藏 引用
Journal of computer Science & Technology 2008年 第2期23卷 214-221页
作者: 秦宝东 李明 孔凡玉 College of Computer Science and Technology Southwest University of Science and TechnologyMianyang 621010China Institute of Network Security Shandong UniversityJinan 250100China Key Laboratory of Cryptographic Technology and Information SecurityJinan 250100China
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is ca... 详细信息
来源: 评论
Non-blocking message total ordering protocol
收藏 引用
Science in China(Series F) 2008年 第12期51卷 1919-1934页
作者: WANG Yun & WANG JunLing School of computer Science & Engineering, Southeast University key lab of computer network & information Integration, MOE, Nanjing 210096, China 1. School of Computer Science & Engineering Southeast University Key Lab of Computer Network & Information Integration MOE Nanjing 210096 China
Message total ordering is a critical part in active replication in order to maintain consistency among members in a fault tolerant group. The paper proposes a non-blocking message total ordering protocol (NBTOP) for... 详细信息
来源: 评论