咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2671-2680 订阅
排序:
Study on user's identification system in insider threats
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 121-126页
作者: Pei, Qing-Qi Zhao, Peng Zhang, Hong-Bin Wang, Chao Yin, Hao Institute of China Electronic System Engineering Corporation Beijing 100141 China Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China Institute of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang 050018 China
Monitoring user's abnormal behaviors, which is an effective method to detect impersonation, is used for impersonation detection in insider threats. A model is built by using TAN-based Bayesian network to reflect t... 详细信息
来源: 评论
Fast access control algorithm in wireless network
Fast access control algorithm in wireless network
收藏 引用
3rd International Conference on Grid and Pervasive Computing Symposia/Workshops, GPC 2008
作者: Wang, Kun Ma, Zhixin Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China
This paper presents an access control algorithm which bases on artificial neural network (ANN). It uses selected roles as input vectors. Then, considering role inheritance, the matching roles that may mutual exclude a... 详细信息
来源: 评论
Modeling and analysis of a self-learning worm based on good point set scanning
Modeling and analysis of a self-learning worm based on good ...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC 2008
作者: Wang, Fangwei Zhang, Yunkai Ma, Jianfeng Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Network Center Hebei Normal University Shijiazhuang 050016 China Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China
In order to speed up the propagating process, the worms need to scan many IP addresses to target vulnerable hosts. However, the distribution of IP addresses is highly non-uniform, which results in many scans wasted on... 详细信息
来源: 评论
A new approach for UC security concurrent deniable authentication
收藏 引用
Science in China(Series F) 2008年 第4期51卷 352-367页
作者: FENG Tao LI FengHua MA JianFeng SangJae MOON Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Computer and Communications Lanzhou University of Technology Lanzhou 730050 China Mobile Network Security Technology Research Center Kyungpook National University Sankyuk-dong Buk-ku Daeyu 702-701 Korea
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynch... 详细信息
来源: 评论
A congestion avoidance and performance enhancement scheme for mobile ad hoc networks
A congestion avoidance and performance enhancement scheme fo...
收藏 引用
4th International Conference on Mobile Ad-hoc and Sensor networks, MSN 2008
作者: Chen, Chen Pei, Qingqi Ma, Jianfeng Key Lab. of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China
Based on the analysis of the node selfishness and the drawback of min-hop selection method as the unique routing selection criteria in Ad Hoc networks,a non-intrusive multi-metric Ad Hoc Routing Protocol-NIMR is *** c... 详细信息
来源: 评论
Node-failure tolerance of topology in wireless sensor networks
收藏 引用
International Journal of network security 2008年 第2期7卷 261-264页
作者: Wang, Liang-Min Ma, Jian-Feng Guo, Yuan-Bo The Computer School Jiangsu University Zhenjiang 212013 China Key Laboratory of Computer Network and Information Security of Education Ministry Xidian University Xi'an Shaanxi 710071 China School of Electronic Technology Engineering University of PLA Zhengzhou 450004 China
Three basic questions are presented and answered in researching on nodefailure topology in wireless sensor network. First, what is the definition of nodefailure tolerance? Second, how to evaluate this tolerance abilit... 详细信息
来源: 评论
Attack-tolerant node localization in wireless sensor networks
收藏 引用
Wuhan Ligong Daxue Xuebao/Journal of Wuhan University of Technology 2008年 第7期30卷 111-115页
作者: Ye, A-Yong Ma, Jian-Feng Key Lab. of the Ministry of Education for Computer Networks and Information Security Xidian University Xi'an 710071 China Key Lab. of the Network Security and Cryptology Fujian Normal University Fuzhou 350007 China
It is essential to ensure that sensors can determine their location for wireless sensor networks. However, most of existing location discovery protocols became vulnerable in the presence of malicious attacks. So the a... 详细信息
来源: 评论
Trust valuation model in MANET
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2008年 第5期45卷 765-771页
作者: Ye, Ayong Ma, Jianfeng Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China
Being infrastructureless, node trust plays an important role in security and reliability of mobile ad hoc networks. A new trust valuation model based on the experience of node is given to evaluate trustworthiness betw... 详细信息
来源: 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of computer Science and Technology,Beijing University of Technology,Beijing 100124,China 2 State key laboratory of Integrated Services network,Xidian University,Xi’an 710071,China 3 State key laboratory of information security (Graduate University of Chinese Academy of Sciences),Beijing 100049,China 4 State key laboratory of networking and Switching Technology,Beijing University of Posts and Tele-communications,Beijing 100876,China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 评论
Quantum threshold group signature
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of computer Science and Technology, Beijing University of Technology, Beijing 100124, China 2 State key laboratory of Integrated Services network, Xidian University, Xi’an 710071, China 3 State key laboratory of information security (Graduate University of Chinese Academy of Sciences), Beijing 100049, China 4 State key laboratory of networking and Switching Technology, Beijing University of Posts and Tele-communications, Beijing 100876, China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 评论