咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是2711-2720 订阅
排序:
五谱值函数的构造
五谱值函数的构造
收藏 引用
中国密码学会2009年会
作者: Xie Min 谢敏 Li Juan 李娟 Zhang Feng-rong 张凤荣 Key laboratory of computer network and information security(Xidian University) Xi'an 710071 Guangdo 西安电子科技大学计算机网络与信息安全教育部重点实验室 西安 710071 广东省信息安全技术重点实验室(广州大学)广州 510405 School of Electrical Engineering(Northwest University of Nationalities) Lanzhou 730030 西北民族大学电气工程学院 兰州 730030 Key laboratory of computer network and information security(Xidian University) Xi'an 710071 西安电子科技大学计算机网络与信息安全教育部重点实验室 西安 710071
在密码体制的构造中,布尔函数被广泛地应用,对分组密码中S-盒和流密码中组合生成器等的研究,实质上可归结为对布尔函数的分析.通过分析Bent函数的性质,利用级联的方法,构造了一类五谱值函数.该类函数没有非零线性结构、平衡、代数... 详细信息
来源: 评论
Modeling and Analysis of a Self-Learning Worm Based on Good Point Set Scanning
Modeling and Analysis of a Self-Learning Worm Based on Good ...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Fangwei Wang Yunkai Zhang Jianfeng Ma Network Center Hebei Normal University Shijiazhuang China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
In order to speed up the propagating process, the worms need to scan many IP addresses to target vulnerable hosts. However, the distribution of IP addresses is highly nonuniform, which results in many scans wasted on ... 详细信息
来源: 评论
Adaptive genetic algorithm and its application to multi-literal multi-issue competitive e-commerce
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and information Technology 2008年 第11期30卷 2613-2616页
作者: Li, Jian Jing, Bo Yang, Yi-Xian Information Security Center State Key Lab. of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Dept. of Computer Technology Beijing Institute of Applied Meteorology Beijing 100029 China
To make the agents negotiate more efficiently in multi-lateral multi-issue negotiation in multi-agent based competitive e-commerce, an agent negotiation model in competitive environment is presented, and the Adaptive ... 详细信息
来源: 评论
A Congestion Avoidance and Performance Enhancement Scheme for Mobile Ad Hoc networks
A Congestion Avoidance and Performance Enhancement Scheme fo...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Chen Chen Qingqi Pei Jianfeng Ma Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
Based on the analysis of the node selfishness and the drawback of min-hop selection method as the unique routing selection criteria in ad hoc networks, a non-intrusive multi-metric ad hoc routing protocol-NIMR is pres... 详细信息
来源: 评论
Improvement on WLAN multicast key management protocol
Improvement on WLAN multicast key management protocol
收藏 引用
2008 International Conference on Computational Intelligence and security, CIS 2008
作者: Huixian, Li Liaojun, Pang Dept. of Comput. Sci. and Engineering Northwestern Polytechnical Univ. Xi'an 710072 China Ministry of Edu. Key Lab. of Computer Networks and Information Security Xidian University Xi'an 710071 China
Multicasting is an important business in the field of the Wireless Local Area network (WLAN). The access point (AP) usually has to seed the same message to each station (STA) of a specific group, and the multicasting ... 详细信息
来源: 评论
CRMS: A Collusion-Resistant Matrix System for Group key Management in Wireless networks
CRMS: A Collusion-Resistant Matrix System for Group Key Mana...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: W. Wang J. Ma S. Moon Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University Daegu South Korea
In this paper, a collusion-resistant matrix system (CRMS) for group key managements is presented. The CRMS is defined as a collection of subsets of users, and the keys held by users in CRMS are organized in a hierarch... 详细信息
来源: 评论
A Novel Generation key Scheme Based on DNA
A Novel Generation Key Scheme Based on DNA
收藏 引用
International Conference on Computational Intelligence and security
作者: Xin-she Li Lei Zhang Yu-pu Hu Xi'an Research Inst. of Hi-Tech Xi'an China Ministry of Education Key Laboratory of Computer Network & Information Security XiDian University Xi'an China
A novel generation key scheme based on DNA is proposed. By using a key expansion matrix, the scheme improves the independence and the strict avalanche of the key. Although it increases computation amount because of us... 详细信息
来源: 评论
AN ADULT SHORT MESSAGE RECOGNITION ALGORITHM BASED ON RESTRICTED CLOSE TEST OPTIMIZATION
AN ADULT SHORT MESSAGE RECOGNITION ALGORITHM BASED ON RESTRI...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: QIN-DONG SUN XIN-BO HUANG JIU-LONG ZHANG Network Computing and Security Tech.Key Lab.of Shaanxi Province Xi'an University of Technology Xi' College of Electronics and Information Xi'an Polytechnic University Xi'an 710048 China Network Computing and Security Tech.Key Lab.of Shaanxi Province Xi'an University of Technology Xi'
The flooding of adult short message has become an urgent problem of safety of message content. Existing researches on short message filtering pay much attention to rubbish and advertising short messages, and the granu... 详细信息
来源: 评论
MPMAC and its security analysis
收藏 引用
Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology 2008年 第SUPPL. 2期34卷 62-66页
作者: Zhang, Shao-Lan Yang, Yi-Xian Xing, Guo-Bo Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science and Technology Shandong Jianzhu University Jinan 250101 China
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with ran... 详细信息
来源: 评论
Linear programming models for jamming attacks on network traffic flows
Linear programming models for jamming attacks on network tra...
收藏 引用
International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless networks (WiOpt)
作者: Patrick Tague David Slater Radha Poovendran Guevara Noubir Network Security Lab (NSL) Department of Electrical Engineering University of Washington Seattle WA USA College of Computer and Information Science Northeastern University Boston MA USA
We present a new class of network attacks, referred to as flow-jamming attacks , in which an adversary with multiple jammers throughout the network jams packets to reduce traffic flow. We propose a linear programming... 详细信息
来源: 评论