咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是2771-2780 订阅
排序:
Survival of the internet applications: A cluster recovery model
Survival of the internet applications: A cluster recovery mo...
收藏 引用
6th IEEE International Symposium on Cluster Computing and the Grid, 2006. CCGRID 06
作者: Aung, Khin Mi Mi Park, Kiejin Park, Jong Sou Network Security and System Design Lab. Computer Engineering Dept. Hankuk Aviation University Korea Republic of Division of Industrial and Information System Engineering Ajou University Korea Republic of Computer Engineering Dept. Hankuk Aviation University Korea Republic of
Internet applications become increasingly widely used for millions of people in the world and on the other hand the accidents or disruptions of service are also dramatically increasing. Accidents or Disruptions occur ... 详细信息
来源: 评论
information-Theoretic Secure Verifiable Secret Sharing over RSA Modulus
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1849-1852页
作者: QIU Gang WANG Hong WEI Shimin XIAO Guozhen State Key Laboratory of Integrated Sevice Network Xidian University Xi'an 710071 Shaanxi China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China Department of Computer Science and Technology Huaibei Coal Normal College Huaibei 235000 Anhui China
The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoret... 详细信息
来源: 评论
Robust detection of region-duplication forgery in digital image
Robust detection of region-duplication forgery in digital im...
收藏 引用
18th International Conference on Pattern Recognition, ICPR 2006
作者: Weiqi, Luo Jiwu, Huang Guoping, Qiu GuangDong Key Lab. of Information Security Sun Yat-Sen University Guangzhou 510275 China School of Computer Science University of Nottingham NG8 1BB United Kingdom
Region duplication forgery, in which a part of a digital image is copied and then pasted to another portion of the same image in order to conceal an important object in the scene, is one of the common image forgery te... 详细信息
来源: 评论
Robust moving object segmentation in the compressed domain for H.264/AVC video stream
Robust moving object segmentation in the compressed domain f...
收藏 引用
25th PCS: Picture Coding Symposium 2006, PCS2006
作者: Yang, Gaobo Yu, Shengfa Zhang, Zhaoyang Network and Information Security Lab School of Computer and Communication Hunan University Changsha Hunan 410082 China School of Electronic Science and Engineering National University of Defense Technology Changsha Hunan 410073 China Key Laboratory of Advanced Displays and System Application Shanghai University Ministry of Education Shanghai 200072 China
Moving object segmentation in the compressed domain plays an important role in many real-time applications, e.g. video indexing, video surveillance, etc. H.264/AVC is the up-to-date video coding standard, which employ... 详细信息
来源: 评论
An Efficient Method against Side-Channel Attacks on ECC
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1573-1576页
作者: LIU Shuanggen HU Yupu XU Wensheng Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 Shaanxi China College of Computer Information Engineering Jiangxi Normal University Nanchang 330022 Jiangxi China
Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequen... 详细信息
来源: 评论
Access method of integrating WPA and WAPI protocols into the IEEE 802.11b adapter
收藏 引用
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University 2006年 第5期33卷 804-808+818页
作者: Duan, Ning Ma, Jian-Feng Key Lab. of Computer Networks and Information Security Xidian Univ. Xi'an 710071 China IBM CRL Beijing 100094 China
According to the various security access methods applied to wireless local area network (WLAN), an approach to integrating WPA and WAPI is presented, which can make wireless terminals able to access WLAN expediently. ... 详细信息
来源: 评论
A(k,n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce
收藏 引用
Journal of China University of Mining and Technology 2006年 第4期16卷 470-474页
作者: XIN Xiang-jun WANG Mei-zhi XIAO Guo-zhen The Ministry of Edu. Key Lab. of Computer Network and Infor. Security Xidian University Xi' an Shanxi 710071 China Department of lnformation and Computing Science Zhengzhou University of Light Industry Zhengzhou Henan 450002 China Department of Math. & Physics Zhumadian Institute of Education Zhumadian Henan 463000 China
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to ... 详细信息
来源: 评论
Graphic-based theory proof of compliance algorithm
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第21期32卷 175-176页
作者: Rao, Yixuan Yang, Bo Key Lab. of Computer Network and Information Security Xi'an 710071 China
The paper puts forward a new proof of compliance algorithm in PolicyMaker, the algorithm applies graphic theory's DFS notion and the dynamic character, in the face of withdrawing the delegation, deletes the delega... 详细信息
来源: 评论
Access control model for P2P file-sharing systems based on trust and recommendation
Access control model for P2P file-sharing systems based on t...
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Yue, Guang-Xue Yu, Fei Chen, Yi-Jun Wu, Rong-Hui An, Ji-Yao Li, Ren-Fa College of Information Engineering JiaXing University JiaXing 314000 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China School of Computer and Communication Hunan University Changsha 410082 China
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper,... 详细信息
来源: 评论
A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1827-1830页
作者: ZHANG Shaomin WANG Baoyi ZHOU Lihua Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 Shaanxi China School of Computer North China Electric Power University Baoding 071003 Hebei China
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ... 详细信息
来源: 评论