咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是2821-2830 订阅
排序:
基于最优极大前缀编码的信息压缩与加密
基于最优极大前缀编码的信息压缩与加密
收藏 引用
第八届中国密码学学术会议
作者: Dongyang Long Department of Computer Science Zhongshan UniversityGuangzhouPRC510275 The State Key Lab.of Information Security Chinese Academy ot ScienceBeijingPRC100080
本文引入了一种新的最优编码方法—最优极大前缀编码。我们证明了:对于有限和无限信源字母表,最优极大前缀编码总是存在。而且也证明了Huffman编码一定是最优极大前缀编码;反之,最优极大前缀编码不一定是Huffman编码。特别地,每一个... 详细信息
来源: 评论
受囿单向函数及其性质
受囿单向函数及其性质
收藏 引用
第八届中国密码学学术会议
作者: Rui Xue Mei Han Jian Li Dengguo Feng State Key Lab.of Information Security Institute of SoftwareCASBeijingPRC100080 Department of Applied Mathematics University of Science and Technology of BeijingBeijingPRC100039 Department of Computer Science Guang Dong Zhao Qing UniversityzhaoqingPRC526000
为了适应密码学在各种实际应用中需要,提出了一种新的单向函数-受囿单向函数的概念,形成了一个单向函数的(分层)谱,这是新方案的一个基本概念。与现行的密码学不同,我们不是将所有多项式作为一个可行类,而是将部分多项式作为一个... 详细信息
来源: 评论
The precaution of the network virus and the quantitative analysis of the epidemic situation
The precaution of the network virus and the quantitative ana...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Bai-Ling Wang Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China National Computer Network and Information System Security Administration Center Beijing China
Comparing with the traditional host virus, the network virus has more attack ability and is more infectious in open network environment. So it is necessary to set a national virus precaution system to detect and contr... 详细信息
来源: 评论
An architecture for intrusion detection using honey pot
An architecture for intrusion detection using honey pot
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Zhi-Hong Tian Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China National Computer Network and Information System Security Administration Center Beijing China
The most common shortcomings in the existing intrusion detection systems (IDSs) are information overload, unknown attacks, false positives and false negatives. We present the design of AAIDHP (an architecture for intr... 详细信息
来源: 评论
Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc networks
收藏 引用
Journal of Interconnection networks 2003年 第3期4卷 345-359页
作者: Jiandong Li Zygmunt J. Haas Min Sheng Yanhui Chen Xidian University State Key Lab. of Integrated Service Network Xi'an Shaanxi 710071 P. R. China Cornell University School of Electrical and Computer Engineering Wireless Networks Laboratory Ithaca NY 14853 USA Xidian University Information Science Institute Xi'an Shaanxi 710071 P. R. China
In this paper, the IEEE 802.11 multiple access control (MAC) protocol was modified for use in multi-channel, multi-hop ad hoc networks through the use of a new channel-status indicator. In particular, in the modified ... 详细信息
来源: 评论
Improving Chinese Storing Text Retrieval Systems' security via a Novel Maximal Prefix Coding
收藏 引用
International Journal of computer Processing of Languages 2002年 第4期15卷 379-393页
作者: D. Y. LONG W. J. JIA P. O. AU M. LI Department of Computer Science Zhongshan University Guangzhou 510275 PRC State Key Lab. of Information Security Chinese Academy of Science Beijing 100080 PRC Department of Computer Engineering and Information Technology City University of Hong Kong 83 Tat Chee Avenue Kowloon Hong Kong SAR PRC School of Computing National University of Singapore Singapore
We have seen that Huffman coding has been widely used in data, image, and video compression. In this paper novel maximal prefix coding is introduced. Relationship between the Huffman coding and the optimal maximal pre... 详细信息
来源: 评论
A Fast Algorithm for the k-error Linear Complexity of a Binary sequence
A Fast Algorithm for the k-error Linear Complexity of a Bina...
收藏 引用
2001 International Conferences on Info-tech and Info-net
作者: Shimin WEI Zhong CHEN Guozhen XIAO Research Group of Information Security Department of Computer Science and TechniquePeking University National Key Lab of ISN Xidian University
An efficient algorithm is presented for computing the k-error linear complexity of a binary sequence with period p~n,where 2 is a primitive root modulo *** new algorithm is a generalization of an algorithm over a bina... 详细信息
来源: 评论
A fast algorithm for the k-error linear complexity of a binary sequence
A fast algorithm for the k-error linear complexity of a bina...
收藏 引用
International Conferences on Info-tech and Info-net (ICII)
作者: Shimin Wei Zhong Chen Guozhen Xiao Research Group of Information Security Department of Computer Science and Technique Peking University Beijing China National Key Lab of ISN Xidian University Xi'an China
An efficient algorithm is presented for computing the k-error linear complexity of a binary sequence with period p/sup n/, where 2 is a primitive root modulo p/sup 2/. The new algorithm is a generalization of an algor... 详细信息
来源: 评论
Two notes on low-density subset sum algorithm  5th
Two notes on low-density subset sum algorithm
收藏 引用
5th Annual International Symposium on Algorithms and Computation, ISAAC 1994
作者: Daxing, Li Shaohan, Ma Dept. of Mathematics Shandong University Jinan250100 China State Key Lab. of Information Security Graduate School of University of Science and Technlogy of China Beijing100039 China Dept. of Computer Science Shandong University Jinan250100 China
In this short extended abstract, we give two notes on low-density subset sum algorithm. One is, by extending the variables range from {0, 1}to {-1, 0, 1} and allowing the weight be negative, to prove that almost all e... 详细信息
来源: 评论
A Systematic Literature Review of Robust Federated Learning: Issues, Solutions, and Future Research Directions
收藏 引用
ACM Computing Surveys 1000年
作者: Md Palash Uddin Yong Xiang Mahmudul Hasan Jun Bai Yao Zhao Longxiang Gao School of Information Technology Deakin University Burwood Australia Deakin University Burwood Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Academy of Sciences Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Federated Learning (FL) has emerged as a promising paradigm for training machine learning models across distributed devices while preserving their data privacy. However, the robustness of FL models against adversarial... 详细信息
来源: 评论