咨询与建议

限定检索结果

文献类型

  • 104 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 101 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 10 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 57 篇 理学
    • 41 篇 数学
    • 12 篇 物理学
    • 7 篇 生物学
    • 6 篇 统计学(可授理学、...
  • 38 篇 管理学
    • 22 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 8 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学

主题

  • 9 篇 cryptography
  • 8 篇 privacy
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 image segmentati...
  • 3 篇 optimization
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 malware
  • 3 篇 federated learni...
  • 3 篇 cloud computing

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 college of infor...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 yu zhang

语言

  • 149 篇 英文
  • 12 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Computer Network and Information Integration"
171 条 记 录,以下是61-70 订阅
排序:
Security analysis of the kerberos protocol using BAN logic
Security analysis of the kerberos protocol using BAN logic
收藏 引用
5th International Conference on information Assurance and Security, IAS 2009
作者: Fan, Kai Li, Hui Wang, Yue Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us... 详细信息
来源: 评论
Clock Synchronization in Mobile Ad Hoc networks Based on an Iterative Approximate Byzantine Consensus Protocol
Clock Synchronization in Mobile Ad Hoc Networks Based on an ...
收藏 引用
International Conference on Advanced information networking and Applications (AINA)
作者: Chuanyou Li Yun Wang Michel Hurfin Ministry of Education Key Lab of Computer Network & Information Integration Nanjing China Inria Rennes France
We consider the clock synchronization problem in wireless mobile ad hoc networks in the presence of Byzantine nodes. The communication topology is dynamic: nodes move randomly within a geographical area. We propose a ... 详细信息
来源: 评论
Highly Compact Virtual Counters for Per-Flow Traffic Measurement through Register Sharing
Highly Compact Virtual Counters for Per-Flow Traffic Measure...
收藏 引用
IEEE Global Communications Conference
作者: You Zhou Yian Zhou Min Chen Qingjun Xiao Shigang Chen Department of Computer & Information Science & Engineering University of Florida Key Lab of Computer Network and Information Integration Southeast University Ministry of Education
Per-flow traffic measurement is a fundamental problem in the era of big network data, providing critical information for many practical applications including capacity planning, traffic engineering, data accounting, r... 详细信息
来源: 评论
On accuracy rate of community detection and pairing in mobile social network
On accuracy rate of community detection and pairing in mobil...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Jinbin Tu Qing Li Yun Wang School of Computer Science and Engineering Southeast University Key Lab of Computer Network and Information Integration Nanjing MOE China
Mobile Social network(MSN) is an opportunity network that considers the social attributes of nodes, and also uses the ”store-carry-forward” model to carry out data transfer between nodes. The community nature of nod...
来源: 评论
Joint Optimization of UAV Deployment and Task Computation Offloading Decision in UAV-assisted Edge Computing network
Joint Optimization of UAV Deployment and Task Computation Of...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Yichuan Liu Jinbin Tu Yun Wang Key Lab of Computer Network and Information Integration MOE School of Computer Science and Engineering Southeast University Nanjing China
The UAVs' deployment decision and task computation offloading decision in the UAV-assisted edge computing network significantly impact the operating efficiency of edge network. On the basis of this, the Optimizati...
来源: 评论
New construction of single-and multi-output Boolean functions with high algebraic immunity
New construction of single-and multi-output Boolean function...
收藏 引用
作者: He, Yefeng Ma, Wenping Ministry of Education Key Lab. of Computer Network and Information Security Xidian University Xi'an 710071 China School of Communication and Information Engineering Xi'an Institute of Post and Telecommunications Xi'an 710121 China
In order to respond to algebraic attacks, it is important to construct Boolean functions with high algebraic immunity of the graphs. In this paper, the complicated problem of algebraic immunity of the graph is convert... 详细信息
来源: 评论
T-Sorokin: A General Mobility Model in Opportunistic networks
T-Sorokin: A General Mobility Model in Opportunistic Network...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Jinbin Tu Qing Li Yun Wang School of Computer Science and Engineering Southeast University Key Lab of Computer Network and Information Integration MOE Nanjing China
The opportunistic networks are a kind of ad hoc networks that rely on the chance of nodes meeting to transmit messages. Acting as an effective supplement to 4G and 5G networks in some special scenarios where hardware ...
来源: 评论
A Non-Intrusive and Real-Time Data Provenance Method for DDS Systems
A Non-Intrusive and Real-Time Data Provenance Method for DDS...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Siyi Wei Jinbin Tu Yun Wang School of Computer Science and Engineering Southeast University Key Lab of Computer Network and Information Integration MOE Nanjing China
In the era of big data, because of the escalating data security threats, the importance of data provenance is widely recognized. It facilitates the tracking of data origins and evolution, improving the ability to diag... 详细信息
来源: 评论
Walsh spectrum of cryptographically concatenating functions and its applications in constructing resilient Boolean functions
收藏 引用
Journal of Computational information Systems 2011年 第4期7卷 1074-1081页
作者: Gao, Sheng Ma, Wenping Zhao, Yongbin Zhuo, Zepeng Key Lab. of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China
Resilient Boolean functions have many applications in fault-tolerant distributed computing and quantum cryptographic key. Construction of this class functions with more cryptographic criteria such as high nonlinearity... 详细信息
来源: 评论
Analysis of the paragraph vector model for information retrieval  16
Analysis of the paragraph vector model for information retri...
收藏 引用
2016 ACM International Conference on the Theory of information Retrieval, ICTIR 2016
作者: Ai, Qingyao Yang, Liu Guo, Jiafeng Croft, W. Bruce College of Information and Computer Sciences University of Massachusetts Amherst AmherstMA United States CAS Key Lab. of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Previous studies have shown that semantically meaningful representations of words and text can be acquired through neural embedding models. In particular, paragraph vector (PV) models have shown impressive performance... 详细信息
来源: 评论