咨询与建议

限定检索结果

文献类型

  • 557 篇 会议
  • 410 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 969 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 588 篇 工学
    • 423 篇 计算机科学与技术...
    • 352 篇 软件工程
    • 164 篇 信息与通信工程
    • 74 篇 控制科学与工程
    • 69 篇 电气工程
    • 60 篇 电子科学与技术(可...
    • 50 篇 生物工程
    • 42 篇 机械工程
    • 41 篇 网络空间安全
    • 29 篇 仪器科学与技术
    • 23 篇 光学工程
    • 16 篇 建筑学
    • 16 篇 交通运输工程
    • 16 篇 安全科学与工程
    • 15 篇 土木工程
    • 15 篇 生物医学工程(可授...
    • 11 篇 材料科学与工程(可...
  • 234 篇 理学
    • 150 篇 数学
    • 51 篇 生物学
    • 42 篇 统计学(可授理学、...
    • 37 篇 物理学
    • 30 篇 系统科学
    • 10 篇 化学
  • 140 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 20 篇 法学
    • 11 篇 社会学
    • 10 篇 法学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 军事学
    • 11 篇 军队指挥学
  • 11 篇 医学
  • 4 篇 教育学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 60 篇 feature extracti...
  • 52 篇 accuracy
  • 48 篇 semantics
  • 38 篇 computational mo...
  • 35 篇 cryptography
  • 32 篇 training
  • 29 篇 federated learni...
  • 26 篇 data models
  • 25 篇 deep learning
  • 22 篇 transformers
  • 22 篇 neural networks
  • 21 篇 authentication
  • 21 篇 security
  • 20 篇 object detection
  • 20 篇 wireless sensor ...
  • 19 篇 information secu...
  • 19 篇 protocols
  • 18 篇 visualization
  • 17 篇 privacy
  • 16 篇 noise

机构

  • 200 篇 shandong provinc...
  • 158 篇 key laboratory o...
  • 43 篇 shandong fundame...
  • 41 篇 shandong enginee...
  • 41 篇 key laboratory o...
  • 28 篇 key lab of educa...
  • 28 篇 pca lab key lab ...
  • 25 篇 school of comput...
  • 24 篇 key laboratory o...
  • 20 篇 ministry of educ...
  • 18 篇 college of compu...
  • 18 篇 guangxi key lab ...
  • 16 篇 ministry of educ...
  • 16 篇 pca lab key lab ...
  • 15 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 key laboratory o...
  • 13 篇 guangxi key lab ...
  • 13 篇 jiangsu high tec...

作者

  • 71 篇 yang jian
  • 33 篇 jianfeng ma
  • 31 篇 jian yang
  • 31 篇 meng deyu
  • 27 篇 hu yupu
  • 24 篇 ma jianfeng
  • 23 篇 xie jin
  • 22 篇 wang hui-ming
  • 17 篇 ma jian-feng
  • 16 篇 cao xiangyong
  • 15 篇 pei qingqi
  • 15 篇 jiang haobo
  • 13 篇 yang yang
  • 13 篇 qian jianjun
  • 13 篇 qingqi pei
  • 12 篇 xiaoming wu
  • 12 篇 li xiang
  • 12 篇 pang liaojun
  • 12 篇 wang ruchuan
  • 12 篇 gong chen

语言

  • 910 篇 英文
  • 30 篇 中文
  • 29 篇 其他
检索条件"机构=Key Lab. of Computer Networks and Information Security Ministry of Education"
969 条 记 录,以下是41-50 订阅
排序:
Two-step transmission with artificial noise for secure wireless SIMO communications
收藏 引用
Science China(information Sciences) 2015年 第4期58卷 115-127页
作者: WANG Bo MU PengCheng YANG PeiZhi YIN QinYe Ministry of Education Key Lab for Intelligent Networks and Network Security School of Electronic and Information Engineering Xi’an Jiaotong University
The issue of physical layer security of the wireless single-input multiple-output(SIMO) system is addressed in this paper. We propose a two-step transmission scheme with artificial noise to improve the security and th... 详细信息
来源: 评论
A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Gao, Suo Iu, Herbert Ho-Ching Erkan, Ugur Simsek, Cemaleddin Toktas, Abdurrahim Cao, Yinghong Wu, Rui Mou, Jun Li, Qi Wang, Chunpeng Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering Perth6009 Australia Faculty of Engineering Electrical and Electronics Engineering Respectively Karamanoglu Mehmetbey University Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Discrete chaotic systems based on memristors exhibit excellent dynamical properties and are more straightforward to implement in hardware, making them highly suitable for generating cryptographic keystreams. However, ... 详细信息
来源: 评论
Secure mediated certificateless signature scheme
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2007年 第2期14卷 75-78页
作者: YANG Chen MA Wen-ping WANG Xin-mei Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China
Ju et al. proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in... 详细信息
来源: 评论
Related-key Rectangle Attack on 7-Round AES-128
收藏 引用
电子学报(英文版) 2008年 第4期17卷 710-714页
作者: CHEN Jie ZHANG Yueyu HU Yupu Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China
This paper presents a method for related-key rectangle attack on 7-round AES-128, Advanced Encryption Standard with a 128-bit secret key, using 256 related keys. This attack on the reduced to 7-round AES-128 requires ... 详细信息
来源: 评论
On the Joint Nonlinear Span of Multiple Binary Sequence
收藏 引用
电子学报(英文版) 2007年 第2期16卷 321-325页
作者: DONG Lihua HU Yupu The Key Laboratory of Computer Networks and Information Security the Ministry of Education Xidian University Xi'an 710071 China
Recent developments in stream ciphers show strong interests in word-based (or vectorized) stream ciphers. The theory of such stream ciphers required the study of the complexity of multisequences. In this paper the pro... 详细信息
来源: 评论
Attribute-based access control mechanism for perceptive layer of the internet of things
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2011年 第10期5卷 396-403页
作者: Fang, Ren Jian-Feng, Ma Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China
The complex architecture of the internet of things has more requirements for security and the access control of it need flexible fine-grained access and support for anonymous access for users. The internet of things c... 详细信息
来源: 评论
Short-ciphertext and BDH-based CCA2 secure certificateless encryption
收藏 引用
Science China(information Sciences) 2010年 第10期53卷 2005-2015页
作者: SUN YinXia & LI Hui 1 key lab.of computer networks and information security, ministry of education, Xidian University, Xi’an 710071, China 1. Key Lab of Computer Networks and Information Security Ministry of Education Xidian University Xi’an 710071 China
Certificateless public key cryptosystem actually belongs to identity based cryptography, with an attractive characteristic that the private key generator does not have access to any user’s full private key. Most of t... 详细信息
来源: 评论
Density-aware and Depth-aware Visual Representation for Zero-Shot Object Counting
Density-aware and Depth-aware Visual Representation for Zero...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Fang Nan Feng Tian Ni Zhang Nian Liu Haonan Miao Guang Dai Mengmeng Wang Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Automation Northwestern Polytechnical University Xi’an China Computer Vision Department Mohamed bin Zayed University of Artificial Intelligence Abu Dhabi UAE SGIT AI Lab State Grid Corporation of China Zhejiang University of Technology Hang Zhou China
Previous methods often utilize CLIP semantic classifiers with class names for zero-shot object counting. However, they ignore crucial density and depth knowledge for counting tasks. Thus, we propose a density-aware an... 详细信息
来源: 评论
Impossible differential cryptanalysis of advanced encryption standard
收藏 引用
Science in China(Series F) 2007年 第3期50卷 342-350页
作者: CHEN Jie HU YuPu ZHANG YueYu Key Laboratory of Computer Networks & Information Security Ministry of Education Xidian UniversityXi'an 710071 China
Impossible differential cryptanalysis is a method recovering secret key, which gets rid of the keys that satisfy impossible differential relations. This paper concentrates on the impossible differential cryptanalysis ... 详细信息
来源: 评论
New related-key rectangle attacks on reduced AES-192 and AES-256
收藏 引用
Science in China(Series F) 2009年 第4期52卷 617-626页
作者: WEI YongZhuang HU YuPu Key Laboratory of Computer Networks & Information Security of Ministry of Education Xidian University Xi'an 710071 China
In this paper, we examine the security of reduced AES-192 and AES-256 against related-key rectangle attacks by exploiting the weakness in the AES key schedule. We find the following two new attacks: 9-round reduced A... 详细信息
来源: 评论