咨询与建议

限定检索结果

文献类型

  • 557 篇 会议
  • 409 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 968 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 589 篇 工学
    • 424 篇 计算机科学与技术...
    • 349 篇 软件工程
    • 165 篇 信息与通信工程
    • 75 篇 控制科学与工程
    • 69 篇 电气工程
    • 62 篇 电子科学与技术(可...
    • 49 篇 生物工程
    • 42 篇 网络空间安全
    • 41 篇 机械工程
    • 29 篇 仪器科学与技术
    • 23 篇 光学工程
    • 17 篇 安全科学与工程
    • 16 篇 建筑学
    • 15 篇 交通运输工程
    • 15 篇 生物医学工程(可授...
    • 14 篇 土木工程
    • 11 篇 材料科学与工程(可...
  • 234 篇 理学
    • 151 篇 数学
    • 50 篇 生物学
    • 43 篇 统计学(可授理学、...
    • 37 篇 物理学
    • 30 篇 系统科学
    • 10 篇 化学
  • 138 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 20 篇 法学
    • 11 篇 社会学
    • 10 篇 法学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 军事学
    • 11 篇 军队指挥学
  • 11 篇 医学
  • 4 篇 教育学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 60 篇 feature extracti...
  • 52 篇 accuracy
  • 48 篇 semantics
  • 38 篇 computational mo...
  • 34 篇 cryptography
  • 32 篇 training
  • 30 篇 federated learni...
  • 26 篇 data models
  • 25 篇 deep learning
  • 22 篇 transformers
  • 22 篇 neural networks
  • 21 篇 authentication
  • 21 篇 security
  • 20 篇 object detection
  • 20 篇 wireless sensor ...
  • 19 篇 information secu...
  • 19 篇 protocols
  • 18 篇 visualization
  • 17 篇 privacy
  • 16 篇 noise

机构

  • 199 篇 shandong provinc...
  • 158 篇 key laboratory o...
  • 44 篇 shandong fundame...
  • 41 篇 shandong enginee...
  • 41 篇 key laboratory o...
  • 28 篇 key lab of educa...
  • 28 篇 pca lab key lab ...
  • 25 篇 school of comput...
  • 24 篇 key laboratory o...
  • 20 篇 ministry of educ...
  • 18 篇 college of compu...
  • 18 篇 guangxi key lab ...
  • 17 篇 pca lab key lab ...
  • 16 篇 ministry of educ...
  • 15 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 key laboratory o...
  • 13 篇 guangxi key lab ...
  • 13 篇 jiangsu high tec...

作者

  • 71 篇 yang jian
  • 33 篇 jianfeng ma
  • 32 篇 jian yang
  • 31 篇 meng deyu
  • 27 篇 hu yupu
  • 24 篇 ma jianfeng
  • 23 篇 xie jin
  • 22 篇 wang hui-ming
  • 17 篇 ma jian-feng
  • 16 篇 cao xiangyong
  • 15 篇 jiang haobo
  • 14 篇 pei qingqi
  • 13 篇 yang yang
  • 13 篇 qian jianjun
  • 13 篇 qingqi pei
  • 12 篇 xiaoming wu
  • 12 篇 li xiang
  • 12 篇 pang liaojun
  • 12 篇 wang ruchuan
  • 12 篇 gong chen

语言

  • 909 篇 英文
  • 30 篇 其他
  • 29 篇 中文
检索条件"机构=Key Lab. of Computer Networks and Information Security Ministry of Education"
968 条 记 录,以下是51-60 订阅
排序:
Secure Certificateless Encryption with Short Ciphertext
收藏 引用
电子学报(英文版) 2010年 第2期19卷 313-318页
作者: SUN Yinxia ZHANG Futai School of Mathematics and Computer Science Nanjing Normal University Nanjing China Key Lab of Computer Networks and Information Security Ministry of Education Xidian University Xi'an China
Certificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography while enjoying the most attractive certificateless property. In this paper, we present a secure Cer... 详细信息
来源: 评论
An efficient anonymous routing protocol for mobile ad hoc networks
An efficient anonymous routing protocol for mobile ad hoc ne...
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Li, Xiaoqing Li, Hui Ma, Jianfeng Zhang, Weidong Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malic... 详细信息
来源: 评论
Analysis the properties of TLS based on temporal logic of knowledge
Analysis the properties of TLS based on temporal logic of kn...
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Chao, Lv Hui, Li Jianfeng, Ma Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
Temporal logics of knowledge are useful for reasoning about situations where we require both dynamic aspects and informational aspects relating to knowledge. So, the application of temporal logics of knowledge is inve... 详细信息
来源: 评论
Robust MVDR beamforming based on covariance matrix reconstruction
收藏 引用
Science China(information Sciences) 2013年 第4期56卷 28-39页
作者: MU PengCheng LI Dan YIN QinYe GUO Wei Ministry of Education Key Lab for Intelligent Networks and Network Security School of Electronics and Information EngineeringXi'an Jiaotong University
The minimum variance distortionless response(MVDR) beamformer has better resolution and much better interference rejection capability than the data-independent ***,the former is more sensitive to errors,such as the st... 详细信息
来源: 评论
An effective scheme for defending denial-of-sleep attack in wireless sensor networks
An effective scheme for defending denial-of-sleep attack in ...
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Chen, Chen Hui, Li Pei, Qingqi Ning, Lv Qingquan, Peng Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
Based on the analysis to the phenomenon and methods of denial-of-sleep attacking in wireless sensor network, a scheme is proposed employing fake schedule switch with RSSI measurement aid. The sensor nodes can reduce a... 详细信息
来源: 评论
A Hierarchical Semantic Distillation Framework for Open-Vocabulary Object Detection
arXiv
收藏 引用
arXiv 2025年
作者: Fu, Shenghao Yan, Junkai Yang, Qize Wei, Xihan Xie, Xiaohua Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Peng Cheng Laboratory China Tongyi Lab Alibaba Group China School of Computer Science and Engineering Sun Yat-sen University Guangdong Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangdong Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Ministry of Education Guangdong Guangzhou China
Open-vocabulary object detection (OVD) aims to detect objects beyond the training annotations, where detectors are usually aligned to a pre-trained vision-language model, e.g., CLIP, to inherit its generalizable recog... 详细信息
来源: 评论
A congestion avoidance and performance enhancement scheme for mobile ad hoc networks
A congestion avoidance and performance enhancement scheme fo...
收藏 引用
4th International Conference on Mobile Ad-hoc and Sensor networks, MSN 2008
作者: Chen, Chen Pei, Qingqi Ma, Jianfeng Key Lab. of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China
Based on the analysis of the node selfishness and the drawback of min-hop selection method as the unique routing selection criteria in Ad Hoc networks,a non-intrusive multi-metric Ad Hoc Routing Protocol-NIMR is *** c... 详细信息
来源: 评论
A new ID-based broadcast encryption scheme
A new ID-based broadcast encryption scheme
收藏 引用
Thrid International Conference on Autonomic and Trusted Computing, ATC 2006
作者: Yang, Chen Cheng, Xiangguo Wenping, Ma Wang, Xinmei Ministry of Education Key Lab. of Computer Networks and Information Security Xidian University Xi'an 710071 China
This paper presents a new efficient identity-based broadcast encryption scheme using bilinear mapping. Both private-key storage for one authorized user (only two group elements) and communication transmission bandwidt... 详细信息
来源: 评论
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer networks
收藏 引用
Transactions of Tianjin University 2008年 第1期14卷 66-72页
作者: 王方伟 张运凯 马建峰 Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Network Center Hebei Normal University
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... 详细信息
来源: 评论
Cryptanalysis and Improvement of a Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations
收藏 引用
Chinese Physics Letters 2010年 第6期27卷 13-15页
作者: ZHU Zhen-Chao ZHANG Yu-Qing Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 National Computer Network Intrusion Protection Center Graduate University Chinese Academy of Sciences Beijing 100049
In a recent paper [Chin. Phys. Lett 25(2008)1187], a quantum secret sharing scheme between multiparty and multiparty was presented. We show that the protocol is not secure because the last member in Alice's group c... 详细信息
来源: 评论