咨询与建议

限定检索结果

文献类型

  • 557 篇 会议
  • 410 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 969 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 588 篇 工学
    • 423 篇 计算机科学与技术...
    • 352 篇 软件工程
    • 164 篇 信息与通信工程
    • 74 篇 控制科学与工程
    • 69 篇 电气工程
    • 60 篇 电子科学与技术(可...
    • 50 篇 生物工程
    • 42 篇 机械工程
    • 41 篇 网络空间安全
    • 29 篇 仪器科学与技术
    • 23 篇 光学工程
    • 16 篇 建筑学
    • 16 篇 交通运输工程
    • 16 篇 安全科学与工程
    • 15 篇 土木工程
    • 15 篇 生物医学工程(可授...
    • 11 篇 材料科学与工程(可...
  • 234 篇 理学
    • 150 篇 数学
    • 51 篇 生物学
    • 42 篇 统计学(可授理学、...
    • 37 篇 物理学
    • 30 篇 系统科学
    • 10 篇 化学
  • 140 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 20 篇 法学
    • 11 篇 社会学
    • 10 篇 法学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 军事学
    • 11 篇 军队指挥学
  • 11 篇 医学
  • 4 篇 教育学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 60 篇 feature extracti...
  • 52 篇 accuracy
  • 48 篇 semantics
  • 38 篇 computational mo...
  • 35 篇 cryptography
  • 32 篇 training
  • 29 篇 federated learni...
  • 26 篇 data models
  • 25 篇 deep learning
  • 22 篇 transformers
  • 22 篇 neural networks
  • 21 篇 authentication
  • 21 篇 security
  • 20 篇 object detection
  • 20 篇 wireless sensor ...
  • 19 篇 information secu...
  • 19 篇 protocols
  • 18 篇 visualization
  • 17 篇 privacy
  • 16 篇 noise

机构

  • 200 篇 shandong provinc...
  • 158 篇 key laboratory o...
  • 43 篇 shandong fundame...
  • 41 篇 shandong enginee...
  • 41 篇 key laboratory o...
  • 28 篇 key lab of educa...
  • 28 篇 pca lab key lab ...
  • 25 篇 school of comput...
  • 24 篇 key laboratory o...
  • 20 篇 ministry of educ...
  • 18 篇 college of compu...
  • 18 篇 guangxi key lab ...
  • 16 篇 ministry of educ...
  • 16 篇 pca lab key lab ...
  • 15 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 key laboratory o...
  • 13 篇 guangxi key lab ...
  • 13 篇 jiangsu high tec...

作者

  • 71 篇 yang jian
  • 33 篇 jianfeng ma
  • 31 篇 jian yang
  • 31 篇 meng deyu
  • 27 篇 hu yupu
  • 24 篇 ma jianfeng
  • 23 篇 xie jin
  • 22 篇 wang hui-ming
  • 17 篇 ma jian-feng
  • 16 篇 cao xiangyong
  • 15 篇 pei qingqi
  • 15 篇 jiang haobo
  • 13 篇 yang yang
  • 13 篇 qian jianjun
  • 13 篇 qingqi pei
  • 12 篇 xiaoming wu
  • 12 篇 li xiang
  • 12 篇 pang liaojun
  • 12 篇 wang ruchuan
  • 12 篇 gong chen

语言

  • 910 篇 英文
  • 30 篇 中文
  • 29 篇 其他
检索条件"机构=Key Lab. of Computer Networks and Information Security Ministry of Education"
969 条 记 录,以下是81-90 订阅
排序:
Phase detection based range estimation with a dual-band robust Chinese remainder theorem
收藏 引用
Science China(information Sciences) 2014年 第2期57卷 18-26页
作者: YANG Bin WANG WenJie XIA XiangGen YIN QinYe Ministry of Education (MOE) Key Laboratory for Intelligent Networks and Network Security School of Electronics and Information EngineeringXi’an Jiaotong University Department of Electrical and Computer Engineering University of Delaware
Range estimation with multifrequency phases is a common practice in localization *** challenge of this method is the phase *** Chinese remainder theorem(CRT)based phase unwrapping algorithms have been proposed to solv... 详细信息
来源: 评论
Robust sparse principal component analysis
收藏 引用
Science China(information Sciences) 2014年 第9期57卷 175-188页
作者: ZHAO Qian MENG DeYu XU ZongBen Institute for Information and System Sciences School of Mathematics and StatisticsXi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University
The model for improving the robustness of sparse principal component analysis(PCA)is proposed in this *** of the l2-norm variance utilized in the conventional sparse PCA model,the proposed model maximizes the l1-norm ... 详细信息
来源: 评论
A new evaluation model for security protocols
收藏 引用
Journal of Communications 2011年 第6期6卷 485-494页
作者: Yang, Chao Ma, Jianfeng Dong, Xuewen Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Computer Science and Technology Xidian University Xi'an 710071 China
Till today, the study of performance of security protocols of WLAN has been one of research focuses. Whereas, owing to enormous complexity and low efficiency of modeling security protocols, there has been by now no un... 详细信息
来源: 评论
Publicly verifiable secret sharing schemes using bilinear pairings
收藏 引用
International Journal of Network security 2012年 第3期14卷 142-148页
作者: Tian, Youliang Peng, Changgen Ma, Jianfeng Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China College of Science Guizhou University Guiyang 550025 China
A non-interactive, simple and efficient publicly verifiable secret sharing (PVSS) is constructed based on the bi-linear pairing on elliptic curves, which has all advan-tages of Schoenmakers' PVSS in [15]. Moreover... 详细信息
来源: 评论
Distributed event-triggered trust management for wireless sensor networks
Distributed event-triggered trust management for wireless se...
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Liu, Sibo Pang, Liaojun Pei, Qingqi Ma, Hua Peng, Qingquan Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China
Trust management is an important issue in wireless sensor networks (WSNs). In this paper, we introduce the concept of trust and design a distributed eventtriggered trust management model for WSNs. It combines cryptogr... 详细信息
来源: 评论
The number of spanning trees in a new lexicographic product of graphs
收藏 引用
Science China(information Sciences) 2014年 第11期57卷 57-65页
作者: LIANG Dong LI Feng XU ZongBen Institute of Information and System Sciences School of Mathematics and Statistics Xi'an Jiaotong University Ministry of Education key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University College of Computer Science Qinghai Normal University
The problem of counting the number of spanning trees is an old topic in graph theory with important applications to reliable network design. Usually, it is desirable to put forward a formula of the number of spanning ... 详细信息
来源: 评论
A digital rights management scheme based on rational share content
A digital rights management scheme based on rational share c...
收藏 引用
2010 International Conference on High Performance Computing and Simulation, HPCS 2010
作者: Ma, Guojun Jian, Li Pei, Qingqi Ma, Jianfeng Key Lab of Computer Networks and Information Security Ministry of Education Xidian University Xi'an China ZTE Corporation China
In the traditional DRM(Digital Rights Management) scheme, each user must buy a license for a digital content ,and can not share this content with his friends. But,with the development of digital content industry ,this... 详细信息
来源: 评论
An Improved Biohashing Algorithm Based on key Generation Principle
收藏 引用
Journal of Computational information Systems 2011年 第14期7卷 5068-5075页
作者: Li, Huixian Wang, Xuan Pang, Liaojun Wang, Yumin School of Computer Science and Engineering Northwestern Polytechnical University Xi'an 710072 China The Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China
In this paper, an improved Biohashing algorithm is proposed, mainly related to the security issue of the base Biohashing algorithm when an "impostor" steals the Token. At first, based on the principle of the... 详细信息
来源: 评论
An Aggregate Signature Scheme with Specified Verifier
收藏 引用
电子学报(英文版) 2011年 第2期20卷 333-336页
作者: WEN Yiling MA Jianfeng HUANG Huawei Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China College of Mathematical Sciences Guangxi Normal University Guilin 541004 China
High Technology Research and Development Program of the China(No.2007AA01Z429,No.20O7AA01z405),the key Program of National Natural Science Foundation of China(No.60633020).334 Chinese Journal of Electronics 2011 (3)Co... 详细信息
来源: 评论
Remote biometric authentication scheme with privacy protection
收藏 引用
Journal of Computational information Systems 2013年 第2期9卷 455-462页
作者: Li, Huixian Ju, Longfei Pang, Liaojun Wang, Xuan School of Computer Science and Engineering Northwestern Polytechnical University Xi'an 710072 China The Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China
This paper introduces a new security property, the transaction anonymity, to extend the existing security properties of privacy protection for biometrics, i.e., biometric irreversibility and indistinguishability. Base... 详细信息
来源: 评论