咨询与建议

限定检索结果

文献类型

  • 4,446 篇 会议
  • 3,346 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,800 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,222 篇 工学
    • 3,921 篇 计算机科学与技术...
    • 3,127 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 652 篇 电气工程
    • 539 篇 控制科学与工程
    • 522 篇 电子科学与技术(可...
    • 441 篇 网络空间安全
    • 439 篇 生物工程
    • 299 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 149 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,280 篇 理学
    • 1,359 篇 数学
    • 498 篇 物理学
    • 476 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,324 篇 管理学
    • 807 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 228 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 151 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 175 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 111 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 65 篇 university of ch...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 65 篇 guangdong provin...
  • 64 篇 computer network...
  • 61 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 25 篇 xu li
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,190 篇 英文
  • 348 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7800 条 记 录,以下是4911-4920 订阅
排序:
Enhancing wircless channel authentication in industrial control: Attack-resistant CSI-based PUF
收藏 引用
Ad Hoc networks 2025年 178卷
作者: Yubo Song Wenchang Liu Hongyu Zhu Yi Gong Yang Li Jiyuan Huang Yazhi Deng Key Laboratory of Computer Network Technology of Jiangsu Province School of Cyber Science and Engineering Southeast University No. 2 Southeast University Road Jiangning District Nanjing 211151 Jiangsu China Purple Mountain Laboratories No. 9 Mozhou east road Jiangning District Nanjing 211151 Jiangsu China Hunan Key Laboratory for Internet of Things in Electricity No. 398 Xin Shaodong Road Tianxin District Changsha 410002 Hunan China State Grid Hunan Electric Power Company Limited Information and Communication Company No. 398 Xin Shaodong Road Tianxin District Changsha 410002 Hunan China State Grid Hunan Electric Power Co. Ltd. No. 398 Xin Shaodong Road Tianxin District Changsha 410002 Hunan China
The extensive deployment of wireless networks in industrial settings has led to a surge in wireless-connected devices, presenting formidable security challenges. Traditional encryption approaches, relying on cryptogra...
来源: 评论
Whether android applications broadcast your private information: A naive Bayesian-based analysis approach  30
Whether android applications broadcast your private informat...
收藏 引用
30th International Conference on Software Engineering and Knowledge Engineering, SEKE 2018
作者: Lin, Li Ni, Jian Mao, Xinya Zhang, Jianbiao College of Computer Science Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China National Engineering Laboratory for Classified Information Security Protection Beijing100124 China
With the rapid development of android smart terminals, android applications are exhibiting explosive growth. However, there remains a challenging issue facing android system, a malicious application may broadcast user... 详细信息
来源: 评论
Quantum network communication: a discrete-time quantum-walk approach
收藏 引用
Science China(information Sciences) 2018年 第4期61卷 199-208页
作者: Yuguang YANG Jiajie YANG Yihua ZHOU Weimin SHI Xiubo CHEN Jian LI Huijuan ZUO Faculty of Information Technology Beijing University of Technology State Key Laboratory of Information Security (Institute of Information Engineering Chinese Academy of Sciences) Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications School of Computer Beijing University of Posts and Telecommunications College of Mathematics and Information Science Hebei Normal University
We study the problem of quantum multi-unicast communication over the butterfly network in a quantum-walk architecture, where multiple arbitrary single-qubit states are transmitted simultaneously between multiple sourc... 详细信息
来源: 评论
Prediction of σ54 promoters in prokaryotes based on SVM–Adaboost
Prediction of σ54 promoters in prokaryotes based on SVM–Ad...
收藏 引用
Chinese Automation Congress (CAC)
作者: Yongxian Fan Qingqi Zhu Chengwei Lv Xianyong Pan School of Computer and Information Security Guilin University of Electronic Technology Guilin Guangxi Key Laboratory of System Control and Information Processing Ministry of Education of China Institute of Image Processing and Pattern Recognition Shanghai Jiao Tong University Shanghai China
σ 54 promoters are responsible for transcriptional carbon and nitrogen in prokaryotes. However, it is costly and difficult by experimental identification of them, especially in the postgenomic era with avalanche of ... 详细信息
来源: 评论
Research on iOS Application of Internal Privacy Leakage Detection Technology
Research on iOS Application of Internal Privacy Leakage Dete...
收藏 引用
International Conference on Intelligent Computation Technology and Automation, ICICTA
作者: Lu Chen Congcong Shi Yuanyuan Ma Zhipeng Shao State Grid Key Laboratory of Information & Network Security Nanjing Jiangsu China
In order to solve the problem of user privacy leakage in iOS applications, and make up for the limitations that existing techniques can not detect the leakage of internal privacy, this paper proposes a technology of i... 详细信息
来源: 评论
A static technique for detecting input validation vulnerabilities in Android apps
收藏 引用
Science China(information Sciences) 2017年 第5期60卷 210-225页
作者: Zhejun FANG Qixu LIU Yuqing ZHANG Kai WANG Zhiqiang WANG Qianru WU National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences National Computer Network Emergency Response Technical Team/Coordination Center of China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Beijing Electronic Science and Technology Institute
Input validation vulnerabilities are common in Android apps, especially in inter-component communications. Malicious attacks can exploit this kind of vulnerability to bypass Android security mechanism and compromise t... 详细信息
来源: 评论
network Equipment Safety Assessment Based on Alert Data
Network Equipment Safety Assessment Based on Alert Data
收藏 引用
International Conference on Intelligent Computation Technology and Automation, ICICTA
作者: Lu Chen Zesheng Xi Zi’ang Lu Mu Chen State Grid Key Laboratory of Information & Network Security Nanjing Jiangsu China
In order to dynamically evaluate the security of network equipment operation, a security evaluation method of network equipment based on alarm data is proposed. The method makes full use of the alarm log containing ne... 详细信息
来源: 评论
Design and Implementation of a 780MHz Wireless Sensor network for Electric Vehicle Management System
Design and Implementation of a 780MHz Wireless Sensor Networ...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Yan Liang Xiaoming Wu Xiangyan Meng Kun Zhang Acoustic Information Security Team Qilu University of Technology (Shandong Academy of Sciences) Jinan Acoustic Information Security Team Qilu University of Technology (Shandong Academy of Sciences) Shandong Computer Science Center (National Super computer Center in Jinan) and Shandong Provincial Key Laboratory of Computer Networks Jinan China Department of Communications State grid Shandong electric power company Jinan China
A 780MHz wireless sensor network applied for Electric Vehicle Management System is designed and implemented in this paper, which meets the requirements of RFID 800 MHz / 900 MHz band. This project has less interferenc... 详细信息
来源: 评论
Power Mobile Terminal security Assessment Based on Weights Self-Learning
Power Mobile Terminal Security Assessment Based on Weights S...
收藏 引用
International Conference on Communication Software and networks, ICCSN
作者: Zesheng Xi Lu Chen Mu Chen Zaojian Dai Yong Li State Grid Key Laboratory of Information & Network Security Nanjing Jiangsu China
At present, mobile terminals are widely used in power system and easy to be the target or springboard to attack the power system. It is necessary to have security assessment of power mobile terminal system to enable e... 详细信息
来源: 评论
Power Attack and Evaluation on Elliptic Curve Cryptosystem in a Commercial Smart Card
Power Attack and Evaluation on Elliptic Curve Cryptosystem i...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Annv Liu An Wang Yongyin Dong Ying Shi Caisen Chen Guoshuang Zhang School of Computer Science Beijing Institute of Technology Beijing China State Key Laboratory of Information Security Chinese Academy of Sciences Beijing China Military Exercise and Training Center Army Academy of Armored Forces Beijing China Science and Technology on Information Assurance Laboratory Beijing China
Elliptic Curve Cryptography (ECC) is a widely used cryptographic algorithm in our life. Although its theory has become one of the focuses, it is difficult to ensure its security during the process of implementation. O... 详细信息
来源: 评论