咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 3,329 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,212 篇 工学
    • 3,916 篇 计算机科学与技术...
    • 3,130 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 645 篇 电气工程
    • 541 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 442 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 144 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,279 篇 理学
    • 1,360 篇 数学
    • 498 篇 物理学
    • 475 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,326 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 53 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 237 篇 feature extracti...
  • 227 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 161 篇 computational mo...
  • 157 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 141 篇 privacy
  • 139 篇 deep learning
  • 125 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 202 篇 shandong provinc...
  • 173 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 113 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 64 篇 computer network...
  • 64 篇 university of ch...
  • 60 篇 key laboratory o...
  • 60 篇 peng cheng labor...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 xu li
  • 26 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,157 篇 英文
  • 349 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7769 条 记 录,以下是4981-4990 订阅
排序:
Measuring web page complexity by analyzing TCP flows and HTTP headers
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2017年 第6期24卷 1-13页
作者: Cheng Weiqing Hu Yangyang Yin Qiaofeng Chen Jiajia School of Computer Science Nanjing University of Posts and Telecommunications Key Laboratory of Computer Network and Information Integration Southeast University Jiangsu Education Information Center Jiangsu Provincial Department of Education
To understand website complexity deeply, a web page complexity measurement system is developed. The system measures the complexity of a web page at two levels: transport-level and content-level, using a packet trace-... 详细信息
来源: 评论
Evaluation of Age of information for LDPC Coded Transmission over AWGN Channels
Evaluation of Age of Information for LDPC Coded Transmission...
收藏 引用
IEEE Vehicular Technology Conference
作者: Mangang Xie Qianfan Wang Jie Gong Xiao Ma School of Data and Computer Science Sun Yat-sen University Guangzhou China School of Electronics and Communication Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
Age of information (AoI) is an important metric in real-time status update communication system to assess the freshness of information. Different from previous works, this paper focuses on the average AoI over additiv... 详细信息
来源: 评论
Content Popularity Prediction via Deep Learning in Cache-enabled Fog Radio Access networks
Content Popularity Prediction via Deep Learning in Cache-ena...
收藏 引用
IEEE Global Communications Conference
作者: Haojie Feng Yanxiang Jiang Dusit Niyato Fu-Chun Zheng Xiaohu You National Mobile Communications Research Laboratory Southeast University Nanjing China State Key Laboratory of Integrated Services Networks Xidian University Xi'an China Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai China School of Computer Engineering Nanyang Technological University (NTU) Singapore School of Electronic and Information Engineering Harbin Institute of Technology Shenzhen China
In this paper, the content popularity prediction problem in cache-enabled fog radio access networks (F-RANs) is investigated. In order to make the popularity prediction accurate and adaptive, we propose to learn the c... 详细信息
来源: 评论
security and privacy on blockchain
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Rui Xue, Rui Liu, Ling State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences 89 Minzhuang Rd Haidian Dist Beijing Beijing100093 China School of Cyber Security University of Chinese Academy of Sciences 19 Yuquan Rd Shijingshan Dist Beijing Beijing100049 China School of Computer Science Georgia Institute of Technology USA AtlantaGA30332-0765 United States
Blockchain offers an innovative approach to storing information, executing transactions, performing functions, and establishing trust in an open environment. Many consider blockchain as a technology breakthrough for c... 详细信息
来源: 评论
Andro-MD: Android malware detection based on convolutional neural networks
收藏 引用
International Journal of Performability Engineering 2018年 第3期14卷 547-558页
作者: Xie, Nannan Di, Xiaoqiang Wang, Xing Zhao, Jianping School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China Jilin Provincial Key Laboratory of Network and Information Security Changchun130022 China School of Computer Science and Information Technology Beijing Jiaotong University Beijing100044 China
Android OS maintains its dominance in smart terminal markets, which brings growing threats of malicious applications (apps). The research on Android malware detection has attracted attention from both academia and ind... 详细信息
来源: 评论
Exploiting Gabor Feature Extraction Method for Chinese Character Writing Quality Evaluation
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1575卷
作者: Zhixiao Wang Wenyao Yan Mingtao Guo Jiulong Zhang School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Shaanxi Key Laboratory Xi'an of Network Computing and Security Technology China School of Data Science and Computer Xi'an innovation college of Yan'an University Xi'an 710100 China
The automatic evaluation of Chinese character writing quality has a wide application prospect. Most of the existing evaluation methods of Chinese character writing quality are based on radical segmentation and feature...
来源: 评论
Improved meet-in-the-middle attacks on reduced-round Piccolo
收藏 引用
Science China(information Sciences) 2018年 第3期61卷 95-107页
作者: Ya LIU Liang CHENG Zhiqiang LIU Wei LI Qingju WANG Dawu GU Department of Computer Science and Engineering University of Shanghai for Science and Technology State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University School of Computer Science and Technology Donghua University Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Department of Applied Mathematics and Computer Science Technical University of Denmark
Piccolo is a lightweight block cipher that adopts a generalized Feistel network structure with4 branches, each of which is 16 bit long. The key length is 80 or 128 bit, denoted by Piccolo-80 and Piccolo-128, respectiv... 详细信息
来源: 评论
Research on Electric Micro-Meteorological Monitoring and Early Warning System
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1449卷
作者: Zehao Zhang Zhen Yu Xiyuan Xu Cheng Guan Song Zhang Global Energy Interconnection Research Institute co. Ltd Research Institute of Information Technology & Communication Beijing 102206 China. State Grid Key Laboratory of Information & Network Security State Grid FuJian Electric Power co. LTD
This paper studies and analyzes the influence of micro-meteorological disasters on power system, points out the main problems in the establishment of power micro-meteorological monitoring and early warning system, put...
来源: 评论
Bug or not bug? Labeling issue reports via user reviews for mobile apps  30
Bug or not bug? Labeling issue reports via user reviews for ...
收藏 引用
30th International Conference on Software Engineering and Knowledge Engineering, SEKE 2018
作者: Li, Haoming Zhang, Tao Wang, Ziyuan College of Computer Science and Technology Harbin Engineering University Harbin150001 China Key Laboratory of Network Assessment Technology Institute of Information Engineering CAS Bejing100093 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China
A great number of mobile applications (apps) have been released to the market. Therefore, software maintenance for these apps become an important and challenging task. For each app, developers usually submit issue rep... 详细信息
来源: 评论
A note on two constructions of zero-difference balanced functions
arXiv
收藏 引用
arXiv 2018年
作者: Yi, Zongxiang Yu, Yuyin Tang, Chunming Zheng, Yanbin School of Mathematics and Information Science Guangzhou University Guangzhou510006 China Key Laboratory of Information Security School of Mathematics and Information Science Guangzhou University Guangzhou510006 China School of Computer Science and Network Security Dongguan University of Technology Dongguan523808 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China
Notes on two constructions of zero-difference balanced (ZDB) functions are made in this letter. Then ZDB functions over Ze × Îik=0 Fqi are obtained. And it shows that all the known ZDB functions using cyclot... 详细信息
来源: 评论