咨询与建议

限定检索结果

文献类型

  • 1,852 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,318 篇 工学
    • 1,697 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 617 篇 信息与通信工程
    • 302 篇 电气工程
    • 248 篇 电子科学与技术(可...
    • 236 篇 控制科学与工程
    • 221 篇 生物工程
    • 153 篇 机械工程
    • 131 篇 网络空间安全
    • 111 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 61 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,084 篇 理学
    • 638 篇 数学
    • 246 篇 生物学
    • 231 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 化学
    • 91 篇 系统科学
  • 677 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 107 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 63 篇 deep learning
  • 61 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 security
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 172 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 38 篇 university of ch...
  • 36 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 liu ximeng
  • 16 篇 zhenrong zhang

语言

  • 3,073 篇 英文
  • 253 篇 其他
  • 146 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3455 条 记 录,以下是2861-2870 订阅
排序:
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of computer Science & Technology 2013年 第4期28卷 743-748页
作者: 葛爱军 黄欣沂 陈成 马传贵 张锐 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University Institute of Software Chinese Academy of Sciences
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... 详细信息
来源: 评论
A Time Synchronization Method of Wireless Sensor networks Based on the Simulated Annealing Algorithm
A Time Synchronization Method of Wireless Sensor Networks Ba...
收藏 引用
第26届中国控制与决策会议
作者: Fuqiang Wang Xiaoming Wu Yong Pang Changbin Yu Yifan Hu Xiangzhi Liu Shandong Computer Science Center Shandong Academy of Sciences Shandong Provincial Key Laboratory Of Computer Network College of Information Science and Engineering Shandong University of Science and Technology Shandong University The Australian National University and NICTA Ltd
Time synchronization is very important for a Time Division Multiple Access(TDMA) Wireless Sensor networks(WSNs). In this paper, we introduce a new method of time synchronization for WSNs based on the simulated anneali... 详细信息
来源: 评论
Robust Watermarking Algorithm for Digital Image Based on SIFT Feature Points
Robust Watermarking Algorithm for Digital Image Based on SIF...
收藏 引用
2014 IEEE 5th International Conference on Software Engineering and Service Science
作者: Xinguo Zou Na Li Nawei Ji Key Laboratory of forensic evidence in Shandong Province University (Shandong University of Political Science and Law) Department of Information Science and Technology Shandong University of Political Science and Law Shandong Provincial Key Laboratory of computer Network Shandong Computer Science Center China United Network Communications Group Co. Ltd.(Briefly named "China Unicom")JiN an Branch
In this paper,we present a robust watermarking algorithm for digital image using SIFT(Scale-invariant feature transform) feature points and realizes the blind *** algorithm uses SIFT feature points on the host image t... 详细信息
来源: 评论
CREST: Cluster-based representation enrichment for short text classification
收藏 引用
17th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2013
作者: Dai, Zichao Sun, Aixin Liu, Xu-Ying MOE Key Laboratory of Computer Network and Information Integration School of Computer Science and Engineering Southeast University Nanjing China School of Computer Engineering Nanyang Technological University Singapore Singapore
Text classification has gained research interests for decades. Many techniques have been developed and have demonstrated very good classification accuracies in various applications. Recently, the popularity of social ... 详细信息
来源: 评论
Research on the Extraction Technology of the Mass Data in Citizens' information Infringement Cases
Research on the Extraction Technology of the Mass Data in Ci...
收藏 引用
2014 International Conference on Modern Economic Technology and Management(ICMETM 2014)
作者: Wu Chunsheng Zhu Xiuyun Key Laboratory of Evidence Science(China University of Political Science and Law) Ministry of Education Computer Network Information Center Chinese Academy of Sciences The Criminal Investigation Department of Beijing Public Security Bureau
Objective The aim of this study is to explore the analysis methods of data from citizens' personal information infringement casesMethods We distinguish various types of case data according to inspection methods,an... 详细信息
来源: 评论
FPGA based unified architecture for public key and private key cryptosystems
收藏 引用
Frontiers of computer Science 2013年 第3期7卷 307-316页
作者: Yi WANG Renfa LI Embedded Systems and Networking Laboratory Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Recently, security in embedded system arises attentions because of modern electronic devices need cau- tiously either exchange or communicate with the sensitive data. Although security is classical research topic in... 详细信息
来源: 评论
PUF-Based RFID Ownership Transfer Protocol in an Open Environment
PUF-Based RFID Ownership Transfer Protocol in an Open Enviro...
收藏 引用
IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
作者: Qing-Shan Li Xiao-Lin Xu Zhong Chen Ministry of Education Key Laboratory of Network and Software Security Assurance of Peking University Beijing China Computer Emergency Response Team Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
In the supply chain, RFID tags are deployed more widely. In the life of the supply chain, the owner of the tag will change frequently. Ownership transfer protocol can achieve the purpose that the access rights of the ... 详细信息
来源: 评论
Robust watermarking algorithm for digital image based on SIFT feature points
Robust watermarking algorithm for digital image based on SIF...
收藏 引用
IEEE International Conference on Software Engineering and Service Sciences (ICSESS)
作者: Xinguo Zou Na Li Nawei Ji Department of Information Science and Technology Shandong University of Political Science and Law Jinan PR China Shandong Provincial Key Laboratory of computer Network Shandong Computer Science Center Jinan PR China China United Network Communications Group Co. Ltd (Briefly named “China Unicom”)JiNan Branch
In this paper, we present a robust watermarking algorithm for digital image using SIFT (Scale-invariant feature transform) feature points and realizes the blind detection. The algorithm uses SIFT feature points on the... 详细信息
来源: 评论
Corrections to “OFDM-Modulated Dynamic Coded Cooperation in Underwater Acoustic Channels” [Y. Chen, Z.-H. Wang, L. Wan, H. Zhou, S. Zhou, and X. Xu, IEEE J. Ocean. Eng., vol. 40, no. 1, pp. 159–168, Jan. 2015. DOI: 10.1109/JOE.2014.2304254
收藏 引用
IEEE Journal of Oceanic Engineering 2015年 第3期40卷 752-752页
作者: Yougan Chen Zhaohui Wang Lei Wan Hao Zhou Shengli Zhou Xiaomei Xu Department of Applied Ocean Physics and Engineering Key Laboratory of Underwater Acoustic Communication and Marine Information Technology Xiamen University Ministry of Education Xiamen China Department of Electrical and Computer Engineering Michigan Technological University Houghton MI USA Department of Electrical and Computer Engineering University of Connecticut Storrs CT USA Aquatic Sensor Network Technology Storrs CT USA
Presents corrections to acknowledgements from the paper, “OFDM-Modulated Dynamic Coded Cooperation in Underwater Acoustic Channels” [Y. Chen, et al, IEEE J. Ocean. Eng., vol. 40, no. 1, pp. 159–168, Jan. 2015).
来源: 评论
Adaptively secure key-policy ABE scheme with fast decryption
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 26-32页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng School of Computer Science and Technology Xidian University Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China Faculty of Software Fujian Normal University Fuzhou350108 China School of Telecommunication Engineering Xidian University Xi'an710071 China
In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc... 详细信息
来源: 评论