咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3472 条 记 录,以下是3061-3070 订阅
排序:
Threshold Ring Signature Scheme Based on TPM
收藏 引用
China Communications 2012年 第1期9卷 80-85页
作者: Gong Bei Jiang Wei Lin Li Li Yu Zhang Xing College of Computer Science Beijing University of Technology Beijing 100124 P. R. China Institute of Electronic Technology Information Engineering University Zhengzhou 450004 P. R. China State Key Laboratory of Information Security Institute of Sottware Chinese Academy of Sciences Beijing Beijing 100049 P. R. China Key Laboratory of Information and Network Security 3rd Research Institute Ministry of Public Security Shanghai 201204 P. R. China
The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we prese... 详细信息
来源: 评论
Restrictive mechanism of flow control among non-cooperative Internet users
收藏 引用
Science China(information Sciences) 2011年 第1期54卷 12-22页
作者: TAO Jun1,2,ZHONG Xiao1,2 & LU YiFei1,2 1key laboratory of computer network and information integration,Southeast University, Ministry of Education,Nanjing 210096,China 2School of computer Science and Engineering,Southeast University,Nanjing 210096,China 1. Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing 210096 China2. School of Computer Science and Engineering Southeast University Nanjing 210096 China
The flow and congestion control methods based on one-shot game model with non-cooperative game theory can explain the non-cooperative behavior of Internet ***,the low effciency of equilibrium solutions affects their *... 详细信息
来源: 评论
Anonymous authentication-oriented vehicular privacy protection technology research in VANET
Anonymous authentication-oriented vehicular privacy protecti...
收藏 引用
2nd Annual Conference on Electrical and Control Engineering, ICECE 2011
作者: Zhang, Shuai Tao, Jun Yuan, Yijia Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
Vehicular Ad hoc networks (VANET) consists of several vehicular nodes and uses 802.11p protocol for communication. Because of its unique characteristics, such as fast speed, serious Doppler effect, large node number e... 详细信息
来源: 评论
Frequent closed itemsets mining using ITBitree
收藏 引用
International Journal of Advancements in Computing Technology 2012年 第17期4卷 271-279页
作者: Ren, Jiadong Song, Wei Yu, Shiying College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China Hebei Provincial S and T Management Information Center 159 Dongfeng Road Shijiazhuang Hebei 050021 China
The set of frequent closed itemsets is much smaller than the one of all frequent itemsets. Meanwhile it retains the completeness. In this paper, we propose an ITBitree-based algorithm, called ITBitreeFCIM (ITBitree Fr... 详细信息
来源: 评论
A DAG-based algorithm of mining frequent closed itemsets in high dimensional datasets
收藏 引用
International Journal of Advancements in Computing Technology 2012年 第19期4卷 213-222页
作者: Dong, Jun Chen, Shuai Chen, Jing Huang, Guoyan Ren, Jiadong College of Information Science and Engineering Yanshan University 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China Production Management Department Shanghai Aircraft Manufacturing Co.Ltd 200436 China
Algorithms based on row enumeration always scan and construct conditional transposed tables, which increases the execution time and space cost. To address this problem, we adopt the DAG (Directed Acyclic Graph) to com... 详细信息
来源: 评论
Traffic classification based on port connection pattern
Traffic classification based on port connection pattern
收藏 引用
2011 International Conference on computer Science and Service System, CSSS 2011
作者: Cheng, Guang Wang, Song Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing 210096 China
While the traditional Web, Email and other Internet applications are still used large-scale, Internet applications, such as typical P2P resource sharing, streaming, games, instant messaging and other new applications ... 详细信息
来源: 评论
Improvement on masked S-box hardware implementation
Improvement on masked S-box hardware implementation
收藏 引用
International Conference on Innovations in information Technology
作者: Juanli Zeng Yi Wang Cheng Xu Renfa Li College of Information Science and Engineering Hunan University Changsha Hunan P. R. China Department of Electrical & Computer Engineering National University of Singapore Singapore Hunan Province Key Laboratory of Network and Information Security
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ... 详细信息
来源: 评论
Trust Model Based on Structured Protection for High Level Security System
收藏 引用
China Communications 2012年 第11期9卷 70-77页
作者: Liao Jianhua Zhao Yong Zhan Jing School of Electronics Engineering and Computer Science Peking University Beijing 100871 P. R. China School of Computer Science and Technology Beijing University of Technology Beijing 100124 P. R. China Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 P. R. China State Key Laboratory of Information Security Institute of So ware Chinese Academy of Sciences Beijing 100049 P. R. China
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro... 详细信息
来源: 评论
Currency characteristic extraction and identification research based on PCA and BP neural network
收藏 引用
Journal of Convergence information Technology 2012年 第2期7卷 38-44页
作者: Cao, Bu-Qing Liu, Jian-Xun Wen, Bin School of Computer Science and Engineering Key Laboratory of Knowledge Management and Network-based Manufacture Hunan University of Science and technology Xiangtan 411201 China School of Information Science and Technology Hainan Normal University Haikou 571158 China
In recent years, Principle Component Analysis is an extraction method for statistics characteristic, which has been more researched and widely used in the signal processing, pattern recognition, digital image processi... 详细信息
来源: 评论
A fast broadcast protocol for wireless sensor networks
A fast broadcast protocol for wireless sensor networks
收藏 引用
4th International Conference on Human-Centric Computing, HumanCom'11 and the 6th International Conference on Embedded and Multimedia Computing, EMC'11
作者: Zhang, Yang Wang, Yun School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration MOE Nanjing China
Broadcast is a hot topic in wireless sensor network research. The main challenges are from network instability and complexity of communication collision. Currently, the broadcast protocols for sensor network focus on ... 详细信息
来源: 评论