咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3472 条 记 录,以下是3291-3300 订阅
排序:
A real-time scheduling algorithm for industrial communication
A real-time scheduling algorithm for industrial communicatio...
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Ming Tan Zhen Wei School of Computer and Information Key Laboratory of Network and Intelligent Information Processing Hefei University of Technology Hefei China
To overcome the drawback that switched Ethernet does not guarantee the timely delivery of real-time messages in industrial communication, an improved FTT (flexible time-triggered communication) paradigm was proposed f... 详细信息
来源: 评论
Improved differential fault attack on the AES-128
收藏 引用
Journal of Computational information Systems 2009年 第1期5卷 223-228页
作者: Liu, Shuanggen Ni, Haiying Hu, Yupu Zhu, Hui College of Computer Information Engineering Jiangxi Normal University Nanchang 330022 China Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
The differential fault attack is a kind of side channel attacks. This paper proposes a differential fault analysis on the AES key schedule and shows how an entire 128-bit AES key can be retrieved. In the workshop at F... 详细信息
来源: 评论
Boundary recognition in sensor networks by building relative contours
Boundary recognition in sensor networks by building relative...
收藏 引用
Conference on Local computer networks (LCN)
作者: Kai Li Yun Wang School of Computer Science & Engineering Key Laboratory of Computer Network and Information MOE South-East University Nanjing China
Wireless sensor networks (WSN) are affected by underlying environments in which sensors are deployed randomly. Inevitably, there are many irregular holes in a WSN because of the existence of obstacles or the death of ... 详细信息
来源: 评论
A method for constructing simplified kernel model based on Kernel-MSE
A method for constructing simplified kernel model based on K...
收藏 引用
2009 2nd Asia-Pacific Conference on Computational Intelligence and Industrial Applications, PACIIA 2009
作者: Zhu, Qi Xu, Yong Cui, JinRong Chen, ChangFeng Wang, JingHua Wu, XiangQian Zhao, YingNan Key Laboratory of network Oriented Intelligent Computation Harbin Institute of Technology Shenzhen Graduate School ShenZhen China Department of Computer Science and Technology Harbin Institute of Technology Harbin China Department of Computer Science and Technology Nanjing University of Information Science and Technology NanJing China
In this paper, we derive an efficient nonlinear feature extraction method from naive Kernel Minimum Squared Error (KMSE) method. The most contribution of the derived method is its feature extraction procedure that is ... 详细信息
来源: 评论
The Short Share Secret Sharing Agreement with Matrix Factorization
The Short Share Secret Sharing Agreement with Matrix Factori...
收藏 引用
International Conference on information Engineering and computer Science (ICIECS)
作者: XiaoYuan Yang Zhen Liu Key Laboratory of computer Network & Information Security of Engineering Institute of the Armed Police Xi'an Shanxi China
To make up the limitation of traditional secret sharing schemes that the length of secret can not be extremely great, we use the theory of Jordan matrix factorization and combine with the formulary of Lagrange putting... 详细信息
来源: 评论
The Security Matrix Factorization Agreement with Two Parties
The Security Matrix Factorization Agreement with Two Parties
收藏 引用
International Conference on Computational Intelligence and Security
作者: XiaoYan Yang Zhen Liu Key Laboratory of computer Network & Information Security of Engineering Institute of the Armed Police Xi'an Shanxi China
In the confidential computing issues of scientific computing, the confidential computing of matrix factorization is still no fruit home and abroad. This paper using Data perturbation assumption and Oblivious Transfer ... 详细信息
来源: 评论
Access model of web users based on multi-chains hidden Markov models
Access model of web users based on multi-chains hidden Marko...
收藏 引用
作者: Zheng, Kangfeng Yang, Yixian Wang, Xiujuan Guo, Shize Key Laboratory of Network and Information Attack and Defence Technology MOE Beijing University of Posts and Telecommunications Beijing China College of Computer Sciences Beijing University of Technology Beijing China No. 54 Research Institute of the General Staff PLA Beijing China
How to distinguish abnormal access from normal ones is the key problem in Distribution Denial of service(DDoS) attack detection. This research aims at finding out the major difference between the abnormal access and t... 详细信息
来源: 评论
A static method for detection of information theft malware
A static method for detection of information theft malware
收藏 引用
2nd International Symposium on Electronic Commerce and Security, ISECS 2009
作者: Li, JiaJing Wei, Tao Zou, Wei Mao, Jian Key Laboratory of Network and Software Security Assurance Ministry of Education Peking University Beijing 100871 China Institute of Computer Science and Technology Peking University Beijing 100871 China Department of Electronic and Information Engineering BeiHang University Beijing 10083 China
Existing techniques based on behavior semantics for information theft malware detection have the main shortcomings of low path coverage and disability of finding hidden malicious behaviors. In this paper we propose a ... 详细信息
来源: 评论
Efficient Mining of Strong Negative Association Rules in Multi-Database
Efficient Mining of Strong Negative Association Rules in Mul...
收藏 引用
International Conference on Computational Intelligence and Software Engineering (CiSE)
作者: Hong Li Xuegang Hu Key Laboratory of Network and Intelligent Information Processing Department of Computer Science and Tchnology Hefei University Hefei China School of Computer & Information Hefei University of technology Hefei China
Strong negative association rules can reveal irrelevances hidden between frequent itemsets. Existing research has made significant efforts in discovering both positive and negative association rules from single databa... 详细信息
来源: 评论
A novel mining Method of Global Negative Association Rules in Multi-Database
A novel mining Method of Global Negative Association Rules i...
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Hong Li Yijun Shen Xuegang Hu Key Laboratory of Network and Intelligent Information Processing Department of Computer Science and Technology Hefei University of Technology Hefei  China School of Computer & Information Hefei University of technology Hefei  China
Mining negative association rules in multi-database has attracted more and more attention. Most existing research focuses on unifying all negative rules discovered from different single databases into a single view. T... 详细信息
来源: 评论