咨询与建议

限定检索结果

文献类型

  • 1,837 篇 会议
  • 1,571 篇 期刊文献

馆藏范围

  • 3,408 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,283 篇 工学
    • 1,671 篇 计算机科学与技术...
    • 1,305 篇 软件工程
    • 612 篇 信息与通信工程
    • 297 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 222 篇 生物工程
    • 154 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 54 篇 建筑学
  • 1,073 篇 理学
    • 634 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 196 篇 统计学(可授理学、...
    • 91 篇 化学
    • 91 篇 系统科学
  • 672 篇 管理学
    • 389 篇 管理科学与工程(可...
    • 310 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 42 篇 adaptation model...
  • 41 篇 optimization
  • 41 篇 predictive model...

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 64 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 liu ximeng
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,089 篇 英文
  • 187 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3408 条 记 录,以下是3311-3320 订阅
排序:
keying material based key pre-distribution scheme
Keying material based key pre-distribution scheme
收藏 引用
IEEE International Conference on Intelligence and Security Informatics, ISI
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China School of Communication Engineering Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University South Korea
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key fo... 详细信息
来源: 评论
Action-Based Access Control Modelt
收藏 引用
电子学报(英文版) 2008年 第3期17卷 396-401页
作者: LI Fenghua WANG Wei MA Jianfeng Sang JaeMoon Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an 710071 China) Graduate School Beijing Electronic Science and Technology Institute Beijing 100070 China) Mobile Network Security Technology Research Center Kyungpook National UniversitySankyuk-dong~ Buk-ku~ Daeyu 702-701~ KoreaI
来源: 评论
MPMAC and its security analysis
收藏 引用
Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology 2008年 第SUPPL. 2期34卷 62-66页
作者: Zhang, Shao-Lan Yang, Yi-Xian Xing, Guo-Bo Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science and Technology Shandong Jianzhu University Jinan 250101 China
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with ran... 详细信息
来源: 评论
Hybrid heuristic for total flowtime minimization in no-wait flow shops
Hybrid heuristic for total flowtime minimization in no-wait ...
收藏 引用
11th International Conference on computer Supported Cooperative Work in Design, CSCWD 2007
作者: Zhu, Xia Li, Xiaoping Wang, Qian School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
In this paper, no-wait flow shop scheduling problem with total flowtime minimization is considered. A hybrid heuristic is proposed, which is based on PH1 (p) (presented by Aldowaisan and Allahverdi, OMEGA, 2004). A co... 详细信息
来源: 评论
Secure AODV Routing Protocol Using SL Multi-Signcryption
收藏 引用
电子学报(英文版) 2007年 第2期16卷 311-314页
作者: ZHANG Chuanrong YIN Zhonghai ZHANG Yuqing XIAO Guozhen Telecommunication Engineering Institute A irforce Engineering University Xi ' an 710077 China National Computer Network Intrusion Protection Center GUCAS Beijing 100049 China State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China The Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Routing security is an important issue in secure ad hoc networks, and it appears to be a problem that is not trivial to solve. In this paper, we consider secure routing protocol and applied new cryptographic mechanism... 详细信息
来源: 评论
Hybrid Heuristic for Total Flowtime Minimization in No-wait Flow Shops
Hybrid Heuristic for Total Flowtime Minimization in No-wait ...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xia Zhu Xiaoping Li Qian Wang School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China
In this paper, no-wait flow shop scheduling problem with total flowtime minimization is considered. A hybrid heuristic is proposed, which is based on PHI (p) (presented by Aldowaisan and Allahverdi, OMEGA, 2004). A co... 详细信息
来源: 评论
Universally composable anonymous Hash certification model
收藏 引用
Science in China(Series F) 2007年 第3期50卷 440-455页
作者: ZHANG Fan MA JianFeng SangJae MOON Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian UniversityXi'an 710071 China Mobile Network Security Technology Research Center Kyungpook National University Sankyuk-dongBuk-ku Daeyu 702-701 Korea
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentica... 详细信息
来源: 评论
Web Service Based Method for Large Scale Flow Shops with Flowtime Minimization
Web Service Based Method for Large Scale Flow Shops with Flo...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yi Zhang Xiaoping Li Qian Wang Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China Southeast University Nanjing Jiangsu CN
In this paper, a Web Service based method is presented to conduct parallelized operations in an algorithm on multiple computers. Parallelizable operations in a constructive heuristic for flow shop scheduling problem w... 详细信息
来源: 评论
Study of side-channel attacks for elliptic curve cryptosystem algorithm
Wuhan Ligong Daxue Xuebao (Jiaotong Kexue Yu Gongcheng Ban)/...
收藏 引用
Wuhan Ligong Daxue Xuebao (Jiaotong Kexue Yu Gongcheng Ban)/Journal of Wuhan University of Technology (Transportation Science and Engineering) 2007年 第3期31卷 491-493+505页
作者: Liu, Shuanggen Hu, Yupu Xu, Wensheng Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China College of Computer Information Engineering Jiangxi Normal University Nanchang 330022 China
Side-channel attacks are serious practical threat against implementation of cryptographic algorithms. Regarding implementation of elliptic curve cryptosystems, simple side-channel attacks (SSCA) can be used to determi... 详细信息
来源: 评论
An improved algorithm for Eleman Neural network by adding a modified error function
An improved algorithm for Eleman Neural Network by adding a ...
收藏 引用
4th International Symposium on Neural networks, ISNN 2007
作者: Zhang, Zhiqiang Tang, Zheng Tang, GuoFeng Vairappan, Catherine Wang, XuGang Xiong, RunQun Faculty of Engineering Toyama University Gofuku 3190 Toyama shi 930-8555 Japan Institute of Software Chinese Academy of Sciences Beijing 100080 China Key Lab. of Computer Network and Information Integration Southeast University Nanjing 210096 China
The Eleman Neural network has been widely used in various fields ranging from temporal version of the Exclusive-OR function to the discovery of syntactic categories in natural language date. However, one of the proble... 详细信息
来源: 评论