咨询与建议

限定检索结果

文献类型

  • 1,914 篇 会议
  • 1,628 篇 期刊文献

馆藏范围

  • 3,542 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,353 篇 工学
    • 1,720 篇 计算机科学与技术...
    • 1,327 篇 软件工程
    • 628 篇 信息与通信工程
    • 336 篇 电气工程
    • 258 篇 电子科学与技术(可...
    • 251 篇 控制科学与工程
    • 223 篇 生物工程
    • 158 篇 机械工程
    • 145 篇 网络空间安全
    • 114 篇 仪器科学与技术
    • 112 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 83 篇 交通运输工程
    • 77 篇 动力工程及工程热...
    • 67 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,088 篇 理学
    • 636 篇 数学
    • 249 篇 生物学
    • 237 篇 物理学
    • 196 篇 统计学(可授理学、...
    • 97 篇 化学
    • 90 篇 系统科学
  • 686 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 154 篇 feature extracti...
  • 128 篇 semantics
  • 124 篇 accuracy
  • 92 篇 computational mo...
  • 88 篇 training
  • 86 篇 federated learni...
  • 73 篇 data models
  • 64 篇 deep learning
  • 56 篇 robustness
  • 53 篇 data mining
  • 52 篇 protocols
  • 51 篇 privacy
  • 50 篇 optimization
  • 50 篇 adaptation model...
  • 49 篇 clustering algor...
  • 48 篇 transformers
  • 47 篇 neural networks
  • 47 篇 visualization
  • 47 篇 cryptography
  • 46 篇 security

机构

  • 272 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 169 篇 school of comput...
  • 85 篇 key laboratory o...
  • 68 篇 computer network...
  • 68 篇 shandong provinc...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 47 篇 school of cyber ...
  • 45 篇 institute of inf...
  • 42 篇 the key laborato...
  • 41 篇 school of comput...
  • 40 篇 shandong provinc...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...

作者

  • 46 篇 zhao yao
  • 40 篇 ren jiadong
  • 37 篇 zhou deyu
  • 31 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 xiaoming wu
  • 25 篇 guo wenzhong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 xiangzhi liu
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xiaoping li
  • 18 篇 wei zhang
  • 18 篇 liu ximeng
  • 17 篇 di xiaoqiang

语言

  • 2,875 篇 英文
  • 548 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3542 条 记 录,以下是3441-3450 订阅
排序:
五谱值函数的构造
五谱值函数的构造
收藏 引用
中国密码学会2009年会
作者: Xie Min 谢敏 Li Juan 李娟 Zhang Feng-rong 张凤荣 Key laboratory of computer network and information security(Xidian University) Xi'an 710071 Guangdo 西安电子科技大学计算机网络与信息安全教育部重点实验室 西安 710071 广东省信息安全技术重点实验室(广州大学)广州 510405 School of Electrical Engineering(Northwest University of Nationalities) Lanzhou 730030 西北民族大学电气工程学院 兰州 730030 Key laboratory of computer network and information security(Xidian University) Xi'an 710071 西安电子科技大学计算机网络与信息安全教育部重点实验室 西安 710071
在密码体制的构造中,布尔函数被广泛地应用,对分组密码中S-盒和流密码中组合生成器等的研究,实质上可归结为对布尔函数的分析.通过分析Bent函数的性质,利用级联的方法,构造了一类五谱值函数.该类函数没有非零线性结构、平衡、代数... 详细信息
来源: 评论
Modeling and Analysis of a Self-Learning Worm Based on Good Point Set Scanning
Modeling and Analysis of a Self-Learning Worm Based on Good ...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Fangwei Wang Yunkai Zhang Jianfeng Ma Network Center Hebei Normal University Shijiazhuang China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
In order to speed up the propagating process, the worms need to scan many IP addresses to target vulnerable hosts. However, the distribution of IP addresses is highly nonuniform, which results in many scans wasted on ... 详细信息
来源: 评论
MPMAC and its security analysis
收藏 引用
Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology 2008年 第SUPPL. 2期34卷 62-66页
作者: Zhang, Shao-Lan Yang, Yi-Xian Xing, Guo-Bo Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science and Technology Shandong Jianzhu University Jinan 250101 China
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with ran... 详细信息
来源: 评论
Fault-tolerant Method for Temporal Error in Data Acquisition of On-Board-computer
Fault-tolerant Method for Temporal Error in Data Acquisition...
收藏 引用
第二届国际测量仪器与测试自动化学术会议
作者: Wang Ping~(1,2) (1.Electric and information College,Xihua University,Chengdu,610039,China) (2.Shandong Province computer network key laboratory,Shandong computer Science Center,Jinan,250014,China) Electric and Information College Xihua UniversityChengdu610039China Shandong Province computer network key laboratory Shandong Computer Science CenterJinan250014China
Sensor data error is one of the important reasons of satellite mission *** eliminate the negative influence of error sensor data,prediction methods are used to tolerate the temporal error of satellite data acquisition... 详细信息
来源: 评论
A Novel Generation key Scheme Based on DNA
A Novel Generation Key Scheme Based on DNA
收藏 引用
International Conference on Computational Intelligence and Security
作者: Xin-she Li Lei Zhang Yu-pu Hu Xi'an Research Inst. of Hi-Tech Xi'an China Ministry of Education Key Laboratory of Computer Network & Information Security XiDian University Xi'an China
A novel generation key scheme based on DNA is proposed. By using a key expansion matrix, the scheme improves the independence and the strict avalanche of the key. Although it increases computation amount because of us... 详细信息
来源: 评论
DECISION SUPPORT SYSTEM OF VARIABLE RATE IRRIGATION BASED ON MATHEMATICAL MODEL AND GIS
DECISION SUPPORT SYSTEM OF VARIABLE RATE IRRIGATION BASED ON...
收藏 引用
第一届国际计算机与计算技术在农业中的应用研讨会
作者: Jianjun Zhou Gang Liu Su Li Xiu Wang Man Zhang Key Laboratory of Modern Precision Agriculture System Integration Research China Agricultural University Computer College Beijing Technology and Business University National Engineering Research Center for Information Technology in Agriculture
Owing to the difference of soil water in the farm,a system of variable rate irrigation was developed with Visual C++ and MapObjects that can save water as well as can improve economy *** water content can be forecaste... 详细信息
来源: 评论
CRMS: A Collusion-Resistant Matrix System for Group key Management in Wireless networks
CRMS: A Collusion-Resistant Matrix System for Group Key Mana...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: W. Wang J. Ma S. Moon Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University Daegu South Korea
In this paper, a collusion-resistant matrix system (CRMS) for group key managements is presented. The CRMS is defined as a collection of subsets of users, and the keys held by users in CRMS are organized in a hierarch... 详细信息
来源: 评论
Storage Requirements for key Distribution in Sensor networks
Storage Requirements for Key Distribution in Sensor Networks
收藏 引用
International Conference on Sensor Technologies and Applications, SensorComm
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University China School of Communication Engineering Xidian University China Mobile Network Security Technology Research Center Kyungpook National University South Korea
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi... 详细信息
来源: 评论
Decision support system of variable rate irrigation based on mathematical model and GIS
收藏 引用
IFIP Advances in information and Communication Technology 2008年 259卷 1011-1019页
作者: Zhou, Jianjun Liu, Gang Li, Su Wang, Xiu Zhang, Man Key Laboratory of Modern Precision Agriculture System Integration Research China Agricultural University Beijing100083 China Computer College Beijing Technology and Business University Beijing100037 China National Engineering Research Center for Information Technology in Agriculture Beijing100089 China
Owing to the difference of soil water in the farm, a system of variable rate irrigation was developed with Visual C++ and MapObjects that can save water as well as can improve economy benefit. Soil water content can b... 详细信息
来源: 评论
keying material based key pre-distribution scheme
Keying material based key pre-distribution scheme
收藏 引用
IEEE International Conference on Intelligence and Security Informatics, ISI
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China School of Communication Engineering Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University South Korea
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key fo... 详细信息
来源: 评论