咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3472 条 记 录,以下是3151-3160 订阅
排序:
Abuse-freeness Electronic Payment Protocol
Abuse-freeness Electronic Payment Protocol
收藏 引用
International Conference on Intelligent networking and Collaborative Systems (INCOS)
作者: Kai Fan Yue Wang Hui Li Ministry of Edu. Key Laboratory of Computer Network and Information Security Xidian University Xi'an China Shaanxi Telecom Limited Xi'an China
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in ... 详细信息
来源: 评论
Forward Secure Proxy Blind Signature Scheme
Forward Secure Proxy Blind Signature Scheme
收藏 引用
International Conference on Intelligent networking and Collaborative Systems (INCOS)
作者: Kai Fan Yue Wang Hui Li Ministry of Edu. Key Laboratory of Computer Network and Information Security Xidian University Xi'an China Shaanxi Telecom Limited Xi'an China
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper prop... 详细信息
来源: 评论
Generalized kasami sequences: The small set
收藏 引用
Journal of Computational information Systems 2011年 第11期7卷 4065-4070页
作者: He, Yefeng Ma, Wenping Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China School of TIE Xi'an Institute of Posts and Telecommunications Xi'an 710121 China
New families of binary sequences of period 2n-1 are constructed for even n. These families have optimal correlation properties with respect to the Welch bound. The distributions of their correlation values are complet... 详细信息
来源: 评论
The design and FPGA implementation of FSM-based intellectual property watermark algorithm at behavioral level
收藏 引用
information Technology Journal 2011年 第4期10卷 870-876页
作者: Liang, Wei Sun, Xingming Ruan, Zhiqiang Long, Jing Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan 411201 China
A Finite State Machine (FSM)-based Intellectual Property (IP) watermark algorithm at behavioral level is presented for the protection of IP reuse techniques in Very Large Scale integration (VLSI). The proposed algorit... 详细信息
来源: 评论
EKMP: An enhanced key management protocol for IEEE 802.16m
EKMP: An enhanced key management protocol for IEEE 802.16m
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Anmin Fu Yuqing Zhang Zhenchao Zhu Jingyu Feng Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China National Computer Network Intrusion Protection Center Chinese Academy and Sciences Beijing China
Recently, IEEE 802.16m was submitted to the ITU and acknowledged as the candidate technology of the IMT-advanced standardization. In this paper, we point out several security issues, such as key agreement blocking and... 详细信息
来源: 评论
Three-Mobile-Beacon Assisted Weighted Centroid Localization Method in Wireless Sensor networks
Three-Mobile-Beacon Assisted Weighted Centroid Localization ...
收藏 引用
2011 2nd IEEE International Conference on Software Engineering and Service Science(2011年第二届 IEEE 软件工程与服务科学国际会议 ICSESS 2011)
作者: Huan-qing CUI Ying-long WANG Jia-liang LV Yu-ming MAO College of Information Science and Engineering Shandong University of Science and Technology Qingdao Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center Jinan P.R.C
Localization is one of the key technologies in wireless sensor networks, and the mobile beacon assisted localization method is promising to reduce the *** methods with only one beacon introduce collinearity proble... 详细信息
来源: 评论
A New Digital Video Watermark Algorithm Based on the HVS
A New Digital Video Watermark Algorithm Based on the HVS
收藏 引用
International Conference on Internet Computing and information Services (ICICIS)
作者: Lufang Liao Xiaoshi Zheng Yanling Zhao Guangqi Liu School of Information Science and Technology Shandong Institute of Light Industry SDILI Jinan China Shandong Provincial Key Laboratory of Computer network technology Shandong Computer Science Center Jinan China
The algorithm applied to video watermark based on HVS is rare recently , but adaptively selecting the embedding position and the embedding strength according to the host(such as videos, images etc.) is necessary, whic... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
Concurrent signature protocol on conic curve over ring Zn
Concurrent signature protocol on conic curve over ring Zn
收藏 引用
International Conference on Electronics, Communications and Control (ICECC)
作者: Li Zhanhu College of Mathematics and Information System Xian Yang Normal University Xianyang Shaanxi China Ministry of Edu. Key Laboratory of Computer Network and Information Security Xidian University Xian Shaanxi China
The proposing of concurrent signatures makes it the truly fairness to both participants. Compared with the finite field, conic curves have advantages of embedding plaintext 'conveniently, easy points operating, an... 详细信息
来源: 评论
Citizen-generated spatial data and information: Risks and opportunities
Citizen-generated spatial data and information: Risks and op...
收藏 引用
IEEE International Conference on Intelligence and Security Informatics, ISI
作者: Peter Mooney Huabo Sun Padraig Corcoran Lei Yan Institute of Remote Sensing and GIS Beijing Key Laboratory of Spatial Information Integration and its Applications Peking University Beijing China Department of Computer Science National University of Ireland Maynooth Kildare Ireland
The use of location-enabled mobile technology is ubiquitous. We outline the opportunities and risks involved in using user-generated spatial data and information. User generated spatial data is a very dynamic but has ... 详细信息
来源: 评论