咨询与建议

限定检索结果

文献类型

  • 1,743 篇 会议
  • 1,341 篇 期刊文献

馆藏范围

  • 3,084 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,003 篇 工学
    • 1,479 篇 计算机科学与技术...
    • 1,156 篇 软件工程
    • 538 篇 信息与通信工程
    • 272 篇 电气工程
    • 213 篇 电子科学与技术(可...
    • 204 篇 控制科学与工程
    • 199 篇 生物工程
    • 135 篇 机械工程
    • 125 篇 网络空间安全
    • 99 篇 仪器科学与技术
    • 92 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 66 篇 化学工程与技术
    • 66 篇 交通运输工程
    • 63 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 912 篇 理学
    • 525 篇 数学
    • 219 篇 生物学
    • 198 篇 物理学
    • 162 篇 统计学(可授理学、...
    • 81 篇 系统科学
    • 76 篇 化学
  • 559 篇 管理学
    • 340 篇 管理科学与工程(可...
    • 241 篇 图书情报与档案管...
    • 123 篇 工商管理
  • 93 篇 法学
    • 60 篇 社会学
  • 70 篇 医学
    • 57 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 150 篇 feature extracti...
  • 123 篇 semantics
  • 119 篇 accuracy
  • 89 篇 computational mo...
  • 85 篇 training
  • 82 篇 federated learni...
  • 70 篇 data models
  • 58 篇 deep learning
  • 53 篇 robustness
  • 49 篇 privacy
  • 48 篇 adaptation model...
  • 47 篇 protocols
  • 47 篇 cryptography
  • 46 篇 transformers
  • 46 篇 neural networks
  • 45 篇 optimization
  • 45 篇 data mining
  • 45 篇 security
  • 43 篇 visualization
  • 41 篇 authentication

机构

  • 262 篇 key laboratory o...
  • 205 篇 shandong provinc...
  • 158 篇 school of comput...
  • 85 篇 key laboratory o...
  • 67 篇 college of compu...
  • 66 篇 computer network...
  • 65 篇 shandong provinc...
  • 59 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 44 篇 institute of inf...
  • 40 篇 school of cyber ...
  • 40 篇 school of comput...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...
  • 36 篇 university of ch...
  • 35 篇 key laboratory o...
  • 32 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 27 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 21 篇 liu ximeng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 xiangzhi liu
  • 19 篇 guang cheng
  • 19 篇 du bo
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 15 篇 jianfeng ma

语言

  • 2,607 篇 英文
  • 381 篇 其他
  • 116 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3084 条 记 录,以下是2541-2550 订阅
排序:
A forensics tool of Foxmail client
A forensics tool of Foxmail client
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Lili Xie Guolong Chen College of Mathematics and Computer Science Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
computer forensics is an important part of the computer crime investigation. So a Forensics system aimed to Foxmail data analysis and investigation is proposed in this paper. The system can index the email data based ... 详细信息
来源: 评论
Arranging the layout of alphanumeric buttons-the role of passwords  21
Arranging the layout of alphanumeric buttons-the role of pas...
收藏 引用
21st ACM Conference on computer and Communications Security, CCS 2014
作者: Li, Xiangxue Yu, Yu Li, Qiang Qian, Haifeng Zhou, Yuan Weng, Jian Department of Computer Science and Technology East China Normal University China State Key Laboratory of Integrated Services Networks Xidian University China School of Electronic Information and Electrical Engineering Shanghai Jiaotong University China Network Emergency Response Technical Team Coordination Center China Computer Science Department Jinan University China
A typical but trivial layout of alphanumeric buttons in the touchscreen setting is to arrange the 10 digits and 26 letters in a natural order. This arrangement does not take into account the frequencies of letters and... 详细信息
来源: 评论
A Provably secure Certificate based ring signature without pairing
收藏 引用
International Journal of network Security 2014年 第4期16卷 278-285页
作者: Qin, Zhiguang Xiong, Hu Li, Fagen School of Computer Science and Engineering University of Electronic Science and Technology of China No. 4 North Jianshe Road Chenghua District chengdu Sichuan 610054 China Key Lab of Network Security and Cryptology Fujian Normal University No. 8 Shangsan Road Cangshan District Fuzhou Fujian 350007 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences No. 19 Yuquan Road Shijingshan District Beijing 100190 China
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certificate-based encryption lies in implicit certificate and no private key escrow. This feature is desirable especially f... 详细信息
来源: 评论
Research on a security method for domain name resolution on the client side
Research on a security method for domain name resolution on ...
收藏 引用
2014 International Conference on computer Science and Systems Engineering(CSSE2014)
作者: W.Zhang W.Wang X.C.Zhang H.L.Shi Shandong Provincial Key Laboratory of Computer Networks Shandong Computer Science Center(National Supercomputer Center in Jinan) DNSLAB China Internet Network Information Center
With the development of information technology, the domain name system(DNS) has become a very popular application. DNS forms the logical backbone of the World Wide Web, and the service which the DNS provides is used o... 详细信息
来源: 评论
Bottleneck Analysis for Data Acquisition in High-Speed network Traffic Monitoring
收藏 引用
China Communications 2014年 第1期11卷 110-118页
作者: JIANG Wei TIAN Zhihong CAI Chao GONG Bei College of Computer Science Beijing University of Technology Beijing 100124 China School of Computer National University of Defense Technology Changsha 410073 China Key Laboratory of Information and Network Security Ministry of Public Security Shanghai 201204 China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China
The increasing network throughput challenges the current network traffic monitor systems to have compatible high-performance data *** design of packet processing systems is guided by the requirements of high packet pr... 详细信息
来源: 评论
Topic trend prediction based on wavelet transformation
Topic trend prediction based on wavelet transformation
收藏 引用
2014 11th Web information System and Application Conference(第十一届全国web信息系统及其应用学术会议)
作者: Mingyue Fang Yuzhong Chen Peng Gao Shuiyuan Zhao Songpan Zheng College of Mathematics and Computer Science Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou Fujian China
The research of topic trend prediction can be a good reference for maximizing the propagation effects of network advertisements as well as guiding and controlling the network *** paper proposes PTEP(the Prediction of ... 详细信息
来源: 评论
A secure self-destruction scheme with IBE for the internet content privacy
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2014年 第1期37卷 139-150页
作者: Xiong, Jin-Bo Yao, Zhi-Qiang Ma, Jian-Feng Li, Feng-Hua Liu, Xi-Meng Faculty of Software Fujian Normal University Fuzhou 350108 China School of Computer Science and Technology Xidian University Xi'an 710071 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the p... 详细信息
来源: 评论
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
收藏 引用
Chinese Physics B 2013年 第6期22卷 199-202页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security (Institute of Information EngineeringChinese Academy of Sciences)
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography... 详细信息
来源: 评论
A forensics method of web browsing behavior based on association rule mining
A forensics method of web browsing behavior based on associa...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Yiyun Zhang Guolong Chen College of Mathematics and Computer Science Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the development of network, web forensics is becoming more and more important due to the rampant cybercrime. In this paper, a forensics method of web browsing behavior based on association rule mining is presente... 详细信息
来源: 评论
Data Replication Placement Strategy Based On Bidding Mode for Cloud Storage Cluster
Data Replication Placement Strategy Based On Bidding Mode fo...
收藏 引用
2014 11th Web information System and Application Conference(第十一届全国web信息系统及其应用学术会议)
作者: Hong Zhang Bing Lin Zhanghui Liu Wenzhong Guo College of Mathematics and Computer Science Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou 350116 China
The data availability in large-scale cloud storage has been increasing by means of data *** provide cost-effective availability, minimize the response time of applications and make load balancing for cloud storage, a ... 详细信息
来源: 评论