咨询与建议

限定检索结果

文献类型

  • 1,702 篇 会议
  • 1,349 篇 期刊文献

馆藏范围

  • 3,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,017 篇 工学
    • 1,493 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 546 篇 信息与通信工程
    • 275 篇 电气工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 控制科学与工程
    • 199 篇 生物工程
    • 134 篇 机械工程
    • 127 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 97 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 67 篇 交通运输工程
    • 65 篇 化学工程与技术
    • 64 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 920 篇 理学
    • 532 篇 数学
    • 219 篇 生物学
    • 199 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 75 篇 化学
  • 565 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 244 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 94 篇 法学
    • 60 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 59 篇 deep learning
  • 59 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 42 篇 robustness
  • 41 篇 security
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 162 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 37 篇 school of cyber ...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...
  • 31 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 237 篇 其他
  • 120 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3051 条 记 录,以下是2631-2640 订阅
排序:
Efficient and random oracle-free conditionally anonymous ring signature
Efficient and random oracle-free conditionally anonymous rin...
收藏 引用
6th International Conference on Provable Security, ProvSec 2012
作者: Zeng, Shengke Qin, Zhiguang Lu, Qing Li, Qinyi School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security China
Compared to conventional ring signature schemes, conditionally anonymous ring signatures allow to revoke the anonymity of actual signer without the group manager's help if necessary. When the actual signer intends... 详细信息
来源: 评论
An improved clustering algorithm based on intersecting circle structure
An improved clustering algorithm based on intersecting circl...
收藏 引用
2012 IEEE 16th International Conference on computer Supported Cooperative Work in Design, CSCWD 2012
作者: Yang, Ze-Jun Wang, Ying-Long Zhao, Fu-Meng Huang, Tai-Bo Shandong Province Key Network Laboratory Shandong Computer Science Center Jinan 250014 China School of Information Science and Engineering Shandong Normal University Jinan 250014 China
A good clustering algorithm can provide the basis for forming a good network topology and target location, improve routing efficiency and greatly reduce energy consumption. For the lack of GAF algorithm, an improved a... 详细信息
来源: 评论
Remote gas meter reading system based on zigbee networks
Remote gas meter reading system based on zigbee networks
收藏 引用
2012 Spring World Congress on Engineering and Technology, SCET 2012
作者: Cai, Shun Zhang, Sanfeng Huang, Di Yu, Shaofeng College of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China College of Software Engineering Southeast University Nanjing China
recently, intelligent home instruments developed fast and have been deployed widely while a crucial problem of how dealing the left devices and properties come up to the top of the water. This paper presents a remote ... 详细信息
来源: 评论
A new operator for ABox revision in DL-Lite  26
A new operator for ABox revision in DL-Lite
收藏 引用
26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference, AAAI-12 / IAAI-12
作者: Gao, Sibei Qi, Guilin Wang, Haofen Key Laboratory of Computer Network and Information Integration of State Education Ministry School of Computer Science and Engineering Southeast University China SiPaiLou #2 Nanjing 210096 China Shanghai Jiao Tong University Shanghai China
In this paper, we propose a new operator for revising ABoxes in DL-Lite ontologies. We present a graph-based algorithm for ABox revision in DL-Lite, which implements the revision operator and we show it runs in polyno... 详细信息
来源: 评论
Zigbee enabled remote temperature monitor system for high-voltage substations
Zigbee enabled remote temperature monitor system for high-vo...
收藏 引用
2012 Spring World Congress on Engineering and Technology, SCET 2012
作者: Jun, Zhang Wei, Dai Di, Huang Sanfeng, Zhang Yi, Ji College of Software Engineering Southeast University Nanjing China College of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
in high-voltage substations, poor contacts at the junctions of contacts can generate heat leading to high temperature, arc and fire disaster in serious condition. In this paper, we present a remote temperature monitor... 详细信息
来源: 评论
Intrusion-resilient identity-based signature: Security definition and construction
Intrusion-resilient identity-based signature: Security defin...
收藏 引用
作者: Yu, Jia Kong, Fanyu Cheng, Xiangguo Hao, Rong Fan, Jianxi College of Information Engineering Qingdao University 266071 Qingdao China Shandong Provincial Key Laboratory of Computer Network 250014 Jinan China Institute of Network Security Shandong University 250100 Jinan China School of Computer Science and Technology Soochow University 215006 Suzhou China
Traditional identity-based signatures depend on the assumption that secret keys are absolutely secure. Once a secret key is exposed, all signatures associated with this secret key have to be reissued. Therefore, limit... 详细信息
来源: 评论
MOVE: A mobile personalized virtual computing environment
MOVE: A mobile personalized virtual computing environment
收藏 引用
作者: Bai, Yuebin Ju, Yanwen Beijing Key Laboratory of Network Technology School of Computer Science and Engineering Beihang University Beijing 100191 China Sci. and Technol. on Information Transmission and Dissemination in Communication Networks Laboratory Shijiazhuang 050081 China
In today's business and daily life, computers and networks are playing an increasingly important role both in the office and at home. It is desirable to individuals that any machines outside the workplace provide ... 详细信息
来源: 评论
A simultaneous members enrollment and revocation protocol for secret sharing schemes
A simultaneous members enrollment and revocation protocol fo...
收藏 引用
Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012
作者: Yu, Jia Wang, Shuguang Zhao, Huawei Shu, Minglei Lv, Jialiang Guo, Qiang Shandong Provincial Key Laboratory of Computer Network Jinan 250014 China College of Information Engineering Qingdao University Qingdao 266071 China Shandong Institute of Standardization Jinan 250014 China School of Computer and Information Engineering Shandong University of Finance Jinan 250014 China
Secret sharing schemes have very wide applications in modern electronic society. In a secret sharing scheme, the shared secret is divided into multiple shares and only more than certain number of shares can reconstruc... 详细信息
来源: 评论
A new video watermark algorithm based on the property of the video
收藏 引用
2012 2nd International Conference on Materials Science and information Technology, MSIT 2012
作者: Yang, Chengzhong Liao, Lufang Zheng, Xiaoshi Zhao, Yanling Liu, Guangqi Guizhou University of Nationalities Guiyang China Shandong Computer Science Center Shandong Provincial Key Laboratory of Computer network technology Jinan China School of Information Science and Technology Shandong Institute of Light Industry SDILI Jinan China
The algorithm applied to video watermark based on the property of the video is rare recently. This article brings the video property and HVS into the video watermark,gives an new algorithm, improve the capability of t... 详细信息
来源: 评论
Improvement on masked S-box hardware implementation
Improvement on masked S-box hardware implementation
收藏 引用
2012 International Conference on Innovations in information Technology, IIT 2012
作者: Zeng, Juanli Wang, Yi Xu, Cheng Li, Renfa Embedded System and Network Laboratory Hunan University Changsha Hunan 410082 China Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha Hunan 410082 China College of Information Science and Engineering Hunan University Changsha Hunan 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ... 详细信息
来源: 评论