咨询与建议

限定检索结果

文献类型

  • 1,702 篇 会议
  • 1,349 篇 期刊文献

馆藏范围

  • 3,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,017 篇 工学
    • 1,493 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 546 篇 信息与通信工程
    • 275 篇 电气工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 控制科学与工程
    • 199 篇 生物工程
    • 134 篇 机械工程
    • 127 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 97 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 67 篇 交通运输工程
    • 65 篇 化学工程与技术
    • 64 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 920 篇 理学
    • 532 篇 数学
    • 219 篇 生物学
    • 199 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 75 篇 化学
  • 565 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 244 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 94 篇 法学
    • 60 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 59 篇 deep learning
  • 59 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 42 篇 robustness
  • 41 篇 security
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 162 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 37 篇 school of cyber ...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...
  • 31 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 237 篇 其他
  • 120 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3051 条 记 录,以下是2671-2680 订阅
排序:
An new anonymous authentication scheme for cloud computing
An new anonymous authentication scheme for cloud computing
收藏 引用
2012 7th International Conference on computer Science and Education, ICCSE 2012
作者: Zhang, Zhi-Hua Li, Jian-Jun Jiang, Wei Zhao, Yong Gong, Bei China Tobacco Zhejiang Iidustrial Co. Ltd. Hangzhou 310009 China College of Computer Science Beijing University of Technology Beijing 100124 China Key Laboratory of Information and Network Security 3rd Research Institute Ministry of Public Security Beijing 100124 China Beijing 100124 China
Cloud computing is a hot topic of current research, for anonymous authentication is required in many applications scenarios of e-business based on cloud computing, users do not want to expose their identity, users jus... 详细信息
来源: 评论
Semantic access control for cloud computing based on e-Healthcare
Semantic access control for cloud computing based on e-Healt...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Lili Sun Hua Wang Jianming Yong Guoxin Wu Centre for Systems Biology University of Southern Queensland Toowoomba Australia School of Information Systems University of Southern Queensland Toowoomba Australia School of Computer Science and Engineering & Key Laboratory for Computer Network and Information Integration Southeast Univeristy
With the increased development of cloud computing, access control policies have become an important issue in the security filed of cloud computing. Semantic web is the extension of current Web which aims at automation... 详细信息
来源: 评论
Semantics-Based Compliance An a lys is o f N e two rk S e cu rity Policy Hie ra rch ie s
收藏 引用
China Communications 2012年 第7期9卷 22-35页
作者: Yao Shan Xia Chunhe Hu Junshun Jiao Jian Li Xiaojian Beijing Key Laboratory of Network Technology Beihang University Beijing 100191 P. R. China Beijing Information Technology University Beijing 100192 P. R. China College of Computer Science and Information Technology Guangxi Normal University Guilin 541004 P. R. China
network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflect... 详细信息
来源: 评论
An improved clustering algorithm based on intersecting circle structure
An improved clustering algorithm based on intersecting circl...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Ze-Jun Yang Ying-long Wang Fu-Meng Zhao Tai-Bo Huang Shandong Province Key Network Laboratory Shandong Computer Science Center Jinan China School of Information Science & Engineering Shandong Normal University Jinan China
A good clustering algorithm can provide the basis for forming a good network topology and target location, improve routing efficiency and greatly reduce energy consumption. For the lack of GAF algorithm, an improved a... 详细信息
来源: 评论
Localization in 3D Sensor networks Using Stochastic Particle Swarm Optimization
Localization in 3D Sensor Networks Using Stochastic Particle...
收藏 引用
第六届中国可信计算与信息安全学术会议
作者: ZHANG Zhangxue CUI Huanqing Fujian Institute of Scientific and Technology Information Fuzhou 350003FujianChina Fujian Strait I Shandong Computer Science Center Shandong Provincial Key Laboratory of Computer NetworkJinan 250014
Localization is one of the key technologies in wireless sensor networks,and the existing PSO-based localization methods are based on standard PSO,which cannot guarantee the global *** the sensor network deployed in a ... 详细信息
来源: 评论
The information hiding based on the behavior of "information recording"
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第21期6卷 128-134页
作者: Li, Xin Zhang, Ru Niu, Xinxin National Computer network Emergency Response technical Team/Coordination Center of China Beijing China Information Security Center Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Information Network Security Ministry of Public Security Shanghai China Information Security Center Beijing University of Posts and Telecommunications Beijing China
While thinking of the different participants and their behaviors, the information hiding can be taken all over the whole transmissions. The process of the information was analyzed based on this. The analysis suggests ... 详细信息
来源: 评论
Inside Cover: A Joint Photoelectron Spectroscopy and Theoretical Study on the Electronic Structure of UCl5−and UCl5(Chem. Asian J. 10/2013)
收藏 引用
Chemistry – An Asian Journal 2013年 第10期8卷
作者: Jing Su Phuong Diem Dau Chao‐Fei Xu Dao‐Ling Huang Hong‐Tao Liu Fan Wei Lai‐Sheng Wang Jun Li Department of Chemistry & Key Laboratory of Organic Optoelectronics and Molecular Engineering of Ministry of Education Tsinghua University Beijing 100084 (China) Department of Chemistry Brown University Providence RI 02912 (USA) Supercomputing Center of the Computer Network Information Center Chinese Academy of Sciences Beijing 100190 (China) William R. Wiley Environmental Molecular Sciences Laboratory Pacific Northwest National Laboratory Richland WA 99352 (USA)
来源: 评论
Cryptanalysis of a fuzzy identity based encryption scheme in the standard model
收藏 引用
Informatica (Netherlands) 2012年 第2期23卷 299-314页
作者: Wang, Xu An Yang, Xiaoyuan Zhang, Minqing Yu, Yong Key Laboratory of Information and Network Security Engineering University of Chinese Armed Police Force Xi'an 710086 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China
Fuzzy identity based encryption (FIBE), proposed by Sahai and Waters, is a new kind of identity based encryption. It allows users with identity w can decrypt ciphertext for w' if and only if w is close enough to w... 详细信息
来源: 评论
Threshold Ring Signature Scheme Based on TPM
收藏 引用
China Communications 2012年 第1期9卷 80-85页
作者: Gong Bei Jiang Wei Lin Li Li Yu Zhang Xing College of Computer Science Beijing University of Technology Beijing 100124 P. R. China Institute of Electronic Technology Information Engineering University Zhengzhou 450004 P. R. China State Key Laboratory of Information Security Institute of Sottware Chinese Academy of Sciences Beijing Beijing 100049 P. R. China Key Laboratory of Information and Network Security 3rd Research Institute Ministry of Public Security Shanghai 201204 P. R. China
The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we prese... 详细信息
来源: 评论
Improvement on masked S-box hardware implementation
Improvement on masked S-box hardware implementation
收藏 引用
International Conference on Innovations in information Technology
作者: Juanli Zeng Yi Wang Cheng Xu Renfa Li College of Information Science and Engineering Hunan University Changsha Hunan P. R. China Department of Electrical & Computer Engineering National University of Singapore Singapore Hunan Province Key Laboratory of Network and Information Security
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ... 详细信息
来源: 评论