咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是2751-2760 订阅
排序:
Nonlinearity Profile Test for an S-Box
Nonlinearity Profile Test for an S-Box
收藏 引用
2011 International Conference on Future Wireless networks and information Systems(ICFWI 2011)
作者: Sheng Gao Wenping Ma Jiwei Zhu Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University
A new security test for substitution boxes(S-boxes),the nonlinearity profile test,is presented,together with its results over the S-boxes of DES and *** test can be used to measure the global nonlinearity for an S-box... 详细信息
来源: 评论
Research on fault-electromagnetic attack on block cipher
收藏 引用
Journal of Convergence information Technology 2011年 第11期6卷 409-417页
作者: Sun, Chunhui Li, Hui Yang, Yang Chen, Jie Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China
It is one of the important factors in iterative block ciphers design that proper rounds are used to resist differential analysis, linear analysis and many other kinds of attack. Block ciphers usually adopt loop codes ... 详细信息
来源: 评论
Traffic classification based on port connection pattern
Traffic classification based on port connection pattern
收藏 引用
International Conference on computer Science and Service System (CSSS)
作者: Guang Cheng Song Wang School of Computer Science & Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Key Laboratory of Computer Network Technology of Jiangsu South-East University Nanjing China
While the traditional Web, Email and other Internet applications are still used large-scale, Internet applications, such as typical P2P resource sharing, streaming, games, instant messaging and other new applications ... 详细信息
来源: 评论
The construction of fuzzy concept lattices based on (θ, σ)-fuzzy rough approximation operators
The construction of fuzzy concept lattices based on (θ, σ)...
收藏 引用
作者: Yao, Yanqing Mi, Jusheng Li, Zhoujun Xie, Bin State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing 100191 China College of Mathematics and Information Science Hebei Normal University Shijiazhuang Hebei 050016 China Beijing Key Laboratory of Network Technology Beihang University Beijing China
Formal concept analysis and rough set analysis are two complementary approaches for analyzing data. This paper studies approaches to constructing fuzzy concept lattices based on generalized fuzzy rough approximation o... 详细信息
来源: 评论
A Public Cryptosystem from R-LWE
A Public Cryptosystem from R-LWE
收藏 引用
2011 IEEE 3rd International Conference on Communication Software and networks(2011第三届通信软件与网络国际会议 ICCSN2011)
作者: Ping Wei Liqiang Wu Xiaoyuan Yang Bin Hao Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an 710086 Ch Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an 710086Chi Key Laboratory of Computer Network & Information Security of the Ministry of Education Xidian Unive Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an 710086 C
Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on RLWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer p... 详细信息
来源: 评论
Anonymous authentication-oriented vehicular privacy protection technology research in VANET
Anonymous authentication-oriented vehicular privacy protecti...
收藏 引用
International Conference on Electrical and Control Engineering (ICECE)
作者: Shuai Zhang Jun Tao Yijia Yuan Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing China
Vehicular Ad hoc networks (VANET) consists of several vehicular nodes and uses 802.11p protocol for communication. Because of its unique characteristics, such as fast speed, serious Doppler effect, large node number e... 详细信息
来源: 评论
Comparative genomics revealed a novel DNA-binding regulatory protein involved in homologous recombination in bacteria
Comparative genomics revealed a novel DNA-binding regulatory...
收藏 引用
5th IEEE International Conference on Systems Biology, ISB 2011
作者: Gao, Yang Zhang, Yan Computer Network Information Center Peking Union Medical College Chinese Academy of Medical Sciences Beijing 100005 China Key Laboratory of Systems Biology Shanghai Institutes for Biological Sciences Chinese Academy of Sciences Shanghai 200031 China
Homologous recombination is a fundamental cellular process that is most widely used by cells to rearrange genes and accurately repair DNA double-strand breaks. It may result in the formation of a critical intermediate... 详细信息
来源: 评论
Reasonable routing in delay/disruption tolerant networks
收藏 引用
Frontiers of Materials Science 2011年 第3期5卷 327-334页
作者: Haizheng YU Jianfeng MA Hong BIAN College of Mathematics and System Sciences Xinjiang University Urumqi 830046 China Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China School of Mathematical Sciences Xinjiang Normal University Urumqi 830054 China
Delay/disruption tolerant networking (DTN) is an approach to networking where intermittent connectivity exists: it is often afforded by a store and forward technique. Depending on the capability of intermediary nod... 详细信息
来源: 评论
A two-stage composite heuristic for dual cycling quay crane scheduling problem
A two-stage composite heuristic for dual cycling quay crane ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Dandan Wang Xiaoping Li Qian Wang School of Computer Science & Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
In this paper, hatch constrained quay crane scheduling problem is considered to minimize makespan with dual cycling, which can improve efficiency of operations and utilization of quay cranes. By analyzing precedence r... 详细信息
来源: 评论
A clustering scheme in application layer multicast
A clustering scheme in application layer multicast
收藏 引用
作者: Zhang, Xinchang Li, Xiaodong Luo, Wanming Yan, Baoping Shandong Key Laboratory of Computer Networks Shandong Computer Science Center No. 19 Keyuan Road Lixia Distric Jinan 250014 China Computer Network Information Center Chinese Academy of Sciences 4 South 4th Street Zhongguancun Beijing 100049 China
In application layer multicast (ALM), member hosts lack direct knowledge of underlying network topology, which brings some performance penalty. This paper investigates an effective way to rapidly obtain some related t... 详细信息
来源: 评论