咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是3051-3060 订阅
排序:
Authenticated public-key encryption based on elliptic curve
Authenticated public-key encryption based on elliptic curve
收藏 引用
International Conference on Embedded Software and Systems
作者: Yiliang Han Xiaoyuan Yang Yupu Hu Key Laboratory of Network and Information Security A.P.FDepartment of Electronic Technology Engineering College of A. P. F Xi'an China College of Computer Science Xidian University Xi'an China
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm EC... 详细信息
来源: 评论
Improving the quality of 3D-QSAR by using flexible-ligand receptor models
Improving the quality of 3D-QSAR by using flexible-ligand re...
收藏 引用
作者: Pei, Jianfeng Chen, Hao Liu, Zhenming Han, Xiaofeng Wang, Qi Shen, Bin Zhou, Jiaju Lai, Luhua State Key Laboratory for Structural Chemistry of Stable and Unstable Species College of Chemistry and Molecular Engineering Peking University Beijing 100871 China Center for Theoretical Biology Peking University Beijing 100871 China Computer Network Information Center Chinese Academy of Sciences Beijing 100080 China Institute of Process Engineering Chinese Academy of Sciences Beijing 100080 China College of Chemistry and Molecular Engineering Peking University Beijing 100871 China
To address the problems associated with molecular conformations and alignments in the 3D-QSAR studies, we have developed the Flexible Ligand - Atomic Receptor Model (FLARM) 2.0 method. The FLARM 2.0 method has three u... 详细信息
来源: 评论
An enhanced application-level multicast protocol: a QoS perspective
An enhanced application-level multicast protocol: a QoS pers...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and networks (ISPAN)
作者: Zi Chu Yin-yin Yang Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China Southeast University Nanjing Jiangsu CN Dept. of Comput. Sci. & Eng. Southeast Univ. Nanjing China
Ubicast, an enhanced application-level multicast protocol, is presented in this paper. It is built upon Pastry, a robust and self-organizing peer-to-peer substrate overlay, and leverages its merits of reliable applica... 详细信息
来源: 评论
An approach to the formal verification of the three-principal cryptographic protocols
An approach to the formal verification of the three-principa...
收藏 引用
作者: Zhang, Yuqing Liu, Xiuying State Key Laboratory of Information Security GSCAS Beijing 100039 China National Computer Network Intrusion Protection Center GSCAS Beijing 100039 China
Based on the model checking theory, we derive the Running-Mode Analysis of three-principal cryptographic protocols from the Running-Mode Analysis of two-principal cryptographic protocols. To test this method, we analy... 详细信息
来源: 评论
Enhancing the content of the intrusion alerts using logic correlation
收藏 引用
Advanced Workshop on Content Computing, AWCC 2004
作者: Wang, Liang-Min Ma, Jian-Feng Zhan, Yong-Zhao The Key Laboratory of Computer Network and Information Security Xidian University Ministry of Education Xian710071 China The Computer School of Jiangsu Univ Zhenjiang212013 China
To solve the problem of the alert flooding and information semantics in the existing IDS, the approach using the logic correction to enhance the content of the alerts is presented. The Chronicle based on time interval... 详细信息
来源: 评论
A risk assessment approach for network information system
A risk assessment approach for network information system
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Yong-Zheng Zhang Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China Research Center of Computer Network and Information Security Technology Harbin Institute of Technology Harbin Heilongjiang China
Currently, risk assessment has been an effective technology of protecting network information system. In order to achieve more accurate result, a new assessment approach is presented in this paper. Our approach introd... 详细信息
来源: 评论
An architecture for intrusion detection using honey pot
An architecture for intrusion detection using honey pot
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Zhi-Hong Tian Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China National Computer Network and Information System Security Administration Center Beijing China
The most common shortcomings in the existing intrusion detection systems (IDSs) are information overload, unknown attacks, false positives and false negatives. We present the design of AAIDHP (an architecture for intr... 详细信息
来源: 评论
The precaution of the network virus and the quantitative analysis of the epidemic situation
The precaution of the network virus and the quantitative ana...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Bai-Ling Wang Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China National Computer Network and Information System Security Administration Center Beijing China
Comparing with the traditional host virus, the network virus has more attack ability and is more infectious in open network environment. So it is necessary to set a national virus precaution system to detect and contr... 详细信息
来源: 评论
Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc networks
收藏 引用
Journal of Interconnection networks 2003年 第3期4卷 345-359页
作者: Jiandong Li Zygmunt J. Haas Min Sheng Yanhui Chen Xidian University State Key Lab. of Integrated Service Network Xi'an Shaanxi 710071 P. R. China Cornell University School of Electrical and Computer Engineering Wireless Networks Laboratory Ithaca NY 14853 USA Xidian University Information Science Institute Xi'an Shaanxi 710071 P. R. China
In this paper, the IEEE 802.11 multiple access control (MAC) protocol was modified for use in multi-channel, multi-hop ad hoc networks through the use of a new channel-status indicator. In particular, in the modified ... 详细信息
来源: 评论
CARRIAGE: Fault tolerant CORBA system based on portable interceptors  2
CARRIAGE: Fault tolerant CORBA system based on portable inte...
收藏 引用
2nd International Workshop on Autonomous Decentralized System
作者: Zhang, Y Shen, ZW Wang, Y Department of Computer Science and Engineering The Key laboratory of Computer Network and Information Integrity Ministry of Education South-East University China
Fault Tolerance requirement, which demands the reliability and consistency in compute systems, becomes a hot issue in current distributed object application field. Based on standardized Portable Interceptors mechanism... 详细信息
来源: 评论