咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7840 条 记 录,以下是4951-4960 订阅
排序:
Analysis on the weighting factor of wavelet-based watermarking scheme
收藏 引用
Journal of Computational information Systems 2012年 第10期8卷 4285-4292页
作者: Liu, Lili Cao, Tianjie Lu, Yulong Zhang, Hongtai School of Computer Science and Technology China University of Mining and Technology Xuzhou 221116 China State Key Laboratory of Information Security Graduate School of the Chinese Academy of Sciences Beijing 100049 China
This paper studies an invisible and robust digital watermarking algorithm in the wavelet transform domain. The chose of Discrete Wavelet Transform is motivated by a good match with Human Visual System directives. Howe... 详细信息
来源: 评论
Secure communication protocol based on trust management
收藏 引用
Advances in information Sciences and Service Sciences 2011年 第11期3卷 248-255页
作者: Li, Huixian Pang, Liaojun Wang, Yumin School of Computer Science and Engineering Northwestern Polytechnical Univ Xi'an 710072 China The Ministry of Education Key Laboratory of Comput. Networks and Information Security Xidian Univ Xi'an 710071 China
There are more security issues in Wireless Sensor networks (WSNs) than in traditional networks, because of the particularity of WSNs. The existing security mechanisms for WSNs can be classified into two types. One is ... 详细信息
来源: 评论
Encoding-Aware Data Placement for Efficient Degraded Reads in XOR-Coded Storage Systems
Encoding-Aware Data Placement for Efficient Degraded Reads i...
收藏 引用
Reliable Distributed Systems
作者: Zhirong Shen Patrick P.C. Lee Jiwu Shu Wenzhong Guo College of Mathematics and Computer Science Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China Department of Computer Science and Engineering The Chinese University of Hong Kong Department of Computer Science and Technology Tsinghua University Key Laboratory of Spatial Data Mining and Information Sharing Minstry of Education Fuzhou China
Erasure coding has been increasingly used by distributed storage systems to maintain fault tolerance with low storage redundancy. However, how to enhance the performance of degraded reads in erasure-coded storage has ... 详细信息
来源: 评论
Filtering performance analysis and application study of advertising filtering tools
Filtering performance analysis and application study of adve...
收藏 引用
International Conference on Intelligent System and Knowledge Engineering, ISKE
作者: Jun Huang Weiqing Cheng School of Computer Science & Technology Nanjing University of Posts and Telecommunications Nanjing China Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University) Nanjing China
As online advertisements are increasing in number, many ad filtering tools have emerged, among which the most widely-used are AdBlock and AdBlock Plus. To use these tools effectively is of significance to the network ... 详细信息
来源: 评论
A Polar Coding Approach to Unequal Message Protection
A Polar Coding Approach to Unequal Message Protection
收藏 引用
Topics in Coding (ISTC), International Symposium on
作者: Xinyuanmeng Yao Xiao Ma School of Computer Science and Engineering Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
In this paper, we present an unequal message protection (UMP) coding scheme, which provides unequal error protection (UEP) for a message set consisting of disjoint classes with different reliability requirements. The ...
来源: 评论
Tile-based Multi-source Adaptive Streaming for 360-degree Ultra-High-Definition Videos
Tile-based Multi-source Adaptive Streaming for 360-degree Ul...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Xinjing Yuan Lingjun Pu Ruilin Yun Jingdong Xu Institute of Systems and Networks College of Computer Science Nankai University Tianjin China State Key Laboratory of Integrated Services Networks (Xidian University) Xi’an China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
360° UHD videos have absorbed great attention in recent years. However, as they are of significant size and usually watched from a close range, they require extremely high bandwidth for a good immersive experienc... 详细信息
来源: 评论
Updatable Hash Proof System and Its Applications
Updatable Hash Proof System and Its Applications
收藏 引用
中国密码学会2016年密码算法会议
作者: Rupeng Yang Qiuliang Xu Yongbin Zhou Rui Zhang Chengyu Hu Zuoxia Yu School of Computer Science and Technology Shandong University Jinan 250101 China State Key Labor School of Computer Science and Technology Shandong University Jinan 250101 China State Key Laboratory of Information Security (SKLOIS) Institute of Information Engineering (IIE) C
To tackle with physical attacks to real world cryptosystems,leakage resilient cryptography was *** this setting, the adversary is allowed to have access to the internal state of a cryptographic system, thus violates t...
来源: 评论
An Efficient and Privacy-Preserving Load Monitoring and Billing Scheme in Smart Grid
An Efficient and Privacy-Preserving Load Monitoring and Bill...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yong Ding Enchang Yuan Changsong Yang Hai Liang Huiyong Wang Xinyong Peng Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Digital Infrastructure Guangxi Zhuang Autonomous Region Information Center Nanning China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China
The smart grid is widely recognized as a highly efficient solution for mitigating carbon emissions and addressing energy crises. Within this framework, the collection of metering data from users is crucial for improvi... 详细信息
来源: 评论
Analysis on the “Robust Yet Fragile” Nature of Internet: Load, Capacity and the Cascading Failure Avalanche Effect
Analysis on the “Robust Yet Fragile” Nature of Internet: L...
收藏 引用
International Conference for Young computer Scientists, ICYCS
作者: Chi Guo Lina Wang Furong Zhou Lainv Huang Zhen Peng Computer School of Wuhan University Wuhan China The Key Laboratory of Aerospace Information Security and Trust Computing of Ministry of Education Wuhan University of China Wuhan China
'Robust yet fragile (RYF)' is a major feature of Internet survivability. The cascading failure, which is caused by attacks or configuration mistakes, is one of the most serious incidents impact on the network ... 详细信息
来源: 评论
A rational framework for secure communication
收藏 引用
information Sciences 2013年 250卷 215-226页
作者: Youliang Tian Jianfeng Ma Changgen Peng Yichuan Wang Liumei Zhang School of Computer Science and Technology Xidian University Xi’an 710071 China State Key Laboratory of Information Security (SKLOIS) Institute of Information Engineering Chinese Academy of Sciences Beijing 100095 China College of Science Guizhou University Guiyang 550025 China
In this paper, we review the classical secure communication issues, which is always described as a set of interactive rules following a specified sequence, in the perspective of game theory. By introducing rational co...
来源: 评论