咨询与建议

限定检索结果

文献类型

  • 628 篇 会议
  • 182 篇 期刊文献

馆藏范围

  • 810 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 420 篇 工学
    • 316 篇 计算机科学与技术...
    • 260 篇 软件工程
    • 144 篇 电气工程
    • 93 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 29 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 11 篇 化学工程与技术
    • 10 篇 动力工程及工程热...
    • 10 篇 建筑学
  • 157 篇 理学
    • 101 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 12 篇 化学
    • 10 篇 系统科学
  • 110 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 67 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 40 篇 federated learni...
  • 40 篇 training
  • 39 篇 data models
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 visualization
  • 21 篇 adaptation model...
  • 19 篇 network security
  • 19 篇 privacy
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 224 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 state grid key l...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 15 篇 global energy in...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 mingle zhou
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 delong han
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang

语言

  • 771 篇 英文
  • 34 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and information Security"
810 条 记 录,以下是791-800 订阅
排序:
Koblitz Elliptic Curves Generating Based on Evolutionary Cryptography Theory and Verifying Parameters Recommended by NIST
收藏 引用
China Communications 2011年 第4期8卷 41-49页
作者: 王潮 张焕国 刘礼黎 Key Lab of Specialty Fiber Optics and Optical Access Network Ministry of Education Shanghai University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Computer School Wuhan University Huawei Technologies Co. Ltd
Elliptic curve cryptography is one of the most important public-key *** Koblitz Curve is a special kind of elliptic curve in ECC and its security mainly depends on the base *** on Evolutionary Cryptography theory,whic... 详细信息
来源: 评论
Strong security enabled certificateless aggregate signatures applicable to mobile computation
Strong security enabled certificateless aggregate signatures...
收藏 引用
3rd IEEE International Conference on Intelligent networking and CollaborativeSystems, INCoS 2011
作者: Hu, Xiong Wu, Qianhong Chen, Zhong Key Laboratory of Network and Software Security Assurance of the Ministry of Education School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan University Ministry of Education China Universitat Rovira i Virgili Department of Computer Engineering and Mathematics UNESCO Av. Països Catalans 26 E-43007 Tarragona Spain
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
A Markov Chain-based Availability Model of Virtual Cluster Nodes
A Markov Chain-based Availability Model of Virtual Cluster N...
收藏 引用
International Conference on Computational Intelligence and security
作者: Jianhua Che Tao Zhang Weimin Lin Houwei Xi Information & Network Security Key Laboratory of State Grid State Grid Electric Power Research Institute Nanjing China
Benefiting from the virtualization technology, virtual cluster system possesses a lot of advantages different from traditional cluster system. However, the availability analysis of virtual cluster system is still shor... 详细信息
来源: 评论
Transparent Encrypting Office Document Based on Plug-in Software
收藏 引用
Procedia Engineering 2011年 23卷 260-264页
作者: Zhou Zhen-liu Tian Ling Li Zhuo-ling Shenyang Key Laboratory of Information Security for Power System Institute of Engineering Shenyang 110136 China Department of network and electronic engineering Information Engineering School Shenyang 110000 China
More and more file encrypting about office document are required in personal application environment. Limitations about encrypting file system, virtual disk encryption and filtrating driver encryption, are analyzed in... 详细信息
来源: 评论
Research on Auto-generation of Operation Order for Distribution network
Research on Auto-generation of Operation Order for Distribut...
收藏 引用
The Second International Conference on High Performance networking, computing,and Communication Systems(ICHCC 2011)
作者: Yanwei Zheng Qingdong Meng Xuejun Lv Zhiquan Feng School of Information Science and Engineering University of Jinan Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Department of Production Technology Yanggu Power Supply Corporation Department of City Power Supply Linyi Power Supply Corporation
To meet the requirements of operation orders auto-generation, a topology information data structure is designedAbove this, several algorithms are proposed, which support to generate operation orders for the tasks of c... 详细信息
来源: 评论
Strong security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation
Strong Security Enabled Certificateless Aggregate Signatures...
收藏 引用
International Conference on Intelligent networking and Collaborative Systems (INCOS)
作者: Hu Xiong Qianhong Wu Zhong Chen Key Laboratory of Network and Software Security Assurance of the Ministry of Education Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Department of Computer Engineering and Mathematics UNESCO Chair in Data Pr Universitat Rovira i Virgili Tarragona Spain Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University of China China
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & Technology 2010年 第6期25卷 1293-1304页
作者: 王怀习 朱岩 冯荣权 Stephen S.Yau LMAM School of Mathematical SciencesPeking University Electronic Engineering Institute Institute of Computer Science and Technology Peking University Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education Information Assurance Center and School of Computing Informatics and Decision Systems Engineering Arizona State University
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***... 详细信息
来源: 评论
Threshold signature scheme based on non-interactive Diffie-Hellman signature
Threshold signature scheme based on non-interactive Diffie-H...
收藏 引用
1st International Conference on networking and Distributed computing, ICNDC 2010
作者: Wang, Xiuqun Huang, Lican Key Laboratory for Information System Security Ministry of Education Tsinghua University and Beijing Certification Authority Beijing China Institute of Network and Distributed Computing Zhejiang Sci-Tech University Hangzhou China
We present a threshold signature based on non-interactive Diffie-Hellman signature. It works in asynchronous communication system and can tolerate Byzantine faults with optimal resiliencen ≥ 3t + 1, where n is the nu... 详细信息
来源: 评论
information system security function validating using model checking
Information system security function validating using model ...
收藏 引用
2010 2nd International Conference on Computer Engineering and Technology, ICCET 2010
作者: Ma, Jianli Xu, Guoai Yang, Yixian Ji, Yong Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing China China Electronics System Engineering Computing station Beijing China
information systems will be encountered more and more security threats due to the development of computer attack method and technology. Generally, different security policies are used to protect the sensitive informat... 详细信息
来源: 评论
Enhancing fairness: A novel C2C e-commerce community member reputation algorithm based on transaction social networks
Enhancing fairness: A novel C2C e-commerce community member ...
收藏 引用
IADIS International Conference WWW/Internet 2010
作者: Feng, Wangsen Zhang, Bei Xia, Yunni Li, Jiajing Meng, Tao Key Laboratory of Network and Software Security Assurance of Ministry of Education Computing Center Peking University Beijing 100871 China College of Computer Science Chongqing University Chongqing 400044 China School of Mechanical Electronic and Information Engineering China University of Mining and Technology Beijing 100083 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Today, almost all the C2C e-commerce community member reputation evaluating algorithms are time sensitive. The reputation of a community member is accumulated after transactions and the increment of reputation after a... 详细信息
来源: 评论