咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3121-3130 订阅
排序:
One forward-secure signature scheme using bilinear maps and its applications
One forward-secure signature scheme using bilinear maps and ...
收藏 引用
作者: Yu, Jia Kong, Fanyu Cheng, Xiangguo Hao, Rong Li, Guowen College of Information Engineering Qingdao University 266071 Qingdao China Shandong Provincial Key Laboratory of Computer Network 250014 Jinan China Institute of Network Security Shandong University 250100 Jinan China Key Lab of Cryptographic Technology and Information Security Ministry of Education Jinan 250100 China School of Computer Science and Technology Shandong Jianzhu University 250100 Jinan China
Forward-secure signatures are proposed to deal with the key exposure problem. Compared to regular signatures, forward-secure signatures have a special update algorithm that can evolve the new private key in each time ... 详细信息
来源: 评论
Self-adaptive anonymous communication scheme under SDN architecture
Self-adaptive anonymous communication scheme under SDN archi...
收藏 引用
IEEE International Conference on Performance, computing and Communications (IPCCC)
作者: Tingting Zeng Meng Shen Mingzhong Wang Liehuang Zhu Fan Li Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications Beijing Institute of Technology P. R. China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education P. R. China Faculty of Arts and Business University of the Sunshine Coast Queensland Australia
Communication privacy and latency perceived by users have become great concerns for delay-sensitive Internet services. Existing anonymous communication systems either provide high anonymity at an expense of prolonged ... 详细信息
来源: 评论
Latency-aware routing with bandwidth assignment for Software Defined networks
Latency-aware routing with bandwidth assignment for Software...
收藏 引用
IEEE International Conference on Performance, computing and Communications (IPCCC)
作者: Qiongyu Zhang Liehuang Zhu Meng Shen Mingzhong Wang Fan Li Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications Beijing Institute of Technology P. R. China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education P. R. China Faculty of Arts and Business University of the Sunshine Coast Queensland Australia
Reducing the flow latency is of great importance in traffic management, which benefits both service providers and end users. Routing design and flow scheduling are typical ways to improve the flow transmission efficie... 详细信息
来源: 评论
ESSVCS: An enriched secret sharing visual cryptography
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8363卷 1-24页
作者: Liu, Feng Yan, Wei Q. Li, Peng Wu, Chuankun State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China School of Computing and Mathematical Sciences Auckland University of Technology 1142 New Zealand Department of Mathematics and Physics North China Electric Power University Baoding Hebei 071003 China
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that are able to... 详细信息
来源: 评论
A Parking Guidance Method Based on Parallel Particle Swarm Optimization Algorithm
A Parking Guidance Method Based on Parallel Particle Swarm O...
收藏 引用
International Conference on Computational Intelligence and security
作者: Bin Wang Ying Liu Xinhong Hei Lei Wang Zhiqiang Zhang Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China
Aiming at the problem of intelligent path guidance in the parking lot, an improved Particle Swarm Optimization Algorithm(PSO) is proposed in this paper to find the optimal path. In order to overcome the shortcomings t... 详细信息
来源: 评论
Empirical analysis on human dynamics of QQ group communication
Empirical analysis on human dynamics of QQ group communicati...
收藏 引用
2014 International Conference on Applied Sciences, Engineering and technology, ICASET 2014
作者: Tian, Rui Han, Xu Wang, Wen Jun Tianjin Key Laboratory of Cognitive Computing and Application School of Computer Science and Technology Tianjin University Tianjin 300072 China The population management office of Tianjin Municipal Public Security Bureau Tianjin 300000 China
The understanding of the temporal patterns of individual human interactions is essential in explaining many characteristics of human behavior. The instant communication tool QQ is developing rapidly on the network in ... 详细信息
来源: 评论
Analysis of city traffic characteristics from GPS data
Analysis of city traffic characteristics from GPS data
收藏 引用
2014 International Conference on Applied Sciences, Engineering and technology, ICASET 2014
作者: Dong, Jiang Yuan Han, Xu Wang, Wen Jun Tianjin Key Laboratory of Cognitive Computing and Application School of Computer Science and Technology Tianjin University Tianjin 300000 China The population management office of Tianjin Municipal Public Security Bureau Tianjin 300000 China
With the city urbanization and increase in the number of motor vehicle, Study of the city traffic pattern from taxi GPS data has become the research hotspot. This paper analyzes two city taxi GPS data;calculate the pe... 详细信息
来源: 评论
Dynamic analysis of human behavior based on user log of ACM
Dynamic analysis of human behavior based on user log of ACM
收藏 引用
2014 International Conference on Applied Sciences, Engineering and technology, ICASET 2014
作者: Long, Zi Yuan Han, Xu Wang, Wen Jun Tianjin Key Laboratory of Cognitive Computing and Application School of Computer Science and Technology Tianjin University Tianjin 300000 China The population management office of Tianjin Municipal Public Security Bureau Tianjin 300000 China
Human behavior is one kind of complicated phenomena. Comprehensive and profound understanding of their behavioral characteristics has been the direction of the tireless efforts of people. In recent years, studies have... 详细信息
来源: 评论
Collaborative Reversing of Input Formats and Program Data Structures for security Applications
收藏 引用
China Communications 2014年 第9期11卷 135-147页
作者: ZHAO Lei Key Laboratory of Aerospace Information Security and Trust Computing Wuhan China Computer School of Wuhan University Wuhan China State Key Lab. for Novel Software Technology Nanjing University China
Reversing the syntactic format of program inputs and data structures in binaries plays a vital role for understanding program behaviors in many security *** this paper,we propose a collaborative reversing technique by... 详细信息
来源: 评论
Modeling for user interaction by influence transfer effect in online social networks
Modeling for user interaction by influence transfer effect i...
收藏 引用
Conference on Local Computer networks (LCN)
作者: Qindong Sun Nan Wang Yadong Zhou Hanqin Wang Liansheng Sui Shaanxi Key Laboratory of Network Computing and Security Xi'an University of Technology Xi'an China MOE KLINNS Lab Xi'an Jiaotong University Xi'an China
User interaction is one of the most important features of online social networks, and is the basis of research of user behavior analysis, information spreading model, etc. However, existing approaches focus on the int... 详细信息
来源: 评论