咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3281-3290 订阅
排序:
Attribute-Based Authenticated Group key Management Protocol for Mobile Peer-to-Peer network
收藏 引用
China Communications 2012年 第10期9卷 68-77页
作者: Zhang Guoyin Fu Xiaojing Ma Chunguang College of Computer Science and Technology Harbin Engineering University Harbin 150001 P. R. China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu 611731 P. R. China
The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer network ( MP2... 详细信息
来源: 评论
A Fourier-Mellin transform based feature for image copy detection with rotation simulation strategy
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第11期6卷 369-377页
作者: Zhou, Zhili Sun, Xingming Chen, Xianyi Tan, Lina Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China
With the growing popularity of multimedia sharing websites, content-based image copy detection is very important for its copyright protection. Its key issue is to extract those features which are robust to various kin... 详细信息
来源: 评论
A measurement study on potential inter-domain routing diversity
收藏 引用
IEEE Transactions on network and Service Management 2012年 第3期9卷 268-278页
作者: Hu, Chengchen Chen, Kai Chen, Yan Liu, Bin Vasilakos, Athanasios V. MoE Key Laboratory of Intelligent Networks and Network Security Department of Computer Science and Techonolgy Xi'An Jiaotong University Xi'an Shaanxi China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Department of Electrical Engineering and Computer Science Northwestern University Evanston IL United States Department of Computer Science and Technology Tsinghua University Beijing China Department of Computer and Telecommunications Engineering University of Western Macedonia GR 50100 Kozani Greece
In response to Internet emergencies, Internet resiliency is investigated directly through an autonomous system (AS) level graph inferred from policy-compliant BGP paths or/and traceroute paths. Due to policy-driven in... 详细信息
来源: 评论
Threshold Ring Signature Scheme Based on TPM
收藏 引用
China Communications 2012年 第1期9卷 80-85页
作者: Gong Bei Jiang Wei Lin Li Li Yu Zhang Xing College of Computer Science Beijing University of Technology Beijing 100124 P. R. China Institute of Electronic Technology Information Engineering University Zhengzhou 450004 P. R. China State Key Laboratory of Information Security Institute of Sottware Chinese Academy of Sciences Beijing Beijing 100049 P. R. China Key Laboratory of Information and Network Security 3rd Research Institute Ministry of Public Security Shanghai 201204 P. R. China
The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we prese... 详细信息
来源: 评论
An Efficient Mutation-Based Fuzz Testing Approach for Detecting Flaws of network Protocol
An Efficient Mutation-Based Fuzz Testing Approach for Detect...
收藏 引用
International Conference on Computer Science and Service System (CSSS)
作者: Zhao Zhang Qiao-Yan Wen Wen Tang State Key Laboratory of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing China IT Security Cooperate Technology Siemens Limited China Beijing China
security flaws existed in protocol implementations might be exploited by malicious attackers and the consequences can be very serious. Therefore, detecting vulnerabilities of network protocol implementations is becomi... 详细信息
来源: 评论
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation
收藏 引用
China Communications 2012年 第10期9卷 33-39页
作者: Zhao Wentao Fu Shaojing Li Chao Qu Longjiang College of Computer National University of Defense Technology Changsha 410073 P. R. China Department of Mathematics and System Science National University of Defense Technology Changsha 410073 P. R. China Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 P. R. China State key Laboratory of Information Security Chinese Academy of Science Beijing 100049 P. R. China
To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation o... 详细信息
来源: 评论
Mining Protocol State Machines by Interactive Grammar Inference
Mining Protocol State Machines by Interactive Grammar Infere...
收藏 引用
International Conference on Digital Manufacturing and Automation (ICDMA)
作者: Zhao Zhang Qiao-Yan Wen Wen Tang State Key Laboratory of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing China IT Security Cooperate Technology Siemens Limited China Beijing China
Protocol state machine is very essential in network security and implementation fields, however, improper management of software evolution, compounded by changing and imprecise requirements, along with "short tim... 详细信息
来源: 评论
A SIMPLE FULLY HOMOMORPHIC ENCRYPTION SCHEME AVAILABLE IN CLOUD computing
A SIMPLE FULLY HOMOMORPHIC ENCRYPTION SCHEME AVAILABLE IN CL...
收藏 引用
2012 IEEE 2nd International Conference on Cloud computing and Intelligence Systems
作者: Jian Li Danjie Song Sicong Chen Xiaofeng Lu School of Computer Beijing University of Posts and Telecommunications Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China
With continuous expansion of cloud computing, problems of third-party data security become increasingly prominent. However, effective retrieval of encrypted data and other operations are difficult to achieve by tradit... 详细信息
来源: 评论
security STRUCTURE OF CLOUD STORAGE BASED ON HOMOMORPHIC ENCRYPTION SCHEME
SECURITY STRUCTURE OF CLOUD STORAGE BASED ON HOMOMORPHIC ENC...
收藏 引用
2012 IEEE 2nd International Conference on Cloud computing and Intelligence Systems
作者: Jian Li Sicong Chen Danjie Song School of Computer Beijing University of Posts and Telecommunications Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China
According to the demerits of the traditional cloud storage that there exists superuser, encryption and decryption would take up many client’s sources, and the retrieval spends much time and is complex, the paper prop... 详细信息
来源: 评论
Revisiting Multiple Pattern Matching Algorithms for Multi-Core Architecture
收藏 引用
Journal of Computer Science & technology 2011年 第5期26卷 866-874页
作者: 谭光明 刘萍 卜东波 刘燕兵 Key Laboratory of Computer System and Architecture Institute of Computing TechnologyChinese Academy of Sciences Key Laboratory of Network Technology Institute of Computing TechnologyChinese Academy of Sciences
Due to the huge size of patterns to be searched,multiple pattern searching remains a challenge to several newly-arising applications like network intrusion *** this paper,we present an attempt to design efficient mult... 详细信息
来源: 评论