咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3351-3360 订阅
排序:
Improved deduplication method based on variable-size sliding window
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2011年 第9期5卷 80-87页
作者: Wang, Can Qin, Zhiguang Yang, Lei Nie, Peng School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province Chengdu 611731 China
To improve the deduplication performance while keep a reasonable metadata cost and time cost at the same time, a state deduplication method based on variable-size sliding window and a universal model of performance-an... 详细信息
来源: 评论
Chinese sentence correlation analyzing based on semantic dependency method
Chinese sentence correlation analyzing based on semantic dep...
收藏 引用
International Conference on Electronics, Communications and Control (ICECC)
作者: Haiping Zhu Yang Yang Yan Chen Qian Ma Department of Computer Science and Technology Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Technology Research and Development Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xian Jiaotong University Xian China Department of Computer Science and Technology Xian Jiaotong University Xian China
Based on the adoption of dependency grammar to analyze the structure of Chinese sentences, this paper suggests to analyze Chinese sentence with semantic dependency method. The correlation between words and phrases can... 详细信息
来源: 评论
The design and FPGA implementation of FSM-based intellectual property watermark algorithm at behavioral level
收藏 引用
Information technology Journal 2011年 第4期10卷 870-876页
作者: Liang, Wei Sun, Xingming Ruan, Zhiqiang Long, Jing Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan 411201 China
A Finite State Machine (FSM)-based Intellectual Property (IP) watermark algorithm at behavioral level is presented for the protection of IP reuse techniques in Very Large Scale Integration (VLSI). The proposed algorit... 详细信息
来源: 评论
Constructions of two-output Bent functions
收藏 引用
Journal of Computational Information Systems 2011年 第12期7卷 4178-4184页
作者: Zhang, Fengrong Hu, Yupu Zhao, Yongbin Xie, Min Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Information Science and Technology Shijiazhuang Tiedao University Shijiazhuang 050043 China
Bent functions, which have the highest nonlinearity, play an important role in coding theory, sequence design and cryptography. On the basis of a given 2n-variable Maiorana-McFarland (M-M) Bent function and the 2n ... 详细信息
来源: 评论
Provably secure role-based encryption with revocation mechanism
Provably secure role-based encryption with revocation mechan...
收藏 引用
作者: Zhu, Yan Hu, Hong-Xin Ahn, Gail-Joon Wang, Huai-Xi Wang, Shan-Biao Institute of Computer Science and Technology Peking University Beijing 100871 China Beijing Key Laboratory of Internet Security Technology Peking University Beijing 100871 China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ 85287 United States 4School of Mathematical Sciences Peking University Beijing 100871 China
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism ba... 详细信息
来源: 评论
computing Parametric Alignment of RNA Structures: Visualization and Practice
Computing Parametric Alignment of RNA Structures: Visualizat...
收藏 引用
International Conference on Future Computer Sciences and Application (ICFCSA)
作者: Wangsen Feng Bei Zhang Lusheng Wang Key Laboratory of Network and Software Security Assurance of Ministry of Education Computing Center Beijing University Beijing China Department of Computer Science City University of Hong Kong Hong Kong China
Alignment of RNA structures is very important in biological research. Similar to pair-wise sequence alignment, there is often disagreement about how to weight matches, mismatches, indels and gaps when comparing two RN... 详细信息
来源: 评论
A distributed intrusion detection system against flooding denial of services attacks
A distributed intrusion detection system against flooding de...
收藏 引用
作者: Chuiyi, Xie Yizhi, Zhang Yuan, Bai Shuoshan, Luo Qin, Xu School of Mathematics and Information Science ShaoGuan University Guangdong China Information Security Center Beijing University of Posts and Telecommunications Beijing China School of Electronics and Information Engineering Liaoning University of Technology China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Beijing Safe-Code Technology Co. Ltd. China
A DIDS(Distributed Intrusion Detection System) named as F-DIDS is built to defend against flooding DoS(Denial of Services) attacks in the paper. F-DIDS is composed of F-IDSes which are settled in nodes who need to be ... 详细信息
来源: 评论
Chaotic Hash Function Based on Tandem-DM Construction
Chaotic Hash Function Based on Tandem-DM Construction
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Li Gao Xiaomin Wang Wenfang Zhang School of Information Science & Technology Southwest Jiaotong University Chengdu China Key Laboratory of Information Security & National Computing Grid Southwest Jiaotong University Chengdu China
Conventional chaotic hash functions adopt a number of iterations of chaotic map and a large number of floating point calculations, thus the implement of these hash functions require a great many resources. This kind o... 详细信息
来源: 评论
Conditions of parameter identification from time series
收藏 引用
Physical Review E 2011年 第3期83卷 036202-036202页
作者: Haipeng Peng Lixiang Li Yixian Yang Fei Sun Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications P.O. Box 145 Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China and National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
We study the problem of synchronization-based parameters identification of dynamical systems from time series. Through theoretical analysis and numerical examples, we show that some recent research reports on this iss... 详细信息
来源: 评论
Efficient RFID authentication scheme with high security
Efficient RFID authentication scheme with high security
收藏 引用
International Conference on Communication Software and networks, ICCSN
作者: Shuai Shao Guoai Xu Yanfei Liu Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications Beijing China First Research Institute of Ministry of Public Security Beijing China
With the spread of RFID technology, Lots of authentication schemes for RFID have been proposed to provide user privacy and security. However, most of these protocols are limited in scalability, in which the server'... 详细信息
来源: 评论