咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3371-3380 订阅
排序:
Multi-User Private keyword Search for Cloud computing
Multi-User Private Keyword Search for Cloud Computing
收藏 引用
IEEE International Conference on Cloud computing technology and Science (CloudCom)
作者: Yanjiang Yang Haibing Lu Jian Weng Institute for Infocomm Research Singapore Department of Operations Management and Information Systems The Leavey School of Business Santa Clara University USA State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Department of Computer Science and Emergency Technology Research Center of Risk Department of Computer Science and Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
Optimal aggregation of interval numbers based on genetic algorithm in group decision
收藏 引用
Journal of Information and Computational Science 2011年 第5期8卷 842-849页
作者: Kang, Bingyi Zhang, Yajuan Deng, Xinyang Wu, Jiyi Sun, Xiaohong Li, Ya Deng, Yong College of Computer and Information Sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou 310036 China College of Food Science and Technology Shanghai Ocean University 999 Hucheng Huan Road Shanghai 201306 China Key Subject Laboratory of National Defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China School of Electronics and Information Technology Shanghai Jiaotong University Shanghai 200240 China
A group of decision-makers may differ in their choice of alternatives while making a decision. As a result, how to aggregate opinions of different experts is still an open issue. Due to the uncertainty in the process ... 详细信息
来源: 评论
An anonymity and authentication mechanism for internet of things
收藏 引用
Journal of Convergence Information technology 2011年 第3期6卷 98-105页
作者: Wang, Xiaoliang Sun, Xingming Yang, Hengfu Shah, Saeed Arif College of Information Engineering Xiangtan University Xiangtan 411105 China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjin 210044 China Department of Information Science and Engineering Hunan First Normal University Changsha 410205 China Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy... 详细信息
来源: 评论
SWP2P: P2P anonymous trace system based on superposition watermarking
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2011年 第8期5卷 116-126页
作者: Wang, Xiaoliang Sun, Xingming Yang, Hengfu Shah, Saeed Arif College of Information Engineering Xiangtan University Xiangtan 411105 China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjin 210044 China Department of Information Science and Engineering Hunan First Normal University Changsha 410205 China Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous a... 详细信息
来源: 评论
Research on Auto-generation of Operation Order for Distribution network
Research on Auto-generation of Operation Order for Distribut...
收藏 引用
The Second International Conference on High Performance networking, computing,and Communication Systems(ICHCC 2011)
作者: Yanwei Zheng Qingdong Meng Xuejun Lv Zhiquan Feng School of Information Science and Engineering University of Jinan Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Department of Production Technology Yanggu Power Supply Corporation Department of City Power Supply Linyi Power Supply Corporation
To meet the requirements of operation orders auto-generation, a topology information data structure is designedAbove this, several algorithms are proposed, which support to generate operation orders for the tasks of c... 详细信息
来源: 评论
Quantum broadcast communication with authentication
收藏 引用
Chinese Physics B 2010年 第7期19卷 63-67页
作者: 杨宇光 王叶红 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Two simple quantum broadcast communication schemes are proposed. A central party can broadcast his secret message to all the legitimate receivers simultaneously. Compared with the three schemes proposed recently (Wan... 详细信息
来源: 评论
A Distributed Intrusion Detection System against flooding Denial of Services attacks
A Distributed Intrusion Detection System against flooding De...
收藏 引用
International Conference on Advanced Communication technology (ICACT)
作者: Xie Chuiyi Zhang Yizhi Bai Yuan Luo Shuoshan Xu Qin School of Mathematics and Information Science ShaoGuan University Guangdong China Information Security Center Beijing University of Posts and Telecommunications Beijing China School of Electronics & Information Engineering Liaoning University of Technology China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Beijing Safe-Code Technology Company Limited China
A DIDS(Distributed Intrusion Detection System) named as F-DIDS is built to defend against flooding DoS(Denial of Services) attacks in the paper. F-DIDS is composed of F-IDSes which are settled in nodes who need to be ... 详细信息
来源: 评论
Determination of relative significance factor of impact categories based on fuzzy multiattribute decision-making method
Determination of relative significance factor of impact cate...
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Xinyang Deng Yajuan Zhang Bingyi Kang Jiyi Wu Xiaohong Sun Yong Deng School of Computer and Information Sciences Southwest University Chongqing China Hangzhou Key Laboratory of E-Business and Information Security Hangzhou Normal University Hangzhou Zhejiang China College of Food Science and Technology Shanghai Ocean University Shanghai China Laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan China School of Electronics & Information Technology Shanghai Jiaotong University Shanghai China Laboratory of National defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang China
A relative significance factor of an impact category is the external weight of the impact category and plays an important role in life cycle assessment(LCA). Many multiattribute decision-making (MADM) methods such as ... 详细信息
来源: 评论
Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers
收藏 引用
Communications in Theoretical Physics 2010年 第7期54卷 84-88页
作者: 杨宇光 王园 腾义伟 柴海平 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collabo... 详细信息
来源: 评论
From the modern Web applications to the multi-tenant SaaS solution
收藏 引用
Tongxin Xuebao/Journal on Communications 2011年 第9 A期32卷 133-138页
作者: Ma, Kun Yang, Bo Chen, Zhen-Xiang Ma, Bing-Xian Li, Qing-Zhong School of Computer Science and Technology Shandong University Jinan 250101 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan 250022 China
Migrating existing Web applications toward SaaS (software-as-a-service) applications can reuse the legacy software assets and cut down the re-development cost and risk. However, it lacked generic migration approaches ... 详细信息
来源: 评论