咨询与建议

限定检索结果

文献类型

  • 2,000 篇 会议
  • 1,534 篇 期刊文献

馆藏范围

  • 3,534 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,311 篇 工学
    • 1,755 篇 计算机科学与技术...
    • 1,433 篇 软件工程
    • 576 篇 信息与通信工程
    • 304 篇 电气工程
    • 247 篇 控制科学与工程
    • 231 篇 生物工程
    • 224 篇 电子科学与技术(可...
    • 166 篇 网络空间安全
    • 135 篇 机械工程
    • 111 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 83 篇 安全科学与工程
    • 79 篇 仪器科学与技术
    • 78 篇 交通运输工程
    • 60 篇 建筑学
    • 58 篇 材料科学与工程(可...
    • 58 篇 动力工程及工程热...
  • 1,052 篇 理学
    • 599 篇 数学
    • 251 篇 物理学
    • 247 篇 生物学
    • 204 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 84 篇 化学
  • 584 篇 管理学
    • 321 篇 管理科学与工程(可...
    • 298 篇 图书情报与档案管...
    • 94 篇 工商管理
  • 116 篇 法学
    • 70 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 14 篇 教育学
  • 7 篇 艺术学
  • 6 篇 文学

主题

  • 151 篇 feature extracti...
  • 124 篇 semantics
  • 98 篇 accuracy
  • 96 篇 training
  • 93 篇 computational mo...
  • 92 篇 deep learning
  • 72 篇 federated learni...
  • 71 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 57 篇 authentication
  • 55 篇 protocols
  • 51 篇 security
  • 50 篇 data privacy
  • 49 篇 neural networks
  • 48 篇 object detection
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 219 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 93 篇 university of ch...
  • 80 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 information secu...
  • 62 篇 cas key laborato...
  • 62 篇 school of cyber ...
  • 58 篇 guangdong provin...
  • 52 篇 tianjin key labo...
  • 50 篇 shandong fundame...
  • 48 篇 network and data...
  • 48 篇 state key labora...
  • 46 篇 shandong enginee...
  • 46 篇 peng cheng labor...
  • 45 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 state key labora...
  • 42 篇 shandong provinc...
  • 42 篇 institute of inf...

作者

  • 97 篇 cheng xueqi
  • 47 篇 shen huawei
  • 46 篇 guo jiafeng
  • 42 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 23 篇 jin hai
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 20 篇 shen yulong

语言

  • 3,271 篇 英文
  • 187 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3534 条 记 录,以下是3421-3430 订阅
排序:
Protocol adaption of NAC in mobile telecommunication networks
Protocol adaption of NAC in mobile telecommunication network...
收藏 引用
2009 International Conference on Information Engineering and Computer Science, ICIECS 2009
作者: Bing, Liu Cheng, Song Yang, Xin Yixian, Yang Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China Beijing Safe-Code Technology Co. Ltd. China
The NAC (network Access Control) technology which enforces the endpoint access decision based on the collected endpoint security status information and platform measurement information has been developed by various co... 详细信息
来源: 评论
On the implementation of prototype system for wireless network's trusted access architecture
On the implementation of prototype system for wireless netwo...
收藏 引用
2009 IEEE International Conference on Communications technology and Applications, IEEE ICCTA2009
作者: Jun, Cui Zhentao, Zhang Yixian, Yang Peng, Gao Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China China Mobile Group Design Institute Co. Ltd. Beijing China
In the telecommunication operator wireless network, the user is identifiable and centrally managed, therefore the user trust can also be centrally managed. In this paper, we propose trust cloud model based on cloud mo... 详细信息
来源: 评论
SkyF2F: Censorship Resistant via Skype Overlay network
SkyF2F: Censorship Resistant via Skype Overlay Network
收藏 引用
WASE International Conference on Information Engineering, ICIE
作者: Shoufeng Cao Longtao He Zhongxian Li Yixian Yang Information Security Center State Key Laboratory of Networking and Switching Technology Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications China Research Center of Information Security Institute of Computing Technology Chinese Academy and Sciences Beijing China
Internet censorship is on the rise as an increasing number of countries and companies block or monitor access to parts of the Internet. Many censorship resistant systems have been proposed, which rely on deploying man... 详细信息
来源: 评论
A strong designated verifier ring signcryption scheme
A strong designated verifier ring signcryption scheme
收藏 引用
5th International Conference on Wireless Communications, networking and Mobile computing, WiCOM 2009
作者: Shengju, Han Huaqun, Wang Xiukun, Wang School of Electronic and Information Engineering Dalian University of Technology Dalian China School of Information Engineering Dalian Fisheries University Dalian China Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China
In this paper, we present a new concept of a strong designated verifier ring signcryption scheme. We argue that this is an important cryptographic primitive that can be used to protect privacy and authenticity of a co... 详细信息
来源: 评论
Improved EMD steganography with great embedding rate and high embedding efficiency
Improved EMD steganography with great embedding rate and hig...
收藏 引用
IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing
作者: Qu, Zhiguo Fu, Yu Niu, Xinxin Yang, Yixian Zhang, Ru Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
EMD steganographic method by exploiting modification direction in the host images to send secret messages was proposed by Zhang et al. Comparing with other steganographic algorithms, its highlight is high embedding ef... 详细信息
来源: 评论
A model for real-time simulation of large-scale networks based on network processor
A model for real-time simulation of large-scale networks bas...
收藏 引用
2009 2nd IEEE International Conference on Broadband network and Multimedia technology, IEEE IC-BNMT2009
作者: Xiaobo, Xu Kangfeng, Zheng Yixian, Yang Guoai, Xu Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Real-time network simulation refers to simulating computer networks in real time so that the virtual network can interact with real implementations of network protocols, network services, and distributed applications.... 详细信息
来源: 评论
OverFly-A Client-Enhanced Publish-Subscribe System
OverFly-A Client-Enhanced Publish-Subscribe System
收藏 引用
International Conference on Grid and Cooperative computing (GCC)
作者: Bowen Kan Yongqiang He Haojie Zhou Li Zha Key Laboratory of Network Science and Technology Institute of Computing Technology Chinese Academy and Sciences Beijing China
This paper presents OverFly, a large-scale publish-subscribe system developed to support our grid middleware, Vega grid operating system, short as GOS. OverFly differs from most existing publish-subscribe systems in t... 详细信息
来源: 评论
Approximating Bounded Degree Maximum Spanning Subgraphs
Approximating Bounded Degree Maximum Spanning Subgraphs
收藏 引用
第八届运筹学及其应用国际研讨会
作者: Wangsen Feng Hao Ma Bei Zhang Hanpin Wang Key Laboratory of Network and Software Security Assurance Ministry of Education Computing CenterPeking University School of EECS Peking University
The bounded degree maximum spanning subgraph problem arising from wireless mesh networks is studied *** a connected graph G and a positive integer d≥2,the problem aims to find a maximum spanning subgraph H of G with ... 详细信息
来源: 评论
The Algorithm of Short Message Hot Topic Detection Based on Feature Association
收藏 引用
Information technology Journal 2009年 第2期8卷 236-240页
作者: Sun, Qindong Wang, Qian Qiao, Hongli School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Network Computing and Security Key Lab of Shaanxi Xi'an University of Technology Xi'an 710048 China
Aiming at the mobile short message (SMS) hot topic extraction, the text features and statistical regularity of SMS are analyzed in this study. The formal description of SMS hot topic is given and an algorithm of SMS h... 详细信息
来源: 评论
Customer behavior pattern discovering based on mixed data clustering
Customer behavior pattern discovering based on mixed data cl...
收藏 引用
2009 International Conference on Computational Intelligence and Software Engineering, CiSE 2009
作者: Cheng, Mingzhi Xin, Yang Tian, Yangge Wang, Cong Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defence Technology Ministry of Education Beijing University of Posts and Telecommunications China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China International School of Software Wuhan University Wuhan China
To be effective to retain customers and enhance the marketing capabilities, it is necessary to improve the personalization of e-commerce systems. Clustering is a reliable and efficient technology to provide personal s... 详细信息
来源: 评论