咨询与建议

限定检索结果

文献类型

  • 2,000 篇 会议
  • 1,534 篇 期刊文献

馆藏范围

  • 3,534 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,311 篇 工学
    • 1,755 篇 计算机科学与技术...
    • 1,433 篇 软件工程
    • 576 篇 信息与通信工程
    • 304 篇 电气工程
    • 247 篇 控制科学与工程
    • 231 篇 生物工程
    • 224 篇 电子科学与技术(可...
    • 166 篇 网络空间安全
    • 135 篇 机械工程
    • 111 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 83 篇 安全科学与工程
    • 79 篇 仪器科学与技术
    • 78 篇 交通运输工程
    • 60 篇 建筑学
    • 58 篇 材料科学与工程(可...
    • 58 篇 动力工程及工程热...
  • 1,052 篇 理学
    • 599 篇 数学
    • 251 篇 物理学
    • 247 篇 生物学
    • 204 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 84 篇 化学
  • 584 篇 管理学
    • 321 篇 管理科学与工程(可...
    • 298 篇 图书情报与档案管...
    • 94 篇 工商管理
  • 116 篇 法学
    • 70 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 14 篇 教育学
  • 7 篇 艺术学
  • 6 篇 文学

主题

  • 151 篇 feature extracti...
  • 124 篇 semantics
  • 98 篇 accuracy
  • 96 篇 training
  • 93 篇 computational mo...
  • 92 篇 deep learning
  • 72 篇 federated learni...
  • 71 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 57 篇 authentication
  • 55 篇 protocols
  • 51 篇 security
  • 50 篇 data privacy
  • 49 篇 neural networks
  • 48 篇 object detection
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 219 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 93 篇 university of ch...
  • 80 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 information secu...
  • 62 篇 cas key laborato...
  • 62 篇 school of cyber ...
  • 58 篇 guangdong provin...
  • 52 篇 tianjin key labo...
  • 50 篇 shandong fundame...
  • 48 篇 network and data...
  • 48 篇 state key labora...
  • 46 篇 shandong enginee...
  • 46 篇 peng cheng labor...
  • 45 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 state key labora...
  • 42 篇 shandong provinc...
  • 42 篇 institute of inf...

作者

  • 97 篇 cheng xueqi
  • 47 篇 shen huawei
  • 46 篇 guo jiafeng
  • 42 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 23 篇 jin hai
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 20 篇 shen yulong

语言

  • 3,271 篇 英文
  • 187 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3534 条 记 录,以下是3441-3450 订阅
排序:
DYNAMIC DATA FLOW GRAPH-BASED SOFTWARE WATERMARKING
DYNAMIC DATA FLOW GRAPH-BASED SOFTWARE WATERMARKING
收藏 引用
2009 IEEE International Conference on network Infrastructure and Digital Content(2009年IEEE网络基础设施与数字内容国际会议 IEEE IC-NIDC2009)
作者: Xinxin Niu Zhengming Hu Bo Feng Miao Zhang Guoai Xu Information Security Center State Key Laboratory of Networking and Switching Technology Beijing Un Key Laboratory of network and information attack & defense technology of MOE Beijing University of National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Te
In this paper we indicate the concept of Dynamic Data Flow Graph based on the dynamic data dependency during execution of software. On this basis, we propose a dynamic software watermarking algorithm, which embeds wat... 详细信息
来源: 评论
A New Data Streaming Method for Locating Hosts with Large Connection Degree
A New Data Streaming Method for Locating Hosts with Large Co...
收藏 引用
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
作者: Xiaohong Guan Pinghui Wang Tao Qin MOE Key Laboratory of Intelligent Networks and Network Security State Key Laboratory of Manufacturing Systems Xi'an Jiaotong University Xi'an China Department of Automation Tsinghua National Laboratory of Information Science and Technology Tsinghua University Beijing China
Locating hosts with large connection degree is very important for monitoring anomalous network traffics. The in-degree (out-degree), defined as the number of distinct sources (destinations) that a network host is conn... 详细信息
来源: 评论
A Model of Message-Based Debugging Facilities for Web or Grid Services
A Model of Message-Based Debugging Facilities for Web or Gri...
收藏 引用
IEEE World Congress on Services (SERVICES)
作者: Qiang Yue Xiaoyi Lu Zhiguang Shan Zhiwei Xu Haiyan Yu Li Zha Key Laboratory of Network Science and Technology Institute of Computing Technology Chinese Academy and Sciences Beijing China Department of Information Technology State Information Center Peoples Republic of China Beijing China
Message-based debugging facilities for Web or Grid Services are separated from an infrastructure of source level debugging and can work in a self-identifying and coexisting mode within a normal services container. In ... 详细信息
来源: 评论
Differentiated Bandwidth Allocation for Reducing Server Load in P2P VOD
Differentiated Bandwidth Allocation for Reducing Server Load...
收藏 引用
International Conference on Grid and Cooperative computing (GCC)
作者: Zhengjun Chena Kaiping Xue Peilin Hong Hancheng Lu University of Science and Technology of China Hefei Anhui CN MOE-MS Key Laboratory of Multimedia Computing and Communication and The Information Network Laboratory of EEIS Department University of Science and Technology Hefei China The Information Network Lab of EEIS Department University of Science and Technology of China (USTC) Hefei China The Information Network Laboratory of EEIS Department University of Science and Technology Hefei China
P2P technology offers a promising scalable solution for video-on-demand (VOD) service. Recent studies have found that departure misses are the major cause of server load in P2P-based VOD. Inspired by this finding, thi... 详细信息
来源: 评论
security Analysis of Two Remote User Authentication Schemes Using Bilinear Pairings
Security Analysis of Two Remote User Authentication Schemes ...
收藏 引用
International Conference on Management of e-Commerce and e-Government, ICMECG
作者: Zuowen Tan Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou China School of Information Technology Jiangxi University of Finance and Economics Nanchang Jiangxi China State Key Laboratory of Information Security Institute of Software of Chinese Academy of Sciences Beijing China
Recently, Das et al. and Tseng et al. proposed a remote user authentication scheme using bilinear pairings, respectively. They can provide a flexible password change option to the users without any help from the remot... 详细信息
来源: 评论
On security Notions for Verifiably Encrypted Signature
On Security Notions for Verifiably Encrypted Signature
收藏 引用
The Fifth International Conference on Information Assurance and security(第五届信息保障与安全国际会议)
作者: Xiaoyuan Yang Xu an Wang Qingquan Peng Key Laboratory of Information and Network Security Engneering College of Chinese Armed Police Force University of Electronic Science and Technology of Xi'an Xidian University P.R.China
First we revisit three (BGLS, MBGLS and GZZ) verifiably encrypted signature schemes [2], [6], [9]. We find that they are all not strong unforgeable. We remark that the notion of existential unforgeable is not sufficie... 详细信息
来源: 评论
A large family of prime-phase sequences with low correlation
A large family of prime-phase sequences with low correlation
收藏 引用
International Workshop on Signal Design and Its Applications in Communications (IWSDA)
作者: Ni-Gang Sun Chang-Lu Lin Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou Fujian China Department of Computer Science and Engineering East China University of Science and Technology Shanghai China
A large family of p-phase highest coordinate sequences, where p is an odd prime, is constructed by using the highest coordinate of the generalized Kerdock codes over the ring Z pl , for l ges 3. Utilizing the local We... 详细信息
来源: 评论
Watermarking 2D Vector Maps on Spatial Topology Domain
Watermarking 2D Vector Maps on Spatial Topology Domain
收藏 引用
International Conference on Multimedia Information networking and security (MINES)
作者: Chuanjian Wang Zhiyong Peng Yuwei Peng Liang Yu Computer School Wuhan University of China China College of Information Science &Technology Shihezi University China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China
Vector maps are valuable asset of data producers. How to protect copyright of vector maps effectively using digital watermarking is a hot research issue. In this paper, geometry invariance property of spatial topologi... 详细信息
来源: 评论
An Algorithmic Aspect of Zernike Moments in the Presence of Rotation
An Algorithmic Aspect of Zernike Moments in the Presence of ...
收藏 引用
The First International Conference on Multimedia Information networking and security(第一届国际多媒体网络信息安全会议 MINES 2009)
作者: Shijun Xiang Department of Electronic Engineering School of Information Science and Technology Jinan University Guangzhou 510632 China Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China
Zernike moments are widely used in image processing fields (e.g., rotation-invariant watermarking) based on many desirable properties, such as rotational invariance, noise robust and efficient representation of patter... 详细信息
来源: 评论
Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP
Research on Man-in-the-Middle Denial of Service Attack in SI...
收藏 引用
International Conference on networks security, Wireless Communications and Trusted computing, NSWCTC
作者: Zhe Chen Shize Guo Kangfeng Zheng Haitao Li Key Laboratory of network and information attack & defence technology of MOE National Engineering Laboratory of Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China Information Security Center State Key Laboratory of Networking and Switching Technology National Engineering Laboratory of Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
As the number of VoIP users increase and as the deployment of SIP devices gains ground, security has risen as a potential issue worthy of our consideration. VoIP is an application running on the data network and as su... 详细信息
来源: 评论