咨询与建议

限定检索结果

文献类型

  • 2,101 篇 会议
  • 1,612 篇 期刊文献

馆藏范围

  • 3,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,413 篇 工学
    • 1,834 篇 计算机科学与技术...
    • 1,467 篇 软件工程
    • 603 篇 信息与通信工程
    • 346 篇 电气工程
    • 275 篇 控制科学与工程
    • 240 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 182 篇 网络空间安全
    • 141 篇 机械工程
    • 113 篇 光学工程
    • 94 篇 生物医学工程(可授...
    • 94 篇 安全科学与工程
    • 89 篇 交通运输工程
    • 88 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 66 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,089 篇 理学
    • 623 篇 数学
    • 263 篇 物理学
    • 250 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 90 篇 化学
  • 606 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 306 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 125 篇 accuracy
  • 109 篇 training
  • 106 篇 computational mo...
  • 102 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 72 篇 data models
  • 68 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 59 篇 data privacy
  • 59 篇 robustness
  • 58 篇 protocols
  • 53 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 optimization

机构

  • 271 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 97 篇 university of ch...
  • 83 篇 school of comput...
  • 83 篇 key laboratory o...
  • 66 篇 school of cyber ...
  • 65 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 60 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 52 篇 tianjin key labo...
  • 50 篇 network and data...
  • 50 篇 shandong fundame...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 institute of inf...

作者

  • 100 篇 cheng xueqi
  • 49 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 wang yichuan
  • 20 篇 yang zhiyong

语言

  • 2,977 篇 英文
  • 661 篇 其他
  • 87 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3713 条 记 录,以下是3631-3640 订阅
排序:
An improved algorithm for IP alias resolution in network topology measurement
An improved algorithm for IP alias resolution in network top...
收藏 引用
9th International Conference on Electronic Measurement and Instruments, ICEMI 2009
作者: Yong, Zhang Shize, Guo Kangfeng, Zheng Yixian, Yang Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
Internet topology measurement is an important part of network measurement. Nowadays, traceroute probing method is widely used to obtain the original route data, and the IP alias resolution technique is to identify IP ... 详细信息
来源: 评论
D-S Evidence Theory Based Digital Image Trustworthiness Evaluation Model
D-S Evidence Theory Based Digital Image Trustworthiness Eval...
收藏 引用
International Conference on Multimedia Information networking and security (MINES)
作者: Donghui Hu Lina Wang Yu Zhou Yang Zhou Xiaqiu Jiang Longfei Ma School of Computer Science and Information Hefei University of Technology Hefei China School of Computer Science Wuhan University of China Wuhan Hubei China The Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wuhan Hubei China
Digital images are facing trustworthy crisis with the emergence of various digital image process tools and steganography tools. Current digital image forensic methods can not evaluate the digital image's trustwort... 详细信息
来源: 评论
Robust Perceptual Image Hash Using Gabor Filters
Robust Perceptual Image Hash Using Gabor Filters
收藏 引用
International Conference on Multimedia Information networking and security (MINES)
作者: Lina Wang Xiaqiu Jiang Donghui Hu Dengpan Ye Shiguo Lian School of Computer Science Wuhan University of China Wuhan China The Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wuhan China School of Computer Science and Information Hefei University of Technology Hefei China HCI Laboratory France Telecom Research and Development Center (Beijing) Beijing China
In order to design the image hash from human being's view, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human's primary visual cort... 详细信息
来源: 评论
Fuzzy analytic hierarchy process-based utilities evaluation and adoption for DRM security policies
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第1 A期30卷 126-131页
作者: Zhang, Zhi-Yong Ye, Chuan-Qi Fan, Ke-Feng Zhang, Li-Li Niu, Dan-Mei Electronics Information Engineering College Henan University of Science and Technology Luoyang 471003 China Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China Information Security Center for the State Key Laboratory of Network and Exchange Beijing Post and Telecom University Beijing 100158 China
The utility evaluation of DRM security policies based on fuzzy analytic hierarchy process (FAHP) and their game-theoretic adoptions were proposed from a novel perspective of the different level security and utilities&... 详细信息
来源: 评论
Detection of drive-by downloads based on dynamic page views
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2009年 第SUPPL. 2期49卷 2126-2132页
作者: Zhang, Huilin Zhuge, Jianwei Song, Chengyu Han, Xinhui Zou, Wei Institute of Computer Science and Technology Peking University Beijing 100871 China Key Laboratory of Network and Software Security Assurance of Ministry of Education Peking University Beijing 100871 China
A dynamic page view based drive-by download detection method was developed to address the challenge hidden drive-by downloads which abuse inline linking dynamics creation and obfuscation. The method uses a script engi... 详细信息
来源: 评论
Dynamic evolution model of short message complex network
收藏 引用
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University 2009年 第6期43卷 5-9页
作者: Sun, Qindong Sun, Yahong Guan, Xiaohong Wang, Qian School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China MOE Key Laboratory for Intelligent and Network Security Xi'an Jiaotong University Xi'an 710049 China
The law of SMS (short message service) network growth is analyzed to understand the evolution of SMS communication network, and the deficiencies of existing complex network models that are used to describe real SMS ne... 详细信息
来源: 评论
Cryptanalysis of a Type of CRT-Based RSA Algorithms
收藏 引用
Journal of Computer Science & technology 2008年 第2期23卷 214-221页
作者: 秦宝东 李明 孔凡玉 College of Computer Science and Technology Southwest University of Science and TechnologyMianyang 621010China Institute of Network Security Shandong UniversityJinan 250100China Key Laboratory of Cryptographic Technology and Information SecurityJinan 250100China
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is ca... 详细信息
来源: 评论
security and trust in digital rights management: A survey
收藏 引用
International Journal of network security 2009年 第3期9卷 247-263页
作者: Zhang, Zhiyong Pei, Qingqi Ma, Jianfeng Yang, Lin Ministry Of Education Key Laboratory of Computer Network and Information Security Xidian University Taibai South Road No.2 Xi'an Shannxi 710071 China Electronic Information Engineering College Henan University of Science and Technology Xiyuan Road No.48 Luoyang Henan 471003 China The Research Institute China Electronic Equipment and Systems Engineering Corporation Dacheng Road 13 Beijing 100141 China
A successful transaction of digital contents is primarily dependent on security policies, trust relationships and benefit equilibriums among various participants in a DRM (Digital Rights Management)-enabling contents ... 详细信息
来源: 评论
New method for interactive TCP traffic replay based on balance-checking between transmitted and received packets
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2009年 第4期32卷 835-846页
作者: Chu, Wei-Bo Cai, Zhong-Min Guan, Xiao-Hong Chen, Ming-Xu MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an 710049 China State Key Laboratory for Manufacturing Systems Xi'an Jiaotong University Xi'an 710049 China Tsinghua National Laboratory for Information Science and Technology Department of Automation Tsinghua University Beijing 100084 China
Interactive network traffic replay is the newest method for testing and evaluation of network devices such as Firewalls, IPSes, routers, switches, etc. Currently state-checking method is used for interactive TCP traff... 详细信息
来源: 评论
Novel evidence combination method based on proportional conjunctive and complementary pooling criterion
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2009年 第1期37卷 95-100页
作者: Lang, Feng-Hua Gu, Li-Ze Yang, Yi-Xian Niu, Xin-Xin Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
To solve the drawbacks of Dempster rule and improved rule of combination, a novel evidence combination method based on proportional conjunctive and complementary pooling criterion was presented. Firstly, the advantage... 详细信息
来源: 评论