咨询与建议

限定检索结果

文献类型

  • 769 篇 会议
  • 510 篇 期刊文献

馆藏范围

  • 1,279 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 836 篇 工学
    • 626 篇 计算机科学与技术...
    • 485 篇 软件工程
    • 221 篇 信息与通信工程
    • 140 篇 电气工程
    • 100 篇 电子科学与技术(可...
    • 92 篇 网络空间安全
    • 84 篇 控制科学与工程
    • 58 篇 生物工程
    • 48 篇 机械工程
    • 29 篇 动力工程及工程热...
    • 26 篇 仪器科学与技术
    • 26 篇 建筑学
    • 25 篇 安全科学与工程
    • 24 篇 交通运输工程
    • 21 篇 光学工程
    • 20 篇 土木工程
    • 20 篇 航空宇航科学与技...
    • 20 篇 生物医学工程(可授...
  • 328 篇 理学
    • 212 篇 数学
    • 73 篇 统计学(可授理学、...
    • 62 篇 生物学
    • 56 篇 物理学
    • 39 篇 系统科学
  • 196 篇 管理学
    • 130 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 48 篇 法学
    • 26 篇 法学
    • 22 篇 社会学
  • 29 篇 医学
    • 23 篇 临床医学
    • 20 篇 基础医学(可授医学...
  • 20 篇 军事学
  • 13 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 49 篇 cryptography
  • 42 篇 authentication
  • 39 篇 feature extracti...
  • 38 篇 accuracy
  • 36 篇 protocols
  • 35 篇 semantics
  • 34 篇 information secu...
  • 34 篇 security
  • 33 篇 public key crypt...
  • 32 篇 simulation
  • 28 篇 deep learning
  • 28 篇 computational mo...
  • 26 篇 privacy
  • 25 篇 federated learni...
  • 24 篇 internet of thin...
  • 24 篇 training
  • 22 篇 laboratories
  • 20 篇 robustness
  • 19 篇 steganography
  • 18 篇 wireless communi...

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 35 篇 information secu...
  • 31 篇 school of cyber ...
  • 29 篇 state key labora...
  • 27 篇 institute of inf...
  • 21 篇 national enginee...
  • 21 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 18 篇 college of compu...
  • 18 篇 shandong fundame...
  • 17 篇 xi'an university...
  • 16 篇 network and data...
  • 16 篇 key laboratory o...
  • 16 篇 shaanxi key labo...
  • 14 篇 key laboratory o...
  • 14 篇 shaanxi key labo...
  • 13 篇 key laboratory o...

作者

  • 45 篇 yang xiaoyuan
  • 41 篇 xiaoyuan yang
  • 29 篇 xu an wang
  • 27 篇 zhang minqing
  • 24 篇 wang hui-ming
  • 23 篇 wang xu an
  • 20 篇 ye yinghui
  • 18 篇 yang yixian
  • 18 篇 minqing zhang
  • 17 篇 yiliang han
  • 16 篇 yixian yang
  • 15 篇 han yiliang
  • 15 篇 jing zhao
  • 15 篇 lu guangyue
  • 14 篇 ping wei
  • 14 篇 liu jia
  • 12 篇 ding yi
  • 12 篇 zhenyu yang
  • 12 篇 xuanwu zhou
  • 12 篇 zhao dongmei

语言

  • 1,125 篇 英文
  • 126 篇 其他
  • 31 篇 中文
检索条件"机构=Key Laboratory of Network and Information Security of PAP Engineering"
1279 条 记 录,以下是31-40 订阅
排序:
NDFuzz:a non-intrusive coverage-guided fuzzing framework for virtualized network devices
收藏 引用
Cybersecurity 2023年 第1期6卷 54-74页
作者: Yu Zhang Nanyu Zhong Wei You Yanyan Zou Kunpeng Jian Jiahuan Xu Jian Sun Baoxu Liu Wei Huo Institute of Information Engineering Chinese Academy of SciencesBejingChina School of Cyber Security University of Chinese Academy of SciencesBejingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Renmin University of China BeijingChina
network function virtualization provides programmable in-network middlewares by leveraging virtualization tech-nologies and commodity hardware and has gained popularity among all mainstream network device *** it is ch... 详细信息
来源: 评论
Reversible Data Hiding in Encrypted Images based on Classic McEliece Cryptosystem
Reversible Data Hiding in Encrypted Images based on Classic ...
收藏 引用
Image Processing, Computer Vision and Machine Learning (ICICML), International Conference on
作者: Zongbao Jiang Minqing Zhang Fuqiang Di Weina Dong Key Laboratory of Network and Information Security of PAP Engineering University of PAP Xi’an China
Aiming at the problems that the security of traditional data hiding algorithms is difficult to be guaranteed and the existing algorithms’ embedded volume is restricted under quantum operation attacks, a reversible da...
来源: 评论
Reversible Data Hiding Algorithm in Encrypted Domain Based on Matrix Secret Sharing
Reversible Data Hiding Algorithm in Encrypted Domain Based o...
收藏 引用
Electronics and Communication, network and Computer Technology (ECNCT), International Conference on
作者: Zongbao Jiang Minqing Zhang Yan Ke Chao Jiang Key Laboratory of Network and Information Security of PAP Engineering University of PAP Xi 'an China
Focused on the problems of user privacy disclosure and ciphertext data management in cloud service environment, this paper proposes a reversible data hiding algorithm in encrypted domain based on matrix secret sharing...
来源: 评论
Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware  24
Semantic-Enhanced Static Vulnerability Detection in Baseband...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Liu, Yiming Zhang, Cen Li, Feng Li, Yeting Zhou, Jianhua Wang, Jian Zhan, Lanlan Liu, Yang Huo, Wei Institute of Information Engineering Cas School of Cyber Security Ucas Beijing China Key Laboratory of Network Assessment Technology Cas China Beijing Key Laboratory of Network Security and Protection Technology China Nanyang Technological University Singapore
Cellular network is the infrastructure of mobile communication. Baseband firmware, which carries the implementation of cellular network, has critical security impact on its vulnerabilities. To handle the inherent comp... 详细信息
来源: 评论
A New High-Capacity Robust Image Steganography Method via Adversarial network
A New High-Capacity Robust Image Steganography Method via Ad...
收藏 引用
Science and Technology Innovation (IAECST), International Academic Exchange Conference on
作者: Weina Dong Zongbao Jiang Lifeng Chen Wenquan Sun Key Laboratory of Network and Information Security of PAP Engineering University of PAP Xi’an Shaanxi China
Aiming at the problem that the high-capacity steganography model based on encoding-decoding network had weak robustness and could not resist noise attack and channel compression, an improved high-capacity robust image...
来源: 评论
Multi-class Bitcoin mixing service identification based on graph classification
收藏 引用
Digital Communications and networks 2024年 第6期10卷 1881-1893页
作者: Xiaoyan Hu Meiqun Gui Guang Cheng Ruidong Li Hua Wu School of Cyber Science&Engineering Southeast UniversityNanjing 211189China Purple Mountain Laboratories for Network and Communication Security Nanjing 211111China Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network Nanjing 211189China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationChina Research Base of International Cyberspace Governance Southeast UniversityNanjing 211189China Institute of Science and Engineering Kanazawa UniversityKakumaKanazawa920-1192Japan
Due to its anonymity and decentralization,Bitcoin has long been a haven for various illegal *** generally legalize illicit funds by Bitcoin mixing ***,it is critical to investigate the mixing services in cryptocurrenc... 详细信息
来源: 评论
Blockchain E-voting Scheme Based on SM9 Partial Blind Signature  4
Blockchain E-voting Scheme Based on SM9 Partial Blind Signat...
收藏 引用
4th International Conference on Computer information Science and Artificial Intelligence, CISAI 2021
作者: Yin, Dongqing Zhang, Mingshu Wei, Bin University of the PAP Key Laboratory for Network and Information Security of the PAP Engineering Xi'an China
Aiming at the problems of user privacy leakage, digital signature denial and tracking in the current digital signature electronic voting system, a blockchain electronic voting scheme based on SM9 partial blind signatu... 详细信息
来源: 评论
Optimization of Encrypted Communication Model Based on Generative Adversarial network
Optimization of Encrypted Communication Model Based on Gener...
收藏 引用
2022 International Conference on Blockchain Technology and information security, ICBCTIS 2022
作者: Duan, Xiaowei Han, Yiliang Wang, Chao Ni, Huanhuan College of Cryptographic Engineering Engineering University of Pap Xi'an China Key Laboratory of Pap for Cryptology and Information Security Xi'an China
With the progress of cryptography computer science, designing cryptographic algorithms using deep learning is a very innovative research direction. Google Brain designed a communication model using generation adversar... 详细信息
来源: 评论
Global Importance Analysis of Nodes Based on Complex network Theory  3
Global Importance Analysis of Nodes Based on Complex Network...
收藏 引用
2022 3rd International Conference on Electrical, Electronic information and Communication engineering, EEICE 2022
作者: Lin, Shengnan Li, Shuai Su, Yang College of Cryptographic Engineering Engineering University of PAP Xi'an710086 China Key Laboratory of Network and Information Security under the Armed Police Force Engineering University of PAP Xi'an710086 China
Aiming at the effectiveness of global importance index of nodes in directed network, according to complex network theory, using degree index, intermediate centrality index, proximity centrality index and PageRank algo... 详细信息
来源: 评论
Design and Implementation of Voting System Based on Ethereum
Design and Implementation of Voting System Based on Ethereum
收藏 引用
2021 International Conference on Intelligent Computing, Automation and Applications, ICAA 2021
作者: Yin, Dongqing Zhang, Mingshu Wei, Bin Lin, Wenbing Engineering University of the PAP Key Laboratory for Network and Information Security of the PAP Xi'an710086 China
Electronic voting can greatly reduce the cost of voting activities and solve many problems of voting information leakage caused by traditional paper voting. As the development and extension of blockchain technology, E... 详细信息
来源: 评论