咨询与建议

限定检索结果

文献类型

  • 2,836 篇 会议
  • 2,409 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,531 篇 工学
    • 2,657 篇 计算机科学与技术...
    • 2,109 篇 软件工程
    • 959 篇 信息与通信工程
    • 503 篇 电气工程
    • 385 篇 控制科学与工程
    • 384 篇 电子科学与技术(可...
    • 307 篇 网络空间安全
    • 301 篇 生物工程
    • 200 篇 机械工程
    • 161 篇 光学工程
    • 143 篇 仪器科学与技术
    • 126 篇 生物医学工程(可授...
    • 104 篇 动力工程及工程热...
    • 101 篇 交通运输工程
    • 101 篇 安全科学与工程
    • 98 篇 化学工程与技术
    • 83 篇 建筑学
    • 76 篇 土木工程
  • 1,518 篇 理学
    • 913 篇 数学
    • 333 篇 物理学
    • 324 篇 生物学
    • 279 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 110 篇 化学
  • 916 篇 管理学
    • 552 篇 管理科学与工程(可...
    • 398 篇 图书情报与档案管...
    • 181 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 109 篇 医学
    • 90 篇 临床医学
    • 78 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 62 篇 经济学
  • 31 篇 农学
  • 26 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 188 篇 feature extracti...
  • 161 篇 semantics
  • 140 篇 accuracy
  • 128 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 105 篇 security
  • 104 篇 authentication
  • 104 篇 federated learni...
  • 98 篇 privacy
  • 96 篇 deep learning
  • 94 篇 information secu...
  • 92 篇 protocols
  • 81 篇 data models
  • 71 篇 cloud computing
  • 70 篇 robustness
  • 66 篇 object detection
  • 66 篇 machine learning
  • 65 篇 neural networks
  • 64 篇 optimization

机构

  • 263 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 162 篇 school of comput...
  • 141 篇 school of comput...
  • 119 篇 school of cyber ...
  • 84 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 53 篇 peng cheng labor...
  • 53 篇 information secu...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 51 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 47 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 40 篇 cao xiaochun
  • 37 篇 huang qingming
  • 36 篇 yang yang
  • 35 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 26 篇 xiaoyuan yang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,280 篇 英文
  • 844 篇 其他
  • 147 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5248 条 记 录,以下是4871-4880 订阅
排序:
Bundle transport model of satellite delay tolerant networks
Bundle transport model of satellite delay tolerant networks
收藏 引用
International Conference on Future computer and Communication, ICFCC
作者: Haizheng Yu Jianfeng Ma Hong Bian Key Laboratory of Computer Network and Information Security Xidian University Xi'an China School of Mathematical Sciences Xinjiang Normal University Urumqi China
The data is transmitted between a small satellite near earth and the ground stations. For transmitting reliably, the data is divided into many fragments, and these fragments are encapsulated as multiple bundles with t... 详细信息
来源: 评论
Constructions of Maiorana-McFarland's Bent Functions of Prescribed Degree
Constructions of Maiorana-McFarland's Bent Functions of Pres...
收藏 引用
International Conference on Computational Intelligence and security
作者: Feng-rong Zhang Yu-pu Hu Hua Ma Min Xie Key laboratory of computer network and information security Ministry of Education Xidian University Xi'an China School of science Xidian University Xi'an China
A Boolean function with an even number n = 2k of variables is called Bent if it is maximally nonlinear. A technique on constructing Maiorana-McFarland's Bent functions of arbitrary degree is described. Based on th... 详细信息
来源: 评论
Integrity Measurement Model Based on Trusted Virtual Platform
Integrity Measurement Model Based on Trusted Virtual Platfor...
收藏 引用
International Conference on Genetic and Evolutionary Computing (ICGEC)
作者: Gang Qiu Yulei Wang Lihua Zhou Ministry of Education Key Laboratory of Computer Network & Information Security Xidian University Xi'an China Network Information Center Nanyang Institute of Technology Nanyang China School of Computer Science and Technology Xidian University Xi'an China
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to as... 详细信息
来源: 评论
On the security model for proxy re-encryption
收藏 引用
Journal of information and Computational Science 2010年 第9期7卷 1951-1958页
作者: Wang, Xu'an Yang, Xiaoyuan Zhang, Minqing Du, Xiaoni Key Laboratory of Information and Network Security Engineering College of Chinese Armed Police Force Xi'an 710086 China State Key Laboratory of Information Security Graduate University of Chinese Acad. of Sci. Beijing 100039 China College of Mathematics and Information Science Northwest Normal University Lanzhou 730070 China
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one which can be decrypted by Bob, without the proxy knowing the corresponding plaintext. Many kinds of ... 详细信息
来源: 评论
Hybrid Quasi-3D DWT/DCT and SVD Video Watermarking
Hybrid Quasi-3D DWT/DCT and SVD Video Watermarking
收藏 引用
2010 IEEE International Conference on Sofetware engineering and Service Sciences(2010 软件工程与服务科学国际学术会议 ICSESS)
作者: Ke Niu Xiaoyuan Yang Li Xiang Key Laboratory of Network & Information Security under the Chinese Armed Police Force Engineering College of the Armed Police Force Xi'an China
A video watermarking robust algorithm based SVD is proposed. In order to analyze both the spatial and temporal characters of video sequence, each frame of the video is transformed to wavelet domain by 2-D DWT, and the... 详细信息
来源: 评论
Bargaining Game and Cross-layer Design Based Optimization Strategy in Wireless Multi-hop network
Bargaining Game and Cross-layer Design Based Optimization St...
收藏 引用
International Conference on computer and information Technology (CIT)
作者: Xinyu Chen Li Xu Jie Li Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China School of System and Information Engineering University of Tsukuba Japan
The resource utility and network throughput are both the key challenges in wireless multi-hop network. In this paper, by introducing the idea of cross-layer design and its cooperative mechanism, a multi-constrained op... 详细信息
来源: 评论
Toward Constant Size CCA-secure Multi-hop Proxy Re-encryption
Toward Constant Size CCA-secure Multi-hop Proxy Re-encryptio...
收藏 引用
2010 2nd International Conference on Signal Processing System(2010年信号处理系统国际会议 ICSPS 2010)
作者: Junru Hu Xu An Wang Minqing Zhang Key Laboratory of Information and Network Security Engineering College of Chinese Armed Police Force. P. R. China
Blaze et *** 1998 introduced the concept of proxy re-encryption, which allows a proxy to transform a ciphertext computed under Alice's pubLic key into one that can be opened under Bob's decryption key. Bu... 详细信息
来源: 评论
Enhancing fairness: A novel C2C e-commerce community member reputation algorithm based on transaction social networks
Enhancing fairness: A novel C2C e-commerce community member ...
收藏 引用
IADIS International Conference WWW/Internet 2010
作者: Feng, Wangsen Zhang, Bei Xia, Yunni Li, Jiajing Meng, Tao Key Laboratory of Network and Software Security Assurance of Ministry of Education Computing Center Peking University Beijing 100871 China College of Computer Science Chongqing University Chongqing 400044 China School of Mechanical Electronic and Information Engineering China University of Mining and Technology Beijing 100083 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Today, almost all the C2C e-commerce community member reputation evaluating algorithms are time sensitive. The reputation of a community member is accumulated after transactions and the increment of reputation after a... 详细信息
来源: 评论
Search Using Semantic Inference in Unstructured P2P networks
Search Using Semantic Inference in Unstructured P2P Networks
收藏 引用
International Conference on Computational Intelligence and Software engineering (CiSE)
作者: Ning Qian Guoxin Wu Key Laboratory of Computer Network and Information Integration Ministry of Education School of Computer Science and Engineering South-East University Nanjing China
Peer-to-Peer networks develop rapidly in the last few years. The search algorithm lies at the centre of these networks. Many search methods have been proposed for unstructured peer-to-peer networks, but complicated or... 详细信息
来源: 评论
A robust and secure overlay storage scheme based on erasure coding
A robust and secure overlay storage scheme based on erasure ...
收藏 引用
International Conference on Pervasive Computing and Applications (ICPCA)
作者: Chuanyou Li Yun Wang School of Computer Science and Engineering Ministry of Education Key Laboratory of Computer Network and Information Integration South-East University Nanjing China
Recently, in classical P2P overlay networks, with applying replication technique, a single peer is replaced by a cluster of peers in order to tolerant Byzantine failures. In this paper, a novel robust and secure schem... 详细信息
来源: 评论