咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,365 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,454 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 904 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 278 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 186 篇 feature extracti...
  • 161 篇 semantics
  • 137 篇 accuracy
  • 127 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 91 篇 protocols
  • 79 篇 data models
  • 71 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 258 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 160 篇 school of comput...
  • 141 篇 school of comput...
  • 117 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 39 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 36 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,423 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5177 条 记 录,以下是4911-4920 订阅
排序:
Audio Digital Signature Algorithm with Tamper Detection
Audio Digital Signature Algorithm with Tamper Detection
收藏 引用
The Fifth International Conference on information Assurance and security(第五届信息保障与安全国际会议)
作者: Xiaoyuan Yang Xiang Wu Minqing Zhang Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'anChian
An audio digital signature algorithm based on Principal Component Analysis (PCA) was presented. Wavelet packet decomposition was implemented to audio files, all the terminal coefficients of the wavelet packet decompos... 详细信息
来源: 评论
Hyper-elliptic Curves Based Ring Signature
Hyper-elliptic Curves Based Ring Signature
收藏 引用
International Symposium on Intelligent information Technology Application, IITA
作者: Xuanwu Zhou Key Laboratory of Network & Information Security of the APF Engineering College APF Xi'an China
Ring signature has prominent superiorities in group managing and system efficiency compared with other group cryptosystem, such as group signature. Combining HCC (Hyper-elliptic Curves Cryptosystem) and ring signature... 详细信息
来源: 评论
Bionic Evolution Based Electronic Cash Scheme
Bionic Evolution Based Electronic Cash Scheme
收藏 引用
International Symposium on Intelligent information Technology Application, IITA
作者: Xuanwu Zhou Key Laboratory of Network & Information Security of the APF Engineering College APF Xi'an China
Combining bionic evolution and e-cash (electronic cash), we present an improved e-cash scheme based on bionic evolution algorithm. In the scheme, the private key for e-cash generating and identity tracing is generated... 详细信息
来源: 评论
Extracting real-life log with data perspective in PLM system for business process analysis
Extracting real-life log with data perspective in PLM system...
收藏 引用
2009 WRI World Congress on computer Science and information engineering, CSIE 2009
作者: Wang, Zhaoxia Wang, Jianmin Wen, Lijie Liu, Yingbo Department of Computer Science Tsinghua University Beijing China School of Software Tsinghua University Beijing China Key Laboratory for Information System Security Ministry of Education Logistical Engineering University Chongqing China Department of Logistical Information Engineering Logistical Engineering University Chongqing China
Event log is the important starting point of any process analysis technique. Existent business process analysis techniques are applied mainly to manual or simulated logs, considering mainly information about control p... 详细信息
来源: 评论
Fast public-key encryption scheme based on Chinese remainder theorem
收藏 引用
中国高等学校学术文摘·电气与电子工程 2009年 第2期4卷 181-185页
作者: Baocang WANG Yongzhuang WEI Yupu HU Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Information and Communication Guilin University of Electronic Technology Guilin 541004 China School of Telecommunication Engineering Xidian University Xi'an 710071 China
Traditional public-key cryptosystems suffer from a relatively low encryption/decryption speed, which hampers their applications in resource-constrained environments. A fast public-key cryptosystem is proposed to remed... 详细信息
来源: 评论
Universal Image Steganalysis Based on Wavelet Packet Decomposition and Empirical Transition Matrix in Wavelet Domain
Universal Image Steganalysis Based on Wavelet Packet Decompo...
收藏 引用
2009 International Forum on computer Science-Technology and Applications(2009年国际计算机科学技术与应用论坛 IFCSTA 2009)
作者: Xiaoyuan Yang Yu Lei Xiaozhong Pan Jia Liu Network and Information Security Key Laboratory Electronics Department of Engineering College of the APF Xi'an China
In the paper, a new universal image steganalysis system based on wavelet packet decomposition (WPD) and empirical transition matrix in wavelet domain is proposed. First, it decomposes the test image using two-leve... 详细信息
来源: 评论
Proxy re-encryption scheme based on BB2 identity based encryption
Proxy re-encryption scheme based on BB2 identity based encry...
收藏 引用
International Conference on computer Science and information Technology (CSIT)
作者: Xiaoyuan Yang Xu an Wang Key Laboratory of Information and Network Security Engineering College of Chinese Armed Police Force China
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice's public key into one tha... 详细信息
来源: 评论
Proxy Re-encryption Scheme Based on SK Identity Based Encryption
Proxy Re-encryption Scheme Based on SK Identity Based Encryp...
收藏 引用
International Symposium on information Assurance and security (IAS)
作者: Xu An Wang Xiaoyuan Yang Engineering College of Chinese Armed Police Force Key Laboratory of Information and Network Security China
The concept of proxy re-cryptography comes from the work of Blaze, Bleumer, and Strauss in 1998. The goal of proxy re-encryption is to securely enable the re-encryption of ciphertexts from one key to another, without ... 详细信息
来源: 评论
Improved EMD steganography with great embedding rate and high embedding efficiency
Improved EMD steganography with great embedding rate and hig...
收藏 引用
IIH-MSP 2009 - 2009 5th International Conference on Intelligent information Hiding and Multimedia Signal Processing
作者: Qu, Zhiguo Fu, Yu Niu, Xinxin Yang, Yixian Zhang, Ru Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
EMD steganographic method by exploiting modification direction in the host images to send secret messages was proposed by Zhang et al. Comparing with other steganographic algorithms, its highlight is high embedding ef... 详细信息
来源: 评论
A model for real-time simulation of large-scale networks based on network processor
A model for real-time simulation of large-scale networks bas...
收藏 引用
2009 2nd IEEE International Conference on Broadband network and Multimedia Technology, IEEE IC-BNMT2009
作者: Xiaobo, Xu Kangfeng, Zheng Yixian, Yang Guoai, Xu Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Real-time network simulation refers to simulating computer networks in real time so that the virtual network can interact with real implementations of network protocols, network services, and distributed applications.... 详细信息
来源: 评论