咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,365 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,454 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 904 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 278 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 186 篇 feature extracti...
  • 161 篇 semantics
  • 137 篇 accuracy
  • 127 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 91 篇 protocols
  • 79 篇 data models
  • 71 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 258 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 160 篇 school of comput...
  • 141 篇 school of comput...
  • 117 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 39 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 36 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,423 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5177 条 记 录,以下是4921-4930 订阅
排序:
On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature
On DDos Attack against Proxy in Proxy Re-encryption and Prox...
收藏 引用
International Conference on computer and information Technology (CIT)
作者: Xu an Wang Xiaoyuan Yang Key Laboratory of Information and Network Security Engineering College of Chinese Armed Police Force Xi'an China
In 1998, Blaze, Bleumer and Strauss proposed new kind of cryptographic primitives called proxy re-encryption and proxy re-signature. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice'... 详细信息
来源: 评论
An IND-CCA2 Secure key-Policy Attribute Based key Encapsulation Scheme
An IND-CCA2 Secure Key-Policy Attribute Based Key Encapsulat...
收藏 引用
The First International Conference on Multimedia information networking and security(第一届国际多媒体网络信息安全会议 MINES 2009)
作者: Changji Wang Yang Liu Jung-Tae Kim School of Information Science and Technology Guangdong Province Information Security Key Laboratory Department of Electronic Engineering Network & Information Security Lab Mokwon University Taejon 30
Attribute based encryption has become an active topic within the last few years, which can be regarded as a special identity based encryption integrated with flexible access structure. In this paper, we extend the con... 详细信息
来源: 评论
Policy-driven autonomic network resource management for observation and detection data communication
Policy-driven autonomic network resource management for obse...
收藏 引用
2009 International Conference on High Performance Computing, networking and Communication Systems, HPCNCS 2009
作者: Feng, Jing Ma, Weijun Liu, Dawei Yu, Xiaoxing Institute of Meteorology PLA University of Science and Technology Nanjing 211101 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing 210096 China School of Information Science and Engineering Southeast University Nanjing 210096 China
The increase of the business and management complexity requires more adaptive and higher selfmanaged equipments, application processes and management systems, which promotes the development of autonomic computing and ... 详细信息
来源: 评论
Customer behavior pattern discovering based on mixed data clustering
Customer behavior pattern discovering based on mixed data cl...
收藏 引用
2009 International Conference on Computational Intelligence and Software engineering, CiSE 2009
作者: Cheng, Mingzhi Xin, Yang Tian, Yangge Wang, Cong Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defence Technology Ministry of Education Beijing University of Posts and Telecommunications China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China International School of Software Wuhan University Wuhan China
To be effective to retain customers and enhance the marketing capabilities, it is necessary to improve the personalization of e-commerce systems. Clustering is a reliable and efficient technology to provide personal s... 详细信息
来源: 评论
Approach to extracting hot topics based on network traffic content
收藏 引用
Frontiers of Electrical and Electronic engineering in China 2009年 第1期4卷 20-23页
作者: Yadong ZHOU Xiaohong GUAN Qindong SUN Wei LI Jing TAO MOE Key Lab for Intelligent Networks and Network Security State Key Lab for Manufacturing SystemsXi’an Jiaotong UniversityXi’an 710049China Department of Automation Tsinghua National Lab for Information Science and TechnologyTsinghua UniversityBeijing 100084China School of Computer Science and Engineering Xi’an University of TechnologyXi’an 710048China
This article presents the formal definition and description of popular topics on the Internet,analyzes the relationship between popular words and topics,and finally introduces a method that uses statistics and correla... 详细信息
来源: 评论
Boundary recognition in sensor networks by building relative contours
Boundary recognition in sensor networks by building relative...
收藏 引用
Conference on Local computer networks (LCN)
作者: Kai Li Yun Wang School of Computer Science & Engineering Key Laboratory of Computer Network and Information MOE South-East University Nanjing China
Wireless sensor networks (WSN) are affected by underlying environments in which sensors are deployed randomly. Inevitably, there are many irregular holes in a WSN because of the existence of obstacles or the death of ... 详细信息
来源: 评论
Towards a Source-Code Oriented Attestation
收藏 引用
China Communications 2009年 第4期6卷 82-87页
作者: Ruan Anbang Shen Qingni Wang Li Qin Chao Gu Liang Chen Zhong School of Software and Microelectronics Peking University Beijing 102600 China Network and Information Security Laboratory Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of High Confidence Software Technologies of the Ministry of Education Peking University Beijing 100871 China First Research Institute of Ministry of Public Security of China Beijing 100048 China
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports ... 详细信息
来源: 评论
Ideal Perfect Multilevel Threshold Secret Sharing Scheme
Ideal Perfect Multilevel Threshold Secret Sharing Scheme
收藏 引用
The Fifth International Conference on information Assurance and security(第五届信息保障与安全国际会议)
作者: Changlu Lin Lein Harn Dingfeng Ye Key Laboratory of Network Security and Cryptology Fujian Normal University China State Key Laborat Department of Computer Science Electrical Engineering University of Missouri-Kansas CityUSA State Key Laboratory of Information Security Graduate University of Chinese Academy of SciencesChin
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,... 详细信息
来源: 评论
A New Routing Scheme Based on Greedy Tree in Delay Tolerant networks
A New Routing Scheme Based on Greedy Tree in Delay Tolerant ...
收藏 引用
IEEE International Symposium on computer network and Multimedia Technology, CNMT
作者: Haizheng Yu Jianfeng Ma Hong Bian Key Laboratory of Computer Network and Information Security Xidian University Xi'an China School of Maths-physics and Information Sciences Xinjiang Normal University Urumqi China
Delay tolerant networking (DTN) is a new store-and-forward architecture and protocol suite for the networks which is intermittent connectivity. Depending on the nodes ability of store and forward, the messages are del... 详细信息
来源: 评论
A NEW CREDENTIAL ROUTING MODEL BASED ON TRUST THEORY
A NEW CREDENTIAL ROUTING MODEL BASED ON TRUST THEORY
收藏 引用
2009 IEEE International Conference on network Infrastructure and Digital Content(2009年IEEE网络基础设施与数字内容国际会议 IEEE IC-NIDC2009)
作者: Daofeng Li Lize Gu Bin Sun Xinxin Niu Yixian Yang Information Security Center State Key Laboratory of Networking and Switching Technology Key Laboratory of network and information attack & defense technology of MOE National Engineering Laboratory for Disaster Backup and RecoveryBeijing University of Po
Router has acted as more and more important role in the large-scale network. In the meantime, the security of the router become more seriously. In this paper, we propose a new algorithm to decide a credential routing ... 详细信息
来源: 评论