咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,358 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,170 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,455 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 905 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 279 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 188 篇 feature extracti...
  • 161 篇 semantics
  • 139 篇 accuracy
  • 131 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 92 篇 protocols
  • 79 篇 data models
  • 72 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 259 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 161 篇 state key labora...
  • 160 篇 school of comput...
  • 144 篇 school of comput...
  • 118 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 81 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 48 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 45 篇 college of compu...
  • 44 篇 school of comput...

作者

  • 39 篇 yang xiaoyuan
  • 38 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 33 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 yichuan wang
  • 27 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 23 篇 min-ling zhang
  • 23 篇 yang jian
  • 23 篇 zhang min-ling
  • 22 篇 ma jianfeng
  • 22 篇 ma xiao

语言

  • 4,416 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5170 条 记 录,以下是4961-4970 订阅
排序:
An Identity-Based Encryption Scheme with Compact Ciphertexts
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2009年 第1期14卷 86-89页
作者: 刘胜利 郭宝安 张庆胜 Department of Computer Science and Engineering Shanghai Jiaotong UniversityShanghai 200240China State Key Laboratory of Information Security Graduate School of the Chinese Academy of the SciencesBeijing 100049China Aisino Corporation Inc. Beijing 100097China
This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key s... 详细信息
来源: 评论
An improved algorithm for IP alias resolution in network topology measurement
An improved algorithm for IP alias resolution in network top...
收藏 引用
9th International Conference on Electronic Measurement and Instruments, ICEMI 2009
作者: Yong, Zhang Shize, Guo Kangfeng, Zheng Yixian, Yang Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
Internet topology measurement is an important part of network measurement. Nowadays, traceroute probing method is widely used to obtain the original route data, and the IP alias resolution technique is to identify IP ... 详细信息
来源: 评论
A Model-Based Fuzz Framework to the security Testing of TCG Software Stack Implementations
A Model-Based Fuzz Framework to the Security Testing of TCG ...
收藏 引用
International Conference on Multimedia information networking and security (MINES)
作者: Yang Yang Huanguo Zhang Mi Pan Jian Yang Fan He Zhide Li School of Computer Wuhan University of China Wuhan China School of Computer State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wuhan China Guangdong Dongguan Supervision Testing Institute of Quality and Metrology Dongguan China
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally fuzz testing tools use random inputs and watch the resulting values. In this paper, we present a model-based fuzz ... 详细信息
来源: 评论
A security-Enhanced Remote Platform Integrity Attestation Scheme
A Security-Enhanced Remote Platform Integrity Attestation Sc...
收藏 引用
International Conference on Wireless Communications, networking and Mobile Computing (WiCom)
作者: Song Cheng Liu Bing Xin Yang Yang Yixian Zhongxian Li Yin Han Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing China National Cybernet Security Ltd Beijing China Huawei Technology Ltd Beijing China
Remote platform integrity attestation is a method by which a client attests its hardware and software configuration to a remote server. The goal of remote integrity platform attestation is to enable a remote challenge... 详细信息
来源: 评论
Identity-based encryption scheme with compact ciphertexts
收藏 引用
Journal of Shanghai Jiaotong University (Science) 2009年 第1期14 E卷 86-89页
作者: Liu, Sheng-Li Guo, Bao-An Zhang, Qing-Sheng Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai 200240 China Aisino Corporation Inc. Beijing 100097 China State Key Laboratory of Information Security Graduate School Chinese Acad. of Sci. Beijing 100049 China
This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public ke... 详细信息
来源: 评论
pService: Towards Similarity Search on Peer-to-Peer Web Services Discovery
pService: Towards Similarity Search on Peer-to-Peer Web Serv...
收藏 引用
International Conference on Advances in P2P Systems (AP2PS)
作者: Gang Zhou Jianjun Yu National Digital Switching System Engineering and Technological Research and Development Center China State Key Laboratory of Software Development Environment Beihang University China Computer Network Information Center Chinese Academy and Sciences China
We present the design of pService system for P2P Web services discovery supporting similarity search with its locality-preserving feature based on modified Skip Graph. In pService, the most important property (e.g. se... 详细信息
来源: 评论
Model Checking Needham-Schroeder security Protocol Based on Temporal Logic of Knowledge
Model Checking Needham-Schroeder Security Protocol Based on ...
收藏 引用
International Conference on networks security, Wireless Communications and Trusted Computing, NSWCTC
作者: Xiangyu Luo Yan Chen Ming Gu Lijun Wu School of Software Key Laboratory of Security for Information System of Ministry of Education Tsinghua University Beijing China Department of Computer Science Guilin University of Electronic Technology Guilin China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the... 详细信息
来源: 评论
Experimental Evaluation of Flooding Attacks in Mobile Ad Hoc networks
Experimental Evaluation of Flooding Attacks in Mobile Ad Hoc...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: P. Yi Y. Wu J. Ma Key Laboratory of Child Development and Learning Science and Ministry of Education South-East University Nanjing China School of Information Security Engineering Shanghai Jiaotong University Shanghai China School of Computer Science Fudan University Shanghai China
Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus su... 详细信息
来源: 评论
key Binding Based on Biometric Shielding Functions
Key Binding Based on Biometric Shielding Functions
收藏 引用
The Fifth International Conference on information Assurance and security(第五届信息保障与安全国际会议)
作者: Li Huixian Wang Man Pang Liaojun Zhang Weidong School of Computer Science and Engineering Northwestern Polytechnical University Xi'anChina Second Arillery Military Office in Li-Shan Microelectronics Company Xi'anChina The Ministry of Education Key Laboratory of Comput.Networks and Information Security Xidian Universi
The tremendous evolution in networking,communication and mobility creates greater security assurance demand than can be provided by simple security measures, such as requiring passwords to gain access to a system. Bio... 详细信息
来源: 评论
An Efficient Mesh Simplification Algorithm
An Efficient Mesh Simplification Algorithm
收藏 引用
International Conference on Internet Computing in Science and engineering (ICICSE)
作者: Hailing Wang Guisheng Yin Jing Zhang Decai Wang Jian Wang National Defence Key Laboratory of Autonomous Underwater Vehicle Technology Harbin Engineering of Technology Harbin Heilongjiang China Harbin Engineering University Harbin Heilongjiang CN College of Computer Science and Technology Harbin Engineering of Technology Harbin Heilongjiang China Network and Information center Harbin Engineering of Technology Harbin Heilongjiang China
This paper presents a new mesh simplification algorithm based on edge collapse, it combines surface curvature and quadric error metric, the position of a new vertex for edge collapse depends on multiple-weighted appro... 详细信息
来源: 评论