咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Lab of Computer Network and Information Security"
268 条 记 录,以下是91-100 订阅
排序:
Design and Implementation of Classroom Attendance System Based on Video Face Recognition
Design and Implementation of Classroom Attendance System Bas...
收藏 引用
作者: Lin Zhi-heng Li Yong-zhen Network & Information Security Lab Dept.of Computer Science & TechnologyYanbian University
Classroom attendance,as an indispensable part of teaching activities,plays a very important role in classroom *** attendance can effectively supervise students to attend classes on time and ensure the quality of class... 详细信息
来源: 评论
A novel identity-based authentication scheme for IoV security
收藏 引用
International Journal of network security 2020年 第4期22卷 627-637页
作者: Wang, Changguang Dai, Zimeng Zhao, Dongmei Wang, Fangwei Key Lab of Network and Information Security of Hebei Province No.20 South ErHuan Road YuHua District Shijiazhuang050024 China College of Computer and Cyber Security Hebei Normal University No.20 South ErHuan Road YuHua District Shijiazhuang050024 China
In order to enhance the security of the IoV (Internet of Vehicles), a novel bi-directional authentication scheme is presented in this paper. By use of the elliptic curve en-cryption algorithm and the bilinear pair map... 详细信息
来源: 评论
A Control Task Assignment Algorithm based on sub-graph isomorphism
A Control Task Assignment Algorithm based on sub-graph isomo...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Feng Yu Xixian Li Huimin Zhang Li-e Wang College of computer science Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
To enhance the controllability and trustworthiness of the Internet, a new network control architecture has been presented with control task extracted to the intra-domain control node and executed in distributed multi-... 详细信息
来源: 评论
Secure Data Propagation in Edge-Cloud Orchestrated Computing Paradigms: Statistcs and Taxonomy
Secure Data Propagation in Edge-Cloud Orchestrated Computing...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Feng Yu Xixian Li Huimin Zhang Li-e Wang College of computer science Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Guangxi Key Lab of Multi-source Information Mining &Security Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
Despite the importance of the secure data propagation in the edge-cloud orchestrated computing paradigms, to the best of our knowledge, there is lack of systematic and comprehensive review on this research topic. The ... 详细信息
来源: 评论
CACAI: Comparative analysis of crypto apps in India
收藏 引用
AIP Conference Proceedings 2023年 第1期2916卷
作者: Rahul Johari Anuj Talwar Suhas Harbola Jyotsna Yadav Himesh Nayak Deo Prakash Vidyarthi SWINGER: Security Wireless IoT Network Group of Engineering and Research University School of Information Communication and Technology (USICT) Guru Gobind Singh Indraprastha University Sector-16C Dwarka Delhi India Computer vision and Image processing lab University School of Information Communication and Technology (USICT) Guru Gobind Singh Indraprastha University Sector-16C Dwarka Delhi India School of Computer and Systems Sciences Parallel and Distributed Systems Lab JNU Delhi India
Crypto-currency is a decentralized digital currency which can be used as a medium of exchange. As it does not have any central authority, it is unregulated and a volatile asset. Globally the crypto market is worth a f...
来源: 评论
Algorithms for Globally-Optimal Secure Signaling over Gaussian MIMO Wiretap Channels Under Interference Constraints
arXiv
收藏 引用
arXiv 2020年
作者: Dong, Limeng Loyka, Sergey Li, Yong Ministry of Education Key Lab for Intelligent Networks and Network Security School of Information and Communications Engineering Xi’an Jiaotong University Xi’anShaanxi710049 China School of Electrical Engineering and Computer Science University of Ottawa Canada School of Electronics and Information Northwestern Polytechnical University Xian China
Multi-user Gaussian MIMO wiretap channel is considered under interference power constraints (IPC), in addition to the total transmit power constraint (TPC). Algorithms for global maximization of its secrecy rate are p... 详细信息
来源: 评论
Blockchain-Based Secure Authentication Scheme for Medical Data Sharing
Blockchain-Based Secure Authentication Scheme for Medical Da...
收藏 引用
2019国际计算机前沿大会
作者: Xu Cheng Fulong Chen Dong Xie Hui Sun Cheng Huang Zhuyun Qi School of Computer and Information Anhui Normal University Anhui Provincial Key Lab of Network and Information Security School of Electronic and Computer Engineering Peking University
Data security is vital for medical cyber physical system(MCPS).The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted third...
来源: 评论
Bipartite graph embedding via mutual information maximization
arXiv
收藏 引用
arXiv 2020年
作者: Cao, Jiangxia Lin, Xixun Liu, Luchen Liu, Tingwen Guo, Shu Wang, Bin Institute of Information Engineering Chinese Academy of Sciences & School of Cyber Security University of Chinese Academy of Sciences China National Computer Network Emergency Response Technical Team Coordination Center of China China Xiaomi AI Lab Xiaomi Inc China
Bipartite graph embedding has recently attracted much attention due to the fact that bipartite graphs are widely used in various application domains. Most previous methods, which adopt random walk-based or reconstruct... 详细信息
来源: 评论
security of medical cyber-physical systems: An empirical study on imaging devices
arXiv
收藏 引用
arXiv 2019年
作者: Wang, Zhiqiang Ma, Pingchuan Zou, Xiaoxiang Yang, Tao Beijing Electronic Science and Technology Institute National Computer Network Emergency Response Technical Team/Coordination Center of China Key Lab of Information Network Security Ministry of Public Security
Recent years have witnessed a boom of connected medical devices, which brings security issues in the meantime. Medical imaging devices, an essential part of medical cyberphysical systems, play a vital role in modern h... 详细信息
来源: 评论
Modeling of Layered Supply Chain network Considering Similarity
Modeling of Layered Supply Chain Network Considering Similar...
收藏 引用
第32届中国控制与决策会议
作者: Yi Zhang Yurong Song Guoping Jiang Bin Yu School of Computer Science Software and Network Space SecurityNanjing University of Posts and Telecommunications School of Automation Nanjing University of Posts and Telecommunications Jiangsu Engineering Lab for IOT Intelligent Robots(IOTRobot) Hengyang Key Laboratory of Information Secure and its application research
The supply chain network is a complex network with the risk of cascading *** study the cascading failure in it,an accurate supply chain network model needs to be *** this paper,we construct a layered supply chain netw... 详细信息
来源: 评论