咨询与建议

限定检索结果

文献类型

  • 565 篇 会议
  • 426 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 993 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 611 篇 工学
    • 441 篇 计算机科学与技术...
    • 364 篇 软件工程
    • 172 篇 信息与通信工程
    • 77 篇 控制科学与工程
    • 71 篇 电气工程
    • 64 篇 电子科学与技术(可...
    • 49 篇 生物工程
    • 43 篇 网络空间安全
    • 42 篇 机械工程
    • 29 篇 仪器科学与技术
    • 23 篇 光学工程
    • 17 篇 安全科学与工程
    • 16 篇 建筑学
    • 15 篇 土木工程
    • 15 篇 交通运输工程
    • 15 篇 生物医学工程(可授...
    • 11 篇 材料科学与工程(可...
  • 244 篇 理学
    • 160 篇 数学
    • 51 篇 生物学
    • 46 篇 统计学(可授理学、...
    • 37 篇 物理学
    • 30 篇 系统科学
    • 10 篇 化学
  • 142 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 21 篇 法学
    • 12 篇 社会学
    • 10 篇 法学
  • 14 篇 医学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 军事学
    • 11 篇 军队指挥学
  • 4 篇 教育学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 60 篇 feature extracti...
  • 52 篇 accuracy
  • 49 篇 semantics
  • 38 篇 computational mo...
  • 37 篇 cryptography
  • 32 篇 training
  • 31 篇 federated learni...
  • 27 篇 data models
  • 25 篇 deep learning
  • 22 篇 transformers
  • 22 篇 neural networks
  • 21 篇 authentication
  • 21 篇 wireless sensor ...
  • 21 篇 security
  • 20 篇 object detection
  • 19 篇 information secu...
  • 19 篇 protocols
  • 18 篇 visualization
  • 17 篇 privacy
  • 16 篇 public key crypt...

机构

  • 200 篇 shandong provinc...
  • 158 篇 key laboratory o...
  • 44 篇 shandong fundame...
  • 41 篇 shandong enginee...
  • 41 篇 key laboratory o...
  • 29 篇 key lab of educa...
  • 27 篇 pca lab key lab ...
  • 27 篇 school of comput...
  • 24 篇 key laboratory o...
  • 20 篇 ministry of educ...
  • 19 篇 guangxi key lab ...
  • 18 篇 college of compu...
  • 17 篇 pca lab key lab ...
  • 16 篇 ministry of educ...
  • 15 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 key laboratory o...
  • 14 篇 guangxi key lab ...
  • 13 篇 jiangsu high tec...

作者

  • 71 篇 yang jian
  • 33 篇 jianfeng ma
  • 32 篇 jian yang
  • 31 篇 meng deyu
  • 27 篇 hu yupu
  • 24 篇 ma jianfeng
  • 23 篇 xie jin
  • 22 篇 wang hui-ming
  • 18 篇 ma jian-feng
  • 16 篇 cao xiangyong
  • 15 篇 jiang haobo
  • 14 篇 yang yang
  • 14 篇 pei qingqi
  • 13 篇 qian jianjun
  • 13 篇 qingqi pei
  • 12 篇 xiaoming wu
  • 12 篇 li xiang
  • 12 篇 pang liaojun
  • 12 篇 wang ruchuan
  • 12 篇 gong chen

语言

  • 926 篇 英文
  • 36 篇 中文
  • 31 篇 其他
检索条件"机构=Ministry of Education Key Lab. of Computer Networks and Information Security"
993 条 记 录,以下是71-80 订阅
排序:
Design of TNC MAP Server based on information fusion
Design of TNC MAP Server based on information fusion
收藏 引用
International Conference on computer Application and System Modeling
作者: Chen, Xi Li, XingHua Ma, JianFeng Key Laboratory of Computer Networks and Information Security Ministry of Education Xi' an China
In current version of Trusted Network Connection (TNC) architecture, IF-MAP protocol creates a structured way to support real-time data interchange and dynamic management. However, there is a big challenge that the MA... 详细信息
来源: 评论
Auction Theory and Game Theory Based Pricing of Edge Computing Resources: A Survey
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Jiguo Liu, Shun Zou, Yifei Wang, Guijuan Hu, Chunqiang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Qufu Normal University School of Computer Science Shandong Rizhao China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250353 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol... 详细信息
来源: 评论
Research on the Programming Language for Symmetric Cryptographic Algorithms
收藏 引用
电子学报(英文版) 2010年 第2期19卷 303-306页
作者: LI Fenghua YAN Junzhi XIE Rongna MA Jianfeng Beijing Electronic Science and Technology Institute Beijing China Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an China
The Programming language for symmetric cryptographic algorithms (PLSCA) is proposed. The detailed specification of the syntax of PLSCA is presented, and the cipher of IDEA is described using PLSCA as an example. Using... 详细信息
来源: 评论
Secure proxy signature scheme with fast revocation in the standard model
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2009年 第4期16卷 116-124页
作者: LIU Zhen-hua HU Yu-pu ZHANG Xiang-song MA Hua Applied Mathematics Department Xidian University Xi'an 710071 China Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China
Proxy signature is an important cryptographic primitive and has been suggested in numerous applications, Tne revocation oI delegated rights is an essential issue of the proxy signature schemes. In this article, a secu... 详细信息
来源: 评论
Joint Dynamic Clustering and User Scheduling for Downlink Cloud Radio Access Network with Limited Feedback
收藏 引用
China Communications 2015年 第12期12卷 147-159页
作者: XU Dongyang REN Pinyi DU Qinghe SUN Li Ministry of Education Key Lab For Intelligent Networks and Network Security of Xi'an Jiaotong University Department of Information and Communications Engineering School of Electronic and Information EngineeringXi'an Jiaotong University
In limited feedback-based CloudRAN(C-RAN) systems,the inter-cluster and intra-cluster interference together with the quantification error can seriously deteriorates the system spectral ***,in this paper,propose an eff... 详细信息
来源: 评论
Improved Impossible Differential Cryptanalysis of AES-128
收藏 引用
电子学报(英文版) 2007年 第1期16卷 187-189页
作者: WEI Yongzhuang HU Yupu Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China .Guilin University of Electronic Technology Guilin 541004 China
Recently, several impossible differential attacks on the Advanced encryption standard (AES) were presented. The previous work is extended by presenting a new impossible differential attack on the AES-128 (with 128 bit... 详细信息
来源: 评论
Fair relay selection in decode-and-forward cooperation based on outage priority
收藏 引用
Science China(information Sciences) 2013年 第6期56卷 5-14页
作者: LI YuBo WANG HuiMing YIN QinYe LUO Miao School of Electronic and Information Engineering Xi'an Jiaotong University State Key Laboratory of Integrated Services Networks Xidian University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University
The opportunistic cooperation schemes,where only the "best" relay is selected to forward the message,have been widely investigated recently for their good performance in terms of outage ***,the unfair select... 详细信息
来源: 评论
SONICUMOS: An Enhanced Active Face Liveness Detection System via Ultrasonic and Video Signals
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Wu, Yihao Jiang, Peipei Cheng, Jianhao Zhao, Lingchen Shen, Chao Wang, Cong Wang, Qian Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University School of Cyber Science and Engineering Hubei430072 China Laboratory for AI-Powered Financial Technologies Ltd. 999077 Hong Kong Xi'An Jiaotong University MOE Key Laboratory for Intelligent Networks and Network Security Xi'an710049 China Xi'An Jiaotong University School of Cyber Science and Engineering Xi'an710049 China City University of Hong Kong Department of Computer Science 999077 Hong Kong
SONICUMOS is an enhanced behavior-based face liveness detection system that combines ultrasonic and video signals to sense the 3D head gestures. As face authentication becomes increasingly prevalent, the need for a re... 详细信息
来源: 评论
Linear complexity of sequences produced by single cycle T-function
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第4期18卷 123-128页
作者: WANG Yan HU Yu-pu LI Shun-bo YANG Yang Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China Department of Mathematics Xi'an University of Architecture and Technology Xi'an 710055 China
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on ... 详细信息
来源: 评论
A link analysis for passive UHF RFID system in LOS indoor environment
A link analysis for passive UHF RFID system in LOS indoor en...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Hong, Gang Wang Chang, Xing Petitioner Chang, Hua Zhu Ministry of Education Key Lab. Computer Network and Information Security Xidian University Xi'an China
A link analysis model for passive UHF RFID system in LOS indoor environment is developed and demonstrated. Using this model, the power received by tag and the read performance are investigated. The multipath fading an... 详细信息
来源: 评论