咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Network Information and Computer Security Lab"
268 条 记 录,以下是131-140 订阅
排序:
Optimization of Key Predistribution Protocol Based on Supernetworks Theory in Heterogeneous WSN
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 333-343页
作者: Qi Yuan Chunguang Ma Xiaorui Zhong Gang Du Jiansheng Yao College of Computer Science and Technology Harbin Engineering UniversityHarbin 150001China College of Communication and Electronic Engineering Qiqihar UniversityQiqihar 161006China Key Lab of Network Security and Cryptography of Fujian Province China Academy of Electronics and Information Technology Beijing 100041China
This work develops an equilibrium model for finding the optimal distribution strategy to maximize performance of key predistribution protocols in terms of cost, resilience, connectivity, and lifetime. As an essential ... 详细信息
来源: 评论
Multiple influence maximization in social networks  10
Multiple influence maximization in social networks
收藏 引用
10th International Conference on Ubiquitous information Management and Communication, IMCOM 2016
作者: Sun, Honglin Gao, Xiaofeng Chen, Guihai Gu, Jian Wang, Yongjian Shanghai Key Lab. of Scalable Computing and Systems Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Key Laboratory of Information Network Security of Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Influence Maximization, a technique of social analysis to help marketers select a small group of users to promote their products with the goal of maximizing their influence spread, has been studied for a long time. Ho... 详细信息
来源: 评论
A community-powered search of machine learning strategy space to find NMR property prediction models
arXiv
收藏 引用
arXiv 2020年
作者: Bratholm, Lars A. Gerrard, Will Anderson, Brandon Bai, Shaojie Choi, Sunghwan Dang, Lam Hanchar, Pavel Howard, Addison Huard, Guillaume Kim, Sanghoon Kolter, Zico Kondor, Risi Kornbluth, Mordechai Lee, Youhan Lee, Youngsoo Mailoa, Jonathan P. Nguyen, Thanh Tu Popovic, Milos Rakocevic, Goran Reade, Walter Song, Wonho Stojanovic, Luka Thiede, Erik H. Tijanic, Nebojsa Torrubia, Andres Willmott, Devin Butts, Craig P. Glowacki, David R. Participants, Kaggle School of Chemistry University of Bristol Cantock’s Close BristolBS8 1TS United Kingdom School of Mathematics University of Bristol Fry Building Woodland Road BristolBS1 1UG United Kingdom Dept. of Computer Science University of Bristol Merchant Venturer’s Building BristolBS8 1UB United Kingdom Intangible Realities Laboratory University of Bristol Cantock’s Close BristolBS8 1TS United Kingdom Bosch Center for Artificial Intelligence PittsburghPA15222 United States Carnegie Mellon University PittsburghPA15213 United States National Institute of Supercomputing and Network Korea Institute of Science and Technology Information 245 Daehak-ro Yuseong-gu Daejeon34141 Korea Republic of BNP Paribas Cardif Fyusion Inc. Kaggle Google Inc. Mountain View United States Ebay Korea 34F Gangnam Finance Center 152 Teheran Ro Gangnam Gu Seoul Korea Republic of Department of Computer Science University of Chicago 5730 S Ellis Ave ChicagoIL60637 United States Department of Statistics University of Chicago 5747 S Ellis Ave ChicagoIL60637 United States Center for Computational Mathematics Flatiron Institute 162 5th Ave. New YorkNY10010 United States Bosch Research and Technology Center CambridgeMA02139 United States Department of Chemical and Biomolecular Engineering Korea Advanced Institute of Science and Technology 291 Daehak-ro Yuseong-gu Daejeon34141 Korea Republic of 111 Daedeok-daero 989beon-gil Yuseong-gu Daejeon Korea Republic of MINDS AND COMPANY 2621 Nambusunhwan-ro Gangnam-gu Seoul06267 Korea Republic of Totient Inc Sindjeliceva 9 Belgrade11000 Serbia KAIST Web Security & Privacy Lab 291 Daehak-ro Yuseong-guDaejeon34141 Korea Republic of *** Alicante Spain
The rise of machine learning (ML) has created an explosion in the potential strategies for using data to make scientific predictions. For physical scientists wishing to apply ML strategies to a particular domain, it c... 详细信息
来源: 评论
A4Cloud workshop: Accountability in the cloud  10th
A4Cloud workshop: Accountability in the cloud
收藏 引用
10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, 2015
作者: Fernandez-Gago, Carmen Pearson, Siani D’Errico, Michela Alnemr, Rehab Pulls, Tobias de Oliveira, Anderson Santana Network Information and Computer Security Lab University of Malaga Malaga29071 Spain Hewlett Packard Labs Bristol United Kingdom Karlstad University Karlstad Sweden SAP Labs France Mougins France
As cloud computing becomes a widely used technology, it is essential to provide mechanisms and tools that enable trust about how personal data is dealt with by cloud providers. The Cloud Accountability (A4Cloud) proje... 详细信息
来源: 评论
INTELLIGENT information network security AND MANAGEMENT
收藏 引用
China Communications 2016年 第7期13卷 3-6页
作者: Yixian Yang Zhongshan Zhang Wenjing Li Information Security Center(ISC) Beijing University of Posts and Telecommunications(BUPT) National Engineering Laboratory for Disaster Backup and Recovery the School of Computer and Communication Engineering in the University of Science and Technology Beijing(USTB) State Key Lab of Networking and Switching Technologies Network Management Research Center at BUPT National Innovation Research Group of China
Intelligent information network security and Management(IINSM)is an emerging direction in future Internet architecture research,which has gained significant tractions among academia and *** the rapid development of mo... 详细信息
来源: 评论
Full Secure Attribute-Based Broadcast Encryption Achieved through Selective Techniques
Full Secure Attribute-Based Broadcast Encryption Achieved th...
收藏 引用
2016 International Conference on Sustainable Energy, Environment and information Engineering (SEEIE 2016)
作者: Jin SUN Yu-pu HU Department of Application Mathematics in Xi'an University of Technology Key Lab of Computer Network and Information Security Xidian University
According to the broadcast encryption scheme couldn't consider its security and efficiency in one model simultaneously, a full secure attribute-based broadcast encryption achieved through selective techniques was ... 详细信息
来源: 评论
Robust Multi-Exposure Image Fusion: A Structural Patch Decomposition Approach
Robust Multi-Exposure Image Fusion: A Structural Patch Decom...
收藏 引用
作者: Ma, Kede Li, Hui Yong, Hongwei Wang, Zhou Meng, Deyu Zhang, Lei Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong Department of Computing. Hong Kong Polytechnic University Hong Kong Hong Kong Institute for Information and System Sciences and Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China Inst. for Info. and Syst. Sci. and Min. of Educ. Key Lab. of Intelligent Networks and Netwk. Secty. Xi'an Jiaotong University Xi'an710049 China
We propose a simple yet effective structural patch decomposition approach for multi-exposure image fusion (MEF) that is robust to ghosting effect. We decompose an image patch into three conceptually independent compon... 详细信息
来源: 评论
Distributed energy balanced routing for wireless sensor network using energy prediction metric
Distributed energy balanced routing for wireless sensor netw...
收藏 引用
International Conference on information Science and Control Engineering
作者: Quan Guo Xiaoying Song Liaoning Key Lab of Network Security and Computing Technology Dalian Neusoft Information Institute College of Computer Science and Engineering Northeastern University
A considerable amount of energy efficient routing algorithms have been proposed to save energy and prolong network lifetime. Those algorithms mainly focus on forwarding packets along the minimum energy path to the sin... 详细信息
来源: 评论
Chosen-ciphertext secure bidirectional proxy broadcast re-encryption schemes
收藏 引用
International Journal of information and Communication Technology 2016年 第4期8卷 405-419页
作者: Sun, Jin Hu, Yupu Department of Application Mathematics Xi'an University of Technology Xi'an710048 China Key Lab. of Computer Network and Information Security Xidian University Xi'an710071 China
A proxy re-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts decryptable by the delegatee. However, how to structure a chosen-ciphertext secure proxy re-encryp... 详细信息
来源: 评论
Metrics for accountability in the cloud  1st
Metrics for accountability in the cloud
收藏 引用
1st Summer School, Cloud Accountability Project, A4Cloud, 2014
作者: Fernández-Gago, Carmen Nuñez, David Network Information and Computer Security Lab University of Malaga Malaga29071 Spain
Accountability in the Cloud is a key concept that is determined by the accountability attributes. For assessing how accountable an organisation is we should be able to assess or provide techniques for measuring the at... 详细信息
来源: 评论