咨询与建议

限定检索结果

文献类型

  • 589 篇 会议
  • 420 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 651 篇 工学
    • 494 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 165 篇 信息与通信工程
    • 127 篇 电气工程
    • 62 篇 网络空间安全
    • 61 篇 电子科学与技术(可...
    • 60 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 24 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 278 篇 理学
    • 170 篇 数学
    • 56 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 18 篇 化学
  • 166 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 22 篇 医学
    • 19 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 27 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 21 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 federated learni...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 heilongjiang key...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 907 篇 英文
  • 75 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1010 条 记 录,以下是241-250 订阅
排序:
Masquerade Detection Based on Temporal Convolutional network  25
Masquerade Detection Based on Temporal Convolutional Network
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Zhai, Haibin Wang, Yong Zou, Xueqiang Wu, Yihan Chen, Songyue Wu, Hongwei Zheng, Yanqin National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Institute of Information Engineering Chinese Academy of Science Beijing China School of Cybersecurity University of Chinese Academy of Science Beijing China National Engineering Laboratory of Information Security Technologies Beijing China
Masquerade detection has always been a vital detection capacity in intrusion detection, and shell command detection plays an important role in masquerade detection. Shell command detection is used to detect the system... 详细信息
来源: 评论
Efficient Registered Attribute Based Access Control with Same Sub-policies in Mobile Cloud Computing
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Weng, Wuwei Li, Jiguo Zhang, Yichen Lu, Yang Shen, Jian Han, Jinguang Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Nanjing Normal University School of Computer and Electronic Information Nanjing210023 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China Southeast University School of Cyber Science and Engineering Nanjing210096 China
Ciphertext-policy attribute-based encryption (CP-ABE) has long been considered as a promising access control technology for cloud storage. However, CP-ABE depends on a central trusted authority to generate and distrib... 详细信息
来源: 评论
Formal Modeling and Defense Methods for 5G network Endpoint Access Denial of Service Attacks
Formal Modeling and Defense Methods for 5G Network Endpoint ...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Tong Zhang Wei Wei Yichuan Wang Xi Deng Lei Zhu Wenjiang Ji School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China School of Computer Science Xi'an Shiyou University Xi'an China
5G terminal access denial-of-service attack is one of the more common types of 5G signaling network attacks. It manifests itself as a large number of abnormal access requests occupying core network resources. Normal r...
来源: 评论
Covert Communication in Satellite-Terrestrial Systems with a Full-Duplex Receiver
Covert Communication in Satellite-Terrestrial Systems with a...
收藏 引用
2024 International Conference on Satellite Internet, SAT-NET 2024
作者: Guo, Zewei Sun, Ranran He, Ji Shen, Yulong Jiang, Xiaohong Future University Hakodate School of Systems Information Science Hakodate041-8655 Japan Hangzhou Institute of Technology Xidian University Hangzhou311200 China Xidian University School of Computer Science and Technology Xi'an710071 China Institute of Systems General Academy of Systems Engineering Academy of Military Sciences Beijing100101 China Xidian University Shaanxi Key Laboratory of Network and System Security Xi'an710071 China
This paper investigates the covert communication in a satellite-terrestrial system, including a satellite transmitter Alice, a terrestrial full-duplex receiver Bob and a terrestrial warden Willie. To help the covert t... 详细信息
来源: 评论
Establishing Multi-Party Trust Architecture for DRM by Using Game-Theoretic Analysis of security Policies
收藏 引用
Chinese Journal of Electronics 2023年 第3期18卷 519-524页
作者: Zhiyong Zhang Qingqi Pei Jianfeng Ma Lin Yang Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an China Electronic and Information Engineering College Henan University of Science and Technology Luoyang China The Research Institute China Electronic Equipment and Systems Engineering Corporation Beijing China
A successful transaction of digital contents is primarily dependent on security policies, trust mechanisms and benefits balances, as well as the simple adoption of the combination of enhanced security policies would n... 详细信息
来源: 评论
Provably Secure Authenticated Key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
Signature Scheme Based on The SM2 Algorithm in Fabric
Signature Scheme Based on The SM2 Algorithm in Fabric
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Zhang, Yaling Wang, Hongyun Wang, Yichuan Ji, Wenjiang Zhu, Lei Xi'an University of technology School of computer science and engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of technology Xi'an China
Based on the analysis and research of the widely used Hyperledger Fabric alliance chain structure, this paper proposes a digital signature scheme based on the national cryptographic algorithm SM2 which can be applied ... 详细信息
来源: 评论
A Revocable Pairing-Free Certificateless Signature Scheme Based on RSA Accumulator
A Revocable Pairing-Free Certificateless Signature Scheme Ba...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Zhuowei Shen Xiao Kou Taiyao Yang Haoqin Xu Dongbin Wang Shaobo Niu School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Intergration Minster of Education Nanjing China School of Cyberspace Security Beijing University of Post and Telecommunications Beijing China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education Beijing China
Certificateless public key cryptography (CL-PKC) has garnered significant attention in recent years due to its ability to address the complex certificate management requirements inherent in public key infrastructure (... 详细信息
来源: 评论
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
DHD: Double Hard Decision Decoding Scheme for NAND Flash Memory
DHD: Double Hard Decision Decoding Scheme for NAND Flash Mem...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Lanlan Cui Yichuan Wang Renzhi Xiao Miao Li Xiaoxue Liu Xinhong Hei School of Computer Science and Engineering XI'AN University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Software Engineering Jiangxi University of Science and Technology Nanchang China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
With the advancement of NAND flash technology, the increased storage density leads to intensified interference, which in turn raises the error rate during data retrieval. To ensure data reliability, low-density parity... 详细信息
来源: 评论