咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 414 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 29 篇 protocols
  • 28 篇 security
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 21 篇 encryption
  • 20 篇 deep learning
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 875 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1021 条 记 录,以下是711-720 订阅
排序:
Exploiting Gabor Feature Extraction Method for Chinese Character Writing Quality Evaluation
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1575卷
作者: Zhixiao Wang Wenyao Yan Mingtao Guo Jiulong Zhang School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Shaanxi Key Laboratory Xi'an of Network Computing and Security Technology China School of Data Science and Computer Xi'an innovation college of Yan'an University Xi'an 710100 China
The automatic evaluation of Chinese character writing quality has a wide application prospect. Most of the existing evaluation methods of Chinese character writing quality are based on radical segmentation and feature...
来源: 评论
Research on System Dynamics and Agent Hybrid Modeling Method for Multi-Energy Collaborative Control Under Ubiquitous Power Internet
Research on System Dynamics and Agent Hybrid Modeling Method...
收藏 引用
IEEE Conference on Energy Internet and Energy System Integration (EI2)
作者: Fuxing Zhang Yingjie Zhang Xiong Zhan Juan Luo Honglei Miao Yonghua Gui College of Computer Science and Electronic Engineering Hunan University Changsha China State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute Beijing China Hardware R&D Department HNAC Technology Co. Ltd. Changsha China
In order to promote the study of system dynamics (SD) and multi-agent theory and its wide application in the field of renewable energy, a hybrid modeling method of SD and Agent is proposed in this paper, which is suit... 详细信息
来源: 评论
Implementing security-Enhanced PHR System in the Cloud using FAME
Implementing Security-Enhanced PHR System in the Cloud using...
收藏 引用
IEEE Global Communications Conference
作者: Zuobin Ying Wenjie Jiang Ximeng Liu Shengmin Xu School of Computer Science & Technology Anhui University Hefei China School of Electrical & Electronic Engineering Nanyang Technological University Singapore College of Mathematics & Computer Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Information Security of Network Systems Fuzhou University Fuzhou China School of Information Systems Singapore Management University Singapore
Personal Health Record (PHR) plays an important role in realizing the exchange and interaction of medical information as well as in managing chronic diseases. In the recent decade, plenty of researches have been carri... 详细信息
来源: 评论
Is AI Robust Enough for Scientific Research?
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Jun-Jie Song, Jiahao Wang, Xiu-Cheng Li, Fu-Peng Liu, Zehan Chen, Jian-Nan Dang, Haoning Wang, Shiyao Zhang, Yiyan Xu, Jianhui Shi, Chunxiang Wang, Fei Pang, Long-Gang Cheng, Nan Zhang, Weiwei Zhang, Duo Meng, Deyu Northwest Institute of Nuclear Technology No. 28 Pingyu Road Shaanxi Xi’an710024 China School of Telecommunications Engineering Xidian University No. 2 South Taibai Road Shaanxi Xi’an710071 China State Key Laboratory of ISN No. 2 South Taibai Road Shaanxi Xi’an710071 China Institute of Particle Physics Central China Normal University No. 152 Luoyu Road Hubei Wuhan30079 China School of Computer Science and Technology Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China Guangzhou Institute of Geography Academy of Sciences No. 100 Xianlie Road Guangdong Guangzhou510070 China National Meteorological Information Center Beijing100044 China MDX Research Center for Element Strategy Institute of Integrated Research Institute of Science Tokyo Midori-ku Yokohama226-8503 Japan School of Physics and Information Technology Shaanxi Normal University No. 620 West Chang’an Avenue Shaanxi Xi’an710119 China School of Aeronautics Northwestern Polytechnical University No. 127 West Youyi Road Shaanxi Xi’an710072 China AI for Science Institute Beijing100080 China DP Technology Beijing100080 China Academy for Advanced Interdisciplinary Studies Peking University Beijing100871 China School of Mathematics and Statistics Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China
We uncover a phenomenon largely overlooked by the scientific community utilizing AI: neural networks exhibit high susceptibility to minute perturbations, resulting in significant deviations in their outputs. Through a... 详细信息
来源: 评论
The m-least significant bits operation for quantum random number generation
arXiv
收藏 引用
arXiv 2019年
作者: Chen, Ziyang Li, Zhengyu Xu, Bingjie Zhang, Yichen Guo, Hong State Key Laboratory of Advanced Optical Communication System and Network School of Electronics Engineering and Computer Science Center for Quantum Information Technology Peking University Beijing100871 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China
Quantum random number generators (QRNGs) can provide genuine randomness based on the inherent unpredictable nature of quantum physics. The extracted randomness relies not only on the physical parts of the QRNG, such a... 详细信息
来源: 评论
Time-varying massive MIMO channel estimation: Capturing, reconstruction and restoration
arXiv
收藏 引用
arXiv 2019年
作者: Li, Muye Zhang, Shun Zhao, Nan Zhang, Weile Wang, Xianbin State Key Laboratory of Integrated Services Networks Xidian University Xian710071 China School of Information and Communication Engineering Dalian University of Technology Dalian116024 China MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China Department of Electrical and Computer Engineering Western University LondonON Canada
On the time-varying channel estimation, the traditional downlink (DL) channel restoration schemes usually require the reconstruction for the covariance of downlink process noise vector, which is dependent on DL channe... 详细信息
来源: 评论
Code Authority Control Method Based on File security Level and ACL in WebIDE
Code Authority Control Method Based on File Security Level a...
收藏 引用
IEEE International Conference of Intelligent Robotic and Control engineering (IRCE)
作者: Junhuai Li Wenchao Ji Jubo Tian Huaijun Wang Kan Wang School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
The following topics are dealt with: mobile robots; learning (artificial intelligence); control system synthesis; permanent magnet motors; motion control; optimisation; power engineering computing; machine control; sy... 详细信息
来源: 评论
A Universal Designated Multi-Verifier Transitive Signature Scheme  13th
A Universal Designated Multi-Verifier Transitive Signature S...
收藏 引用
13th International Conference on Information securityand Cryptology, Inscrypt 2017
作者: Zhu, Fei Zhang, Yuexin Lin, Chao Wu, Wei Meng, Ru Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Informatics Fujian Normal University Fuzhou China School of Software and Electrical Engineering Swinburne University of Technology HawthornVIC3122 Australia School of Computer Science Shaanxi Normal University Xi’an China
A Universal Designated Verifier Transitive Signature (UDVTS) scheme is designed for the graph-based big data system. Specifically, it allows a transitive signature holder to convince the designated verifier with a tra... 详细信息
来源: 评论
A static technique for detecting input validation vulnerabilities in Android apps
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 210-225页
作者: Zhejun FANG Qixu LIU Yuqing ZHANG Kai WANG Zhiqiang WANG Qianru WU National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences National Computer Network Emergency Response Technical Team/Coordination Center of China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Beijing Electronic Science and Technology Institute
Input validation vulnerabilities are common in Android apps, especially in inter-component communications. Malicious attacks can exploit this kind of vulnerability to bypass Android security mechanism and compromise t... 详细信息
来源: 评论
Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow
收藏 引用
Chinese Journal of Electronics 2017年 第3期26卷 640-646页
作者: ZHAO Qianqian ZHANG Yuqing ZHANG Guanghua WANG He State Key Laboratory of Integrated Services Networks Xidian University National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing Key Laboratory of IOT Information Security Technology Institute of Information Engineering CAS
Ciphertext policy attribute-based encryption(CP-ABE)is becoming a new primitive for finegrained access *** neither produces multiple encrypted copies of the same data nor suffers from the severe burden of key distribu... 详细信息
来源: 评论