咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 414 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 29 篇 protocols
  • 28 篇 security
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 21 篇 encryption
  • 20 篇 deep learning
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 875 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1021 条 记 录,以下是721-730 订阅
排序:
Understanding Usage Behaviors of Mobile Apps by Identifying App Package in network Traffic  9
Understanding Usage Behaviors of Mobile Apps by Identifying ...
收藏 引用
2017 9th IEEE International Conference on Communication Software and networks (ICCSN 2017)
作者: Xiang Li Chao Zheng Chengwei Zhang Shu Li Li Guo Jie Xu National Engineering Laboratory for Information Security Technologies Institute of Information Engineering UCAS National Computer Network Emergency Response Technical Team National Computer Network Emergency Technology Coordination Center
Mobile applications have gained rising popularity due to the advantages in mobile technologies. Furthermore, the appearance of tablets and mobile devices with other forms has increased the diversity of apps. These phe... 详细信息
来源: 评论
Revisiting Cloud Migration: Strategies and Methods
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1575卷
作者: Zhixiao Wang Wenyao Yan Wendong Wang School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Shaanxi Key Laboratory Xi'an of Network Computing and Security Technology China School of Data Science and Computer Xi'an innovation college of Yan'an University Xi'an 710100 China Yan'an University Xi'an 716000 China
Cloud computing attracts users with its advantage of unlimited resource supply where resources can be elastically expanded on demand and balanced-load at the same time. This means that the application in the cloud env...
来源: 评论
Driving Android apps to trigger target API invocations based on activity and GUI filtering
收藏 引用
Science China(Information Sciences) 2017年 第7期60卷 262-264页
作者: Hongzhou YUE Yuqing ZHANG Wenjie WANG Qixu LIU State Key Laboratory of Integrated Services Networks Xidian University National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
For an Android app tester,it is often needed to trigger the specific behaviors of an ***,most of the existing Android GUI exploration tools only pursue high code coverage,rather than triggering the specific behaviors ... 详细信息
来源: 评论
A rich ranking model based on the matthew effect optimization  7th
A rich ranking model based on the matthew effect optimizatio...
收藏 引用
7th International Conference on Computational Data and Social networks, CSoNet 2018
作者: Li, Jinzhong Liu, Guanjun Department of Computer Science and Technology College of Electronic and Information Engineering Jinggangshan University Ji’an343009 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu610054 China Department of Computer Science and Technology College of Electronic and Information Engineering Tongji University Shanghai201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China
Most existing approaches of learning to rank treat the effectiveness of each query equally which results in a relatively lower ratio of queries with high effectiveness (i.e. rich queries) in the produced ranking model... 详细信息
来源: 评论
Minimum length key in MST cryptosystems
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 142-152页
作者: Haibo HONG Licheng WANG Haseeb AHMAD Yixian YANG Zhiguo QU School of Computer Science and Information Engineering Zhejiang Gongshang University Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology
As a special factorization category of finite groups, logarithmic signature(LS) is used as the main component of cryptographic keys that operate within secret key cryptosystems such as PGM and public key cryptosystems... 详细信息
来源: 评论
Power Attack and Protected Implementation on Lightweight Block Cipher SKINNY
Power Attack and Protected Implementation on Lightweight Blo...
收藏 引用
Asia Joint Conference on Information security (Asia JCIS)
作者: Jing Ge Yifan Xu Ruiqian Liu Enze Si Ning Shang An Wang School of Computer Science State Key Laboratory of Cryptology Beijing China School of Computer Science Beijing Institute of Technology Beijing China Network Security Squadron of Public Security Department of Henan Province Zhengzhou China Chinese Academy of Sciences China Key laboratory of network assessment technology & Institute of Information Engineering Beijing China
SKINNY is a new lightweight tweakable block cipher family, which can compete to other lightweight cipher in terms of hardware or software implementations. While its theoretical security has been widely studied, little... 详细信息
来源: 评论
Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs
Analysis of Stepping Stone Attacks in Dynamic Vulnerability ...
收藏 引用
2018 IEEE International Conference on Communications, ICC 2018
作者: Gamarra, Marco Shetty, Sachin Nicol, David M. Gonazlez, Oscar Kamhoua, Charles A. Njilla, Laurent Oscar Gonzalez College of Engineering Old Dominion University NorfolkVA23529 United States Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign UrbanaIL61801 United States Network Security Branch U.S. Army Research Laboratory AdelphiMD20783 United States Cyber Assurance Branch U.S. Air Force Research Laboratory RomeNY United States
Vulnerability graphs have been employed as an effective tool for analyzing exploitability and impact of chain of exploits in networked environments. The attack graphs are created by a chain of "stepping stones&qu... 详细信息
来源: 评论
Spot evasion attacks: Adversarial examples for license plate recognition systems with convolutional neural networks
arXiv
收藏 引用
arXiv 2019年
作者: Qian, Ya-Guan Ma, Dan-Feng Wang, Bin Pan, Jun Wang, Jia-Min Chen, Jian-Hai Zhou, Wu-Jie Lei, Jing-Sheng School of Big-Data Science Zhejiang University of Science and Technology Hangzhou310023 China Network and Information Security Laboratory of Hangzhou Hikvision Digital Technology Co. Ltd. Hang Zhou310052 China College of Computer Science and Technology Zhejiang University Hangzhou310027 China School of Information and Electronic Engineering Zhejiang University of Science and Technology Hangzhou310023 China
Recent studies have shown convolutional neural networks (CNNs) for image recognition are vulnerable to evasion attacks with carefully manipulated adversarial examples. Previous work primarily focused on how to generat... 详细信息
来源: 评论
Improving reliability of cloud computing services for next generation mobile communication networks
收藏 引用
International Journal of computers and Applications 2018年 第3期40卷 1-7页
作者: Chen, Hao Zhao, Dongmei Liu, Kan Wu, Wen Wang, Li Department of Electronic Information Engineering School of Computer and Information Engineering Tianjin Chengjian University Tianjin China Hebei Provincial Key Laboratory of Network and Information Security Information Technical College Hebei Normal University Shijiazhuang China School of Economics and Management Beijing Jiaotong University Beijing China Department of Network Engineering School of Computer and Information Engineering Tianjin Chengjian University Tianjin China
In the future, the virtualized (cloned) smartphone is called the virtual network device, which is hosted in the private and the public cloud environments. This is a major research field in next-generation mobile commu... 详细信息
来源: 评论
A High Throughput Distributed Log Stream Processing System for network security Analysis  9
A High Throughput Distributed Log Stream Processing System f...
收藏 引用
2017 9th IEEE International Conference on Communication Software and networks (ICCSN 2017)
作者: Jingfen Zhao Peng Zhang Yong Sun Qingyun Liu Guolin Tan Zhengmin Li Institute of Information Engineering Chinese Academy of Science National Engineering Laboratory for Information Security Technologies National Computer Network Emergency Response and Coordination Center Institute of Information Engineering Chinese Academy of Science
computer-system logs often contain high volumes of interesting, useful information, and are an important data source for network security analysis. In this paper, we propose a distributed log stream processing system ... 详细信息
来源: 评论