咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 412 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 486 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 160 篇 信息与通信工程
    • 125 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 52 篇 生物工程
    • 29 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
    • 16 篇 化学工程与技术
  • 275 篇 理学
    • 168 篇 数学
    • 55 篇 生物学
    • 49 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 39 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 26 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 31 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...
  • 11 篇 shandong enginee...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 12 篇 yang xiaoyuan
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 902 篇 英文
  • 71 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1001 条 记 录,以下是771-780 订阅
排序:
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment
收藏 引用
Multimedia Tools and Applications 2017年 第21期76卷 22785-22785页
作者: Shen, Jian Tan, Haowen Zhang, Yan Sun, Xingming Xiang, Yang Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer & Software Nanjing University of Information Science and Technology Nanjing China School of Computer & Software Nanjing University of Information Science & Technology Nanjing China Simula Research Laboratory of Norway and the Department of Informatics University of Oslo Oslo Norway Center for Cyber Security Research Deakin University Deakin Australia
来源: 评论
A Dynamic Self-Adaptive Algorithm for Uploading Deferrable Big Data to the Cloud Cost-Effectively
A Dynamic Self-Adaptive Algorithm for Uploading Deferrable B...
收藏 引用
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Baojiang Cui Peilin Shi Haifeng Jin School Computer of Science Nation Engineering Laboratory for Mobile Network Security Beijing China
Cloud computing is based between the service provider and service consumer agreements and cloud data center is under a cloud computing environment that consists of hardware and software components. This paper studies ... 详细信息
来源: 评论
Paralleled Extraction Method for Content of Invoice Image Based on TPL
Paralleled Extraction Method for Content of Invoice Image Ba...
收藏 引用
2015 International Conference on Advanced Management Science and Information engineering(AMSIE 2015)
作者: H.Y.Jin B.Xing X.H.Hei School of Computer Science & Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
The paper mainly uses a mixed strategy of data and task parallelism to realize parallel extraction date information of *** at the deficiency of ordinary pipeline mode for parallel extraction date information from invo... 详细信息
来源: 评论
network Identity Management Platform Based on eID
Network Identity Management Platform Based on eID
收藏 引用
2015 International Industrial Informatics and computer engineering Conference(IIICEC 2015)
作者: ZOU Xiang CHEN Bing The 3rd research institute of ministry of public security (key laboratory of information network security Ministry of Public Security) Dept.of computer engineering of Tongji University
With the prompt evolution of Internet,network identity management is getting more and more *** electronic identities in cyberspace associated in reality have been one significant and urgent task as online life becomes... 详细信息
来源: 评论
Research on network Identity Management Systems Model
Research on Network Identity Management Systems Model
收藏 引用
2015 International Industrial Informatics and computer engineering Conference(IIICEC 2015)
作者: CHEN Bing ZOU Xiang TAN Chengxiang The 3rd research institute of ministry of public security (key laboratory of information network security Ministry of Public Security) Dept.of computer engineering of Tongji University
With the rapid development of network,network identity management is becoming more and more *** identity in cyberspace associated in reality has been one significant and urgent task as online life becomes *** this pap... 详细信息
来源: 评论
VM migration across subnets in future internet architecture-XIA
收藏 引用
Tongxin Xuebao/Journal on Communications 2016年 第3期37卷 107-116页
作者: Meng, Hong-Wei Chen, Zhong Meng, Zi-Qian Song, Chuck School of Electronics Engineering and Computer Science Peking University Beijing100871 China Ministry of Education Beijing100871 China MoE Key Laboratory of Network and Software Security Assurance Peking University Beijing100871 China School of Computer Science Carnegie Mellon University Pittsburgh15213 United States
When a VM migrates among hosts residing in two IP subnets, the network attachment point of VM changed, which causes the IP mobility problem. It was meaningful to design and evaluate VM migration performance under the ... 详细信息
来源: 评论
Collecting all data continuously in wireless sensor networks with a mobile base station
Collecting all data continuously in wireless sensor networks...
收藏 引用
作者: Li, Jie Ye, Xiucai Xu, Li Liu, Huaibei Faculty of Engineering Information and Systems University of Tsukuba Tsukuba Science City Ibaraki3058573 Japan Department of Computer Science University of Tsukuba Tsukuba Science City Ibaraki3058573 Japan Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou Fujian350007 China Provincial Key Laboratory of Information Network Engineering Fuzhou Fujian350003 China Institute of Scientific and Technological Information Fuzhou Fujian350003 China
In this paper, we present a novel coding scheme called separate coding (SC) for collecting all data continuously in wireless sensor networks with a mobile base station (mBS). By separately encoding a certain number of... 详细信息
来源: 评论
Uploading Deferrable Big Data to the Cloud by Improved Dynamic Self-Adaption Algorithm
Uploading Deferrable Big Data to the Cloud by Improved Dynam...
收藏 引用
International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)
作者: Baojiang Cui Peilin Shi Jun Yang Yongle Hao School of Computer Science Beijing University of Posts and Telecommunications Beijing China Nation Engineering Laboratory for Mobile Network Security China
Cloud computing is a pattern of processing the big data and provides the convenient, on-demand network access to a shared pool of configurable computing resources. Cloud data center's cost is becoming the hot topi... 详细信息
来源: 评论
Research on the Performance of Mining Packets of Educational network for Malware Detection between PM and VM
Research on the Performance of Mining Packets of Educational...
收藏 引用
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Jun Yang Jiangdong Deng Baojiang Cui Haifeng Jin College of Computer Science Beijing University of posts and telecommunications Beijing China West of Tucheng Beijing National Engineering Laboratory for Mobile Network Security
With the fast development of online education, the volume of education data traffic increased dramatically. security information is potential to be mined from it. We can use data mining with some cloud computing platf... 详细信息
来源: 评论
A Scalable Distributed Private Stream Search System
A Scalable Distributed Private Stream Search System
收藏 引用
International Conference on Distributed Computing Systems Workshop
作者: Peng Zhang Yan Li Qingyun Liu Hailun Lin National Engineering Laboratory for Information Security Technologies Institute of Information Engineering Chinese Academy of Sciences National Computer Network Emergency Response Technical Team Beijing China
With the coming of the era of big data, people are more concerned about data privacy. On the one hand, the users are more eager for fresh and low-latency search results than ever before. On the other hand, they do not... 详细信息
来源: 评论