咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 412 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 486 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 160 篇 信息与通信工程
    • 125 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 52 篇 生物工程
    • 29 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
    • 16 篇 化学工程与技术
  • 275 篇 理学
    • 168 篇 数学
    • 55 篇 生物学
    • 49 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 39 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 26 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 31 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...
  • 11 篇 shandong enginee...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 12 篇 yang xiaoyuan
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 902 篇 英文
  • 71 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1001 条 记 录,以下是781-790 订阅
排序:
Performance Analysis and Interference Cancellation for Heterogeneous network with Massive MIMO
Performance Analysis and Interference Cancellation for Heter...
收藏 引用
IEEE Global Conference on Signal and Information Processing
作者: Yinjun Liu Lu Lu Geoffrey Li Qimei Cui National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical and Computer Engineering Georgia Institute of Technology 30322 USA
Heterogenous network and massive MIMO can significantly enhance spectral and energy efficiency of wireless networks and therefore have attracted much attention. In this paper, we analyze the performance of a downlink ... 详细信息
来源: 评论
A method of oversized image generation based on stitching JPEG file streams
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2015年 第8期8卷 159-168页
作者: Sun, Qindong Hua, Wu Tian, Minying Wang, Yan School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Xi’an University of Technology Xi’an China
Due to memory limitation, the displaying and processing of the oversized images have been a bottleneck for various applications, which is a hot research spot in the image processing field. The traditional methods are ... 详细信息
来源: 评论
A New Program Classification Method Based on Binary Instrumentation and Instruction Flow Feature Extraction
A New Program Classification Method Based on Binary Instrume...
收藏 引用
International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA)
作者: Baojiang Cui Mengchen Cao Shilei Chen Weikong Qi School of Computer Science Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Security China Institute of Telecommunication Satellite CAST China
With the development of Internet technology, more and more unknown programs appears in the network environment, the detection and classification technology is increasingly becoming an important technology in the field... 详细信息
来源: 评论
A deniable group key authentication scheme under random oracle model
收藏 引用
Journal of Information and Computational Science 2015年 第9期12卷 3583-3597页
作者: Zhang, Gefei Fan, Dan Zhang, Yuqing Li, Xiaowei National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China
Deniable encryption is one of the most important services for Group Key Authentication (GKA) schemes in modern networks. To provide secure properties of Deniable Group Key Authentication (DGKA) scheme, various DGKA sc... 详细信息
来源: 评论
Detection of LTE Protocol Based on Format Fuzz
Detection of LTE Protocol Based on Format Fuzz
收藏 引用
International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA)
作者: Baojiang Cui Shengbo Feng Qinshu Xiao Ming Li School of Computer Science Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Security China Institute of Telecommunication Satellite CAST China
Through the analysis of LTE protocol and its security threat, this paper profoundly researches the security mechanism of RLC layer protocol in LTE protocol and the security detection technology of LTE protocol. In thi... 详细信息
来源: 评论
Research on Storage and Retrieval Method of Mass Data for High-Speed Train
Research on Storage and Retrieval Method of Mass Data for Hi...
收藏 引用
International Conference on Computational Intelligence and security
作者: Bin Wang Fan Li Xinhong Hei Weigang Ma Lei Yu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China
In order to ensure the safeties of high-speed train, a lot of sensors are installed in the train to real-time monitor its operation status. These sensors collect amounts of data which may be several GBs for one time o... 详细信息
来源: 评论
Space Time Protocol Based on IEEE1588
Space Time Protocol Based on IEEE1588
收藏 引用
International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA)
作者: Jun Yang Yong Guo Zijing Cheng Kai Lin Baojiang Cui School of Computer Science Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Security China The Academy of Satellite Application Beijing China
With the increase in the number of satellites, the security time synchronization protocol between satellites and servers on the ground increasingly important. But, the time protocol that existing in space lack of secu... 详细信息
来源: 评论
QoS-aware User Satisfaction Oriented Joint Resource Block and Power Allocation in OFDMA Systems with Cloud Based Information Sharing
QoS-aware User Satisfaction Oriented Joint Resource Block an...
收藏 引用
2015 IEEE 16th International Conference on Communication Technology(ICCT 2015)
作者: Aini Li Yan Sun Xiaodong Xu XuYang Queen Mary University of London Electronic Engineering and Computer Science Beijing University of Posts and Telecommunications National Engineering Laboratory for Mobile Network Security MPI-QMUL InformationSystems Research Center (ISRC)
OFDMA is a suitable technique for delivering high data rate services and one of the most important technologies applied in LTE and 5G wireless *** OFDMA systems, dynamic resource block(RB)allocation considering QoS ... 详细信息
来源: 评论
Ciphertext-auditable identity-based encryption
收藏 引用
International Journal of network security 2015年 第1期17卷 23-28页
作者: Lin, Changlu Li, Yong Lv, Kewei Chang, Chin-Chen Fujian Province Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou350007 China Beijing Municipal Commission of Education Beijing100044 China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing100049 China Department of Information Engineering and Computer Science Feng Chia University Taichung40724 Taiwan Department of Computer Science and Information Engineering Asia University Taichung41354 Taiwan
Ciphertext-auditability of public key encryption scheme means that the ciphertext should been verified by any-one whether it was actually created by the public key. It also should satisfy two additional requirements: ... 详细信息
来源: 评论
Phase detection based range estimation with a dual-band robust Chinese remainder theorem
收藏 引用
Science China(Information Sciences) 2014年 第2期57卷 18-26页
作者: YANG Bin WANG WenJie XIA XiangGen YIN QinYe Ministry of Education (MOE) Key Laboratory for Intelligent Networks and Network Security School of Electronics and Information EngineeringXi’an Jiaotong University Department of Electrical and Computer Engineering University of Delaware
Range estimation with multifrequency phases is a common practice in localization *** challenge of this method is the phase *** Chinese remainder theorem(CRT)based phase unwrapping algorithms have been proposed to solv... 详细信息
来源: 评论