咨询与建议

限定检索结果

文献类型

  • 264 篇 会议
  • 221 篇 期刊文献

馆藏范围

  • 485 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 251 篇 计算机科学与技术...
    • 225 篇 软件工程
    • 79 篇 信息与通信工程
    • 38 篇 生物工程
    • 33 篇 电气工程
    • 30 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 27 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 10 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 土木工程
  • 160 篇 理学
    • 99 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 15 篇 系统科学
    • 11 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain
  • 7 篇 federated learni...

机构

  • 39 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 36 篇 school of comput...
  • 30 篇 shaanxi key labo...
  • 19 篇 school of comput...
  • 13 篇 key lab of infor...
  • 11 篇 xi'an university...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...
  • 7 篇 zhejiang lab

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 21 篇 wang yichuan
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 16 篇 liu jun
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 luo minnan
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 443 篇 英文
  • 27 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
485 条 记 录,以下是361-370 订阅
排序:
Full Secure Attribute-Based Broadcast Encryption Achieved through Selective Techniques
Full Secure Attribute-Based Broadcast Encryption Achieved th...
收藏 引用
2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016)
作者: Jin SUN Yu-pu HU Department of Application Mathematics in Xi'an University of Technology Key Lab of Computer Network and Information Security Xidian University
According to the broadcast encryption scheme couldn't consider its security and efficiency in one model simultaneously, a full secure attribute-based broadcast encryption achieved through selective techniques was ... 详细信息
来源: 评论
Distributed energy balanced routing for wireless sensor network using energy prediction metric
Distributed energy balanced routing for wireless sensor netw...
收藏 引用
International Conference on Information Science and Control Engineering
作者: Quan Guo Xiaoying Song Liaoning Key Lab of Network Security and Computing Technology Dalian Neusoft Information Institute College of Computer Science and Engineering Northeastern University
A considerable amount of energy efficient routing algorithms have been proposed to save energy and prolong network lifetime. Those algorithms mainly focus on forwarding packets along the minimum energy path to the sin... 详细信息
来源: 评论
Chosen-ciphertext secure bidirectional proxy broadcast re-encryption schemes
收藏 引用
International Journal of Information and Communication technology 2016年 第4期8卷 405-419页
作者: Sun, Jin Hu, Yupu Department of Application Mathematics Xi'an University of Technology Xi'an710048 China Key Lab. of Computer Network and Information Security Xidian University Xi'an710071 China
A proxy re-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts decryptable by the delegatee. However, how to structure a chosen-ciphertext secure proxy re-encryp... 详细信息
来源: 评论
Avoiding optimal mean robust PCA/2DPCA with non-greedy 1-norm maximization  25
Avoiding optimal mean robust PCA/2DPCA with non-greedy 1-nor...
收藏 引用
25th International Joint Conference on Artificial Intelligence, IJCAI 2016
作者: Luo, Minnan Nie, Feiping Chang, Xiaojun Yang, Yi Hauptmann, Alexander Zheng, Qinghua Shaanxi Province Key Lab of Satellite-Terrestrial Network Department of Computer Science Xi'An Jiaotong University China School of Computer Science Center for Optical Imagery Analysis and Learning Northwestern Polytechnical University China Centre for Quantum Computation and Intelligent Systems University of Technology Sydney Australia School of Computer Science Carnegie Mellon University PA United States
Robust principal component analysis (PCA) is one of the most important dimension reduction techniques to handle high-dimensional data with outliers. However, the existing robust PCA presupposes that the mean of the da... 详细信息
来源: 评论
Debugging Multithreaded Programs as if They Were Sequential
Debugging Multithreaded Programs as if They Were Sequential
收藏 引用
International Conference on Software Analysis, Testing and Evolution (SATE)
作者: Xiaodong Zhang Zijiang Yang Qinghua Zheng Yu Hao Pei Liu Lechen Yu Ming Fan Ting Liu Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi China Department of Computer Science Western Michigan University Kalamazoo MI USA
Debugging multithreaded software is challenging because the basic assumption that underlies sequential software debugging, i.e. the program behavior is deterministic under fixed inputs, is no longer valid due to the n... 详细信息
来源: 评论
Cryptanalysis of quantum secret sharing with d-level single particles
收藏 引用
Physical Review A 2016年 第6期93卷 062343-062343页
作者: Song Lin Gong-De Guo Yong-Zhen Xu Ying Sun Xiao-Fen Liu School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China Key Lab of Network Security and Cryptography Fujian Normal University Fuzhou 350007 China Beijing Electronic Science and Technology Institute Beijing 100070 China
In a recent paper [V. Karimipour and M. Asoudeh, Phys. Rev. A 92, 030301(R) (2015)], a multiparty quantum secret-sharing protocol based on d-level single particles was proposed. We discussed the security of this proto... 详细信息
来源: 评论
CRM: A new dynamic cross-layer reputation computation model in wireless networks
收藏 引用
computer Journal 2015年 第4期58卷 656-667页
作者: Lin, Hui Hu, Jia Ma, Jianfeng Xu, Li Yang, Li Key Lab of Network Security and Cryptology Fujian Normal University Fuzhou China Department of Mathematics and Computer Science Liverpool Hope University LiverpoolL16 9JD United Kingdom Shanxi Key Laboratory of Network and System Security Xidian University Xi'an Shaanxi China
Multi-hop wireless networks (MWNs) have been widely accepted as an indispensable component of next-generation communication systems due to their broad applications and easy deployment without relying on any infrastruc... 详细信息
来源: 评论
security-Aware Routing and Core Allocation in Elastic Optical network with Multi-core
Security-Aware Routing and Core Allocation in Elastic Optica...
收藏 引用
International Conference on Computational Intelligence and security
作者: Hejun Xuan Yuping Wang Shanshan Hao Zhanqi Xu Xiaodong Li Xiaozhi Gao School of Computer Science and Technology Xidian University Xi'an Shaanxi China School of Computer Science and Information Technology Royal Melbourne Institute of Technology Melbourne Australia State Key Lab of Integrated Service Network Xidian University Xi'an Shaanxi China School of Engineering Science Lappeenranta University of Technology Finland
The routing, core allocation and spectrum assignment (RSA) problem in elastic optical networks with multi-core is a well-known NP-hard problem and the network information security is also an important problem in elast... 详细信息
来源: 评论
A new model for nickname detection based on network structure and similarity propagation
A new model for nickname detection based on network structur...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: Zhaoli Liu Tao Qin Dan Zhao Xiaohong Guan Tao Yang MoE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi China Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Department of Automation Northwestern Polytechnical University Xi'an China
Users can participate in variety topics and express their opinions using different kinds of online applications, and the IDs (nickname) they used are usually virtual and difficult for finding the physical person. Whic... 详细信息
来源: 评论
The design and implementation of network attack and defense platform based on cloud desktop
收藏 引用
Journal of Physics: Conference Series 2017年 第1期887卷
作者: Zining Yan Yunhan Wang Shijiao Shao Boquan Li Embedded System Lab. College of Computer Science and Technology Harbin China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Network Assessment of Technology Chinese Academy of Sciences Beijing China
This paper discusses the cloud desktop technology, virtualization technology and penetration testing technology used in the network attack and defense training platform, and introduces the design and implementation pr...
来源: 评论