咨询与建议

限定检索结果

文献类型

  • 270 篇 会议
  • 224 篇 期刊文献

馆藏范围

  • 494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 260 篇 计算机科学与技术...
    • 228 篇 软件工程
    • 80 篇 信息与通信工程
    • 38 篇 生物工程
    • 35 篇 控制科学与工程
    • 34 篇 电气工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 土木工程
  • 163 篇 理学
    • 100 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 28 篇 物理学
    • 15 篇 系统科学
    • 13 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain
  • 7 篇 federated learni...

机构

  • 40 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 shaanxi key labo...
  • 20 篇 school of comput...
  • 13 篇 key lab of infor...
  • 12 篇 shaanxi key labo...
  • 11 篇 xi'an university...
  • 11 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 school of comput...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 hei xinhong
  • 17 篇 liu jun
  • 17 篇 shen yulong
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 luo minnan
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 442 篇 英文
  • 37 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
494 条 记 录,以下是391-400 订阅
排序:
Energy management of cooperative microgrids with P2P energy sharing in distribution networks
Energy management of cooperative microgrids with P2P energy ...
收藏 引用
IEEE International Conference on Smart Grid Communications (SmartGridComm)
作者: Tian Liu Xiaoqi Tan Bo Sun Yuan Wu Xiaohong Guan Danny H. K. Tsang Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology Hong Kong MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China College of Information Engineering Zhejiang University of Technology Hangzhou China
To handle the mismatch problem between local demand and local generation in microgrids (MGs), the paradigm of peer-to-peer (P2P) energy sharing among neighboring MGs has been considered as a promising solution for imp... 详细信息
来源: 评论
Stability analysis of information spreading on SNS based on refined SEIR model
收藏 引用
China Communications 2014年 第11期11卷 24-33页
作者: Wang, Chao Hu, Yuanping Liu, Chengyuan Liu, Zhihong Ma, Jianfeng School of Computer Science and Technology Xidian University Xi'an 710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China
Investigating the stability of information spreading over SNS helps to understand the principles inherent in the spreading behavior. This paper explores the mechanisms of information spreading including stifling mecha... 详细信息
来源: 评论
Novel way to research nonlinear feedback shift register
收藏 引用
Science China(Information Sciences) 2014年 第9期57卷 161-174页
作者: ZHAO DaWei PENG HaiPeng LI LiXiang HUI SiLi YANG YiXian Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Zhejiang Provincial Key Lab of Data Storage and Transmission Technology Hangzhou Dianzi University National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center
In this paper,we regard the nonlinear feedback shift register(NLFSR)as a special Boolean network,and use semi-tensor product of matrices and matrix expression of logic to convert the dynamic equations of NLFSR into an... 详细信息
来源: 评论
DBPD: A dynamic birthmark-based software plagiarism detection tool  26
DBPD: A dynamic birthmark-based software plagiarism detectio...
收藏 引用
26th International Conference on Software Engineering and Knowledge Engineering, SEKE 2014
作者: Tian, Zhenzhou Zheng, Qinghua Fan, Ming Zhuang, Eryue Wang, Haijun Liu, Ting Ministry of Education Key Lab For Intelligent Networks and Network Security Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China
With the burst of open source software, software plagiarism has been a serious threat to the software industry. In this paper, we present the demo tool DBPD: Dynamic Birthmark-based Software Plagiarism Detection. Majo... 详细信息
来源: 评论
Design and Prototype Implementation of Social Value Evaluation System for Voluntary Service
Design and Prototype Implementation of Social Value Evaluati...
收藏 引用
2015 IEEE Advanced Information technology,Electronic and Automation Control Conference(IAEAC 2015)
作者: Min Liu Fan Wu Feng Tian Haiping Zhu Nazaraf Shah Qinghua Zheng Yan Chen Department of Computer Science and Technology Xi'an Jiaotong University Shaanxi Province Key Lab.of Satellite and Terrestrial Network Tech.R&D Systems Engineering Institute Xi'an Jiaotong University Shaanxi Province Key Lab.of Satellite and Terrestrial Network Tech.R&D Department of Computer Science and Technology Coventry University
Evaluating the social value of voluntary service(especially the quality of collaborative service) not only measures the degree of society civilization,but also provides the guidance or indicator of overall arrangement... 详细信息
来源: 评论
One forward-secure signature scheme using bilinear maps and its applications
One forward-secure signature scheme using bilinear maps and ...
收藏 引用
作者: Yu, Jia Kong, Fanyu Cheng, Xiangguo Hao, Rong Li, Guowen College of Information Engineering Qingdao University 266071 Qingdao China Shandong Provincial Key Laboratory of Computer Network 250014 Jinan China Institute of Network Security Shandong University 250100 Jinan China Key Lab of Cryptographic Technology and Information Security Ministry of Education Jinan 250100 China School of Computer Science and Technology Shandong Jianzhu University 250100 Jinan China
Forward-secure signatures are proposed to deal with the key exposure problem. Compared to regular signatures, forward-secure signatures have a special update algorithm that can evolve the new private key in each time ... 详细信息
来源: 评论
ESYN: Efficient synchronization clustering algorithm based on dynamic synchronization model
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 86-93页
作者: Dong, Xue-Wen Yang, Chao Sheng, Li-Jie Ma, Jian-Feng Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China School of Computer Science and Technology Xidian University Xi'an710071 China
Clustering is an important research field in data mining. Based on dynamical synchronization model, an efficient synchronization clustering algorithm ESYN is proposed. Firstly, based on local structure information of ... 详细信息
来源: 评论
An adaptively secure multi-authority ciphertext-policy ABE scheme on prime order groups
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2014年 第4期42卷 696-702页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng Ma, Jun School of Computer Science and Technology Xidian University Xi'an Shaanxi 710071 China School of Telecommunication Engineering Xidian University Xi'an Shaanxi 710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an Shaanxi 710071 China
Previous adaptively secure multi-authority attribute-based encryption (ABE) schemes suffered from superfluous computation overhead on composite order groups. To tackle this problem, an adaptively secure multi-authorit... 详细信息
来源: 评论
Directed test suite augmentation via exploiting program dependency  6
Directed test suite augmentation via exploiting program depe...
收藏 引用
6th International Workshop on Constraints in Software Testing, Verification, and Analysis, CSTVA 2014
作者: Wang, Haijun Guan, Xiaohong Zheng, Qinghua Liu, Ting Shen, Chao Yang, Zijiang MOE Key Lab. for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China College of Computer and Technology Xi'an University of Technology Xi'an China Western Michigan University KalamazooMI United States
Regression testing is a practice to discover faults introduced in the program modification. However, the existing test suite is usually designed at an early stage of software development and is therefore insensitive t... 详细信息
来源: 评论
Reducing test cases with causality partitions  26
Reducing test cases with causality partitions
收藏 引用
26th International Conference on Software Engineering and Knowledge Engineering, SEKE 2014
作者: Wang, Haijun Guan, Xiaohong Zheng, Qinghua Liu, Ting Li, Xiangyang Yu, Lechen Yang, Zijiang MOE Key Lab. for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China College of Computer and Technology Xi'an University of Technology Xi'an China Western Michigan University KalamazooMI United States
Automatic test case generation using symbolic execution suffers from the problem of path explosion: the number of paths to be explored may grow exponentially with the scale of a program. We believe that different path... 详细信息
来源: 评论