咨询与建议

限定检索结果

文献类型

  • 270 篇 会议
  • 224 篇 期刊文献

馆藏范围

  • 494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 260 篇 计算机科学与技术...
    • 228 篇 软件工程
    • 80 篇 信息与通信工程
    • 38 篇 生物工程
    • 35 篇 控制科学与工程
    • 34 篇 电气工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 土木工程
  • 163 篇 理学
    • 100 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 28 篇 物理学
    • 15 篇 系统科学
    • 13 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain
  • 7 篇 federated learni...

机构

  • 40 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 shaanxi key labo...
  • 20 篇 school of comput...
  • 13 篇 key lab of infor...
  • 12 篇 shaanxi key labo...
  • 11 篇 xi'an university...
  • 11 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 school of comput...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 hei xinhong
  • 17 篇 liu jun
  • 17 篇 shen yulong
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 luo minnan
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 442 篇 英文
  • 37 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
494 条 记 录,以下是421-430 订阅
排序:
Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
Improvement on Ahn et al.'s RSA P-homomorphic signature sche...
收藏 引用
8th International ICST Conference on security and Privacy in Communication networks, SecureComm 2012
作者: Wang, Zhiwei College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100190 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m... 详细信息
来源: 评论
Hybrid relaying and jamming for secure two-way relay networks with passive eavesdroppers
Hybrid relaying and jamming for secure two-way relay network...
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Hui-Ming Wang Xiang-Gen Xia Qinye Yin Pengcheng Mu School of Electronic and Information Engineering Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi P. R. China Department of Electrical and Computer Engineering Chonbuk National University Jeonju DE Korea
Exploiting the idea of cooperative communications is an efficient way to improve the physical-layer security of a wireless transmission in the presence of passive eavesdroppers. In this paper, we propose a hybrid coop... 详细信息
来源: 评论
Software structure evaluation based on the interaction and encapsulation of methods
收藏 引用
Science China(Information Sciences) 2012年 第12期55卷 2816-2825页
作者: ZHENG QingHua 1,2,OU ZhiJiang 1,2,LIU Ting 1,YANG ZiJiang 3,HOU YuQiao 1,2 & ZHENG Chao 1,2 1 MOE key laboratory for Intelligent networks and network security,Xi'an Jiaotong University,Xian 710049,China 2 shaanxi key laboratory of Satellite-terrestrial network technology R&D,Xi'an Jiaotong University,Xian 710049,China 3 Department of computer Science,Western Michigan University,Michigan,USA 1. MOE Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xian 710049 China2. Shaanxi Key Laboratory of Satellite-terrestrial Network Technology R&D Xi’an Jiaotong University Xian 710049 China3. Department of Computer Science Western Michigan University Michigan USA
Software structure is the most important factor affecting the quality of a *** evaluation of software structure is a foundational technique for software ***,the traditional evaluation criteria,such as "high cohes... 详细信息
来源: 评论
Learning to identify core term of knowledge unit from short text
Learning to identify core term of knowledge unit from short ...
收藏 引用
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012
作者: Tian, Zhenhua Wang, Zhen Liu, Ziqi Xiang, Hengheng Liu, Jun Zheng, Qinghua Shaanxi Province Key Lab. of Satellite and Terrestrial Network Tech. RandD Department of Computer Science and Technology Xi'An Jiaotong University Shaanxi 710049 China
We present a new task of identifying core term (CT) of knowledge unit (KU) from text for knowledge management and service. Two kinds of approaches, including binary classification using naïve bayesian, decision t... 详细信息
来源: 评论
Design of distribution transformer monitoring system based on LPC2103
收藏 引用
Journal of Convergence Information technology 2012年 第21期7卷 120-126页
作者: Sun, Qindong Wang, Qian Wang, Nan Network Computing and Security Key Lab of Shaanxi Xi'an University of Technology Xi'an 710048 China
Aimed at satisfying the monitoring requirement of distribution transformer, a kind of distribution transformer monitoring system based on LPC2103 is designed. Hardware module and data processing program of the monitor... 详细信息
来源: 评论
A measurement study on potential inter-domain routing diversity
收藏 引用
IEEE Transactions on network and Service Management 2012年 第3期9卷 268-278页
作者: Hu, Chengchen Chen, Kai Chen, Yan Liu, Bin Vasilakos, Athanasios V. MoE Key Laboratory of Intelligent Networks and Network Security Department of Computer Science and Techonolgy Xi'An Jiaotong University Xi'an Shaanxi China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Department of Electrical Engineering and Computer Science Northwestern University Evanston IL United States Department of Computer Science and Technology Tsinghua University Beijing China Department of Computer and Telecommunications Engineering University of Western Macedonia GR 50100 Kozani Greece
In response to Internet emergencies, Internet resiliency is investigated directly through an autonomous system (AS) level graph inferred from policy-compliant BGP paths or/and traceroute paths. Due to policy-driven in... 详细信息
来源: 评论
The Double-System Architecture for Trusted OS
收藏 引用
Physics Procedia 2012年 25卷 2006-2013页
作者: Yong Zhao Yu Li Jing Zhan College of Computer Science and Technology Beijing University of Technology Beijing 100124 China Key Lab of Information Network Security Ministry of Public Security Shanghai 201204 China
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. H... 详细信息
来源: 评论
The Double-System Architecture for Trusted OS
The Double-System Architecture for Trusted OS
收藏 引用
2012 International Conference on Solid State Devices and Materials Science(SSDMS 2012)
作者: Yong Zhao Yu Li Jing Zhan College of Computer Science and Technology Beijing University of Technology Key Lab of Information Network Security Ministry of Public Security
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system(TOS) is proposed to try to solve these problems. Ho... 详细信息
来源: 评论
Research on Separation of Three Powers Architecture for Trusted OS
收藏 引用
Physics Procedia 2012年 25卷 1168-1175页
作者: Yu Li Yong Zhao Siyuan Xin College of Computer Science and Technology Beijing University of Technology Beijing 100124 China Key Lab of Information Network Security Ministry of Public Security Shanghai 201204 China Institute of Electronic Technology the PLA Information Engineering University
The privilege in the operating system (OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control,... 详细信息
来源: 评论
MOEA/D with iterative thresholding algorithm for sparse optimization problems
MOEA/D with iterative thresholding algorithm for sparse opti...
收藏 引用
12th International Conference on Parallel Problem Solving from Nature, PPSN 2012
作者: Li, Hui Su, Xiaolei Xu, Zongben Zhang, Qingfu Institute for Information and System Sciences Key Lab. for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi 710049 China School of Computer Science and Electronic Engineering University of Essex Wivenhoe Park Colchester CO4 3SQ United Kingdom
Currently, a majority of existing algorithms for sparse optimization problems are based on regularization framework. The main goal of these algorithms is to recover a sparse solution with k non-zero components(called ... 详细信息
来源: 评论