咨询与建议

限定检索结果

文献类型

  • 270 篇 会议
  • 224 篇 期刊文献

馆藏范围

  • 494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 260 篇 计算机科学与技术...
    • 228 篇 软件工程
    • 80 篇 信息与通信工程
    • 38 篇 生物工程
    • 35 篇 控制科学与工程
    • 34 篇 电气工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 土木工程
  • 163 篇 理学
    • 100 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 28 篇 物理学
    • 15 篇 系统科学
    • 13 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain
  • 7 篇 federated learni...

机构

  • 40 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 shaanxi key labo...
  • 20 篇 school of comput...
  • 13 篇 key lab of infor...
  • 12 篇 shaanxi key labo...
  • 11 篇 xi'an university...
  • 11 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 school of comput...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 hei xinhong
  • 17 篇 liu jun
  • 17 篇 shen yulong
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 luo minnan
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 442 篇 英文
  • 37 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
494 条 记 录,以下是431-440 订阅
排序:
Research on Separation of Three Powers Architecture for Trusted OS
Research on Separation of Three Powers Architecture for Trus...
收藏 引用
2012 International Conference on Solid State Devices and Materials Science(SSDMS 2012)
作者: Yu Li Yong Zhao Siyuan Xin College of Computer Science and Technology Beijing University of Technology Key Lab of Information Network Security Ministry of Public Security Institute of Electronic Technology the PLA Information Engineering University
The privilege in the operating system(OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control, ... 详细信息
来源: 评论
Fully Secure Broadcast Encryption for Inner-Product Predicates
收藏 引用
Procedia Engineering 2012年 29卷 316-320页
作者: Sun Jin Hu Yu-pu Department of Application Mathematics in Xi’an University of Technology Xi’an 710048 China Key Lab of Computer Network and Information Security Xidian University Xi’an 710071 China
According to the broadcast encryption scheme with wide applications in the real world without considering its security and efficiency in the model simultaneously, a fully secure broadcast encryption for inner-product ... 详细信息
来源: 评论
CCA-secure unidirectional proxy broadcast re-encryption in the standard model
收藏 引用
Journal of Computational Information Systems 2012年 第14期8卷 5909-5916页
作者: Sun, Jin Hu, Yupu Department of Application Mathematics in Xi'an University of Technology Xi'an 710048 China Key Lab. of Computer Network and Information Security Xidian University Xi'an 710071 China
Considering construct a chosen-ciphertext secure unidirectional PRE in the adaptive corruption model is still an important question and the broadcast encryption with wide applications in the real world, the first CCA-... 详细信息
来源: 评论
Malware Detection in Smartphone Using Hidden Markov Model
Malware Detection in Smartphone Using Hidden Markov Model
收藏 引用
International Conference on Multimedia Information networking and security (MINES)
作者: Kejun Xin Gang Li Zhongyuan Qin Qunfang Zhang Nanjing Sample Technology Co. Ltd. Nanjing Jiangsu China Ministry of Public Security Key Lab of Information Network Security Shanghai China Computer Department Nanjing Institute of Artillery Corps Nanjing Jiangsu China
In recent years, smart phone technology is becoming increasingly popular. The dangers of mobile phone malwares are becoming more and more serious. In this paper we present a new mobile smartphone malware detection sch... 详细信息
来源: 评论
Quantum Secure Direct Communication with Five-Qubit Entangled State
收藏 引用
Chinese Physics Letters 2011年 第3期28卷 17-20页
作者: LIN Song GAO Fei LIU Xiao-Fen School of Mathematics and Computer Science Fujian Normal UniversityFuzhou 350007 Key Lab of Network Security and Cryptography Fujian Normal UniversityFuzhou 350007 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[***.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state *** we build a quantum... 详细信息
来源: 评论
The availability of fast-flux service networks
The availability of fast-flux service networks
收藏 引用
2011 International Conference on Selected Topics in Mobile and Wireless networking, iCOST 2011
作者: Xu, Yunfeng Lu, Yansheng Guo, Zhengbiao School of Computer Science and Technology Hua Zhong University of Science and Technology Wuhan China Hubei Province Public Security Bureau to Defend the Corps Cyber Security Key Lab of Information NetWork Security Ministry of Public Security China
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov... 详细信息
来源: 评论
Abuse-freeness electronic payment protocol
Abuse-freeness electronic payment protocol
收藏 引用
3rd IEEE International Conference on Intelligent networking and CollaborativeSystems, INCoS 2011
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an China Xi'an Branch Shaanxi Telecom Ltd. Xi'an China
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in ... 详细信息
来源: 评论
A topic partition algorithm based on average Sentence similarity for interactive text
A topic partition algorithm based on average Sentence simila...
收藏 引用
2011 7th International Conference on Computational Intelligence and security, CIS 2011
作者: Zhu, Haiping Chen, Yan Yang, Yang Gao, Chao Department of Computer Science and Technology Xi'an Jiaotong University Shaanxi Province Key Lab. of Satellite and Terrestrial Network Tech. R and D Xi'an China Ministry of Education Key Lab. for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an 710049 China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China
Based on the research and analysis of interactive text properties, the word frequency statistics and synonyms merger are imported to obtain the keywords of interactive text. The Sentence similarity is used to describe... 详细信息
来源: 评论
Forward secure proxy blind signature scheme
Forward secure proxy blind signature scheme
收藏 引用
3rd IEEE International Conference on Intelligent networking and CollaborativeSystems, INCoS 2011
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an China Xi'an Branch Shaanxi Telecom Ltd. Xi'an China
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper prop... 详细信息
来源: 评论
A trust-personality mechanism for emotion compensation
A trust-personality mechanism for emotion compensation
收藏 引用
International Conference on Advanced Learning Technologies
作者: Qin, Jiwei Zheng, Qinghua Tian, Feng Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China
E-learning provides an unprecedented flexibility and convenience for learners via breaking the limitation of spacetime. Most researchers are only concerned about the learner's cognitive and construct a great amoun... 详细信息
来源: 评论