咨询与建议

限定检索结果

文献类型

  • 270 篇 会议
  • 224 篇 期刊文献

馆藏范围

  • 494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 260 篇 计算机科学与技术...
    • 228 篇 软件工程
    • 80 篇 信息与通信工程
    • 38 篇 生物工程
    • 35 篇 控制科学与工程
    • 34 篇 电气工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 土木工程
  • 163 篇 理学
    • 100 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 28 篇 物理学
    • 15 篇 系统科学
    • 13 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain
  • 7 篇 federated learni...

机构

  • 40 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 shaanxi key labo...
  • 20 篇 school of comput...
  • 13 篇 key lab of infor...
  • 12 篇 shaanxi key labo...
  • 11 篇 xi'an university...
  • 11 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 school of comput...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 hei xinhong
  • 17 篇 liu jun
  • 17 篇 shen yulong
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 luo minnan
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 442 篇 英文
  • 37 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
494 条 记 录,以下是451-460 订阅
排序:
Identification and extraction of topic elements for Chinese interactive text
Identification and extraction of topic elements for Chinese ...
收藏 引用
2nd International Conference on Multimedia technology, ICMT 2011
作者: Zhu, Haiping Yang, Yang Chen, Yan Yu, Xiaolu Department of Computer Science and Technology Xi'an Jiaotong University Min. of Education Key Lab for Intelligent Networks and Network Security of xi'An Jiaotong University Xi'an China
This paper is based on identification and extraction of topic elements for Chinese interactive text. A topic segmentation method based on time sequence is achieved. Then a novel identification and extraction algorithm... 详细信息
来源: 评论
A Trust-Personality Mechanism for Emotion Compensation
A Trust-Personality Mechanism for Emotion Compensation
收藏 引用
International Conference on Advanced Learning Technologies (ICALT)
作者: Jiwei Qin Qinghua Zheng Feng Tian Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China Xi'an Jiaotong University Xi'an Shaanxi CN Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China
E-learning provides an unprecedented flexibility and convenience for learners via breaking the limitation of space-time. Most researchers are only concerned about the learner's cognitive and construct a great amou... 详细信息
来源: 评论
A Topic Partition Algorithm Based on Average Sentence Similarity for Interactive Text
A Topic Partition Algorithm Based on Average Sentence Simila...
收藏 引用
International Conference on Computational Intelligence and security
作者: Haiping Zhu Yan Chen Yang Yang Chao Gao Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China Xi'an Jiaotong University Xi'an Shaanxi CN Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China
Based on the research and analysis of interactive text properties, the word frequency statistics and synonyms merger are imported to obtain the keywords of interactive text. The Sentence similarity is used to describe... 详细信息
来源: 评论
Cryptanalysis of two ID based password authentication schemes for multi-server environments
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2011年 第1期5卷 87-94页
作者: Tan, Zuowen School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
Recently, Hsiang and Shih proposed a secure dynamic ID based remote user authentication scheme for multi-server environment. In this paper, we show that Hsiang and Shih's scheme is still vulnerable to off-line pas... 详细信息
来源: 评论
Improvement on a password authentication scheme for multi-server environments
收藏 引用
Journal of Convergence Information technology 2011年 第1期6卷 218-228页
作者: Tan, Zuowen School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
Since each user needs to have different passwords with different remote servers in the multi-server environment, it is impossible to apply the authentication methods in a single server environment to the multi-server ... 详细信息
来源: 评论
Identification and extraction of topic elements for Chinese interactive text
Identification and extraction of topic elements for Chinese ...
收藏 引用
International Conference on Multimedia technology
作者: Haiping Zhu Yang Yang Yan Chen Xiaolu Yu Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Technology Research and Development Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi''an Jiaotong University Xi'an China Department of Computer Science and Technology Xi'an Jiaotong University China Department of Computer Science and Technology Xi''an Jiaotong University Xi'an China Xi'an Jiaotong University Xi'an Shaanxi CN
This paper is based on identification and extraction of topic elements for Chinese interactive text. A topic segmentation method based on time sequence is achieved. Then a novel identification and extraction algorithm... 详细信息
来源: 评论
A NEW THRESHOLD AUTHENTICATED ENCRYPTION SCHEME USING labOR-DIVISION SIGNATURE
收藏 引用
Journal of Systems Science & Complexity 2010年 第6期23卷 1183-1194页
作者: Zuowen TAN School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China.
This paper shows several security weaknesses of a threshold authenticated encryption scheme. A new threshold authenticated encryption scheme using labor-division signature is proposed without redundancy added to messa... 详细信息
来源: 评论
Application of D-S Evidence theory to uncertainty of assessment result in E-government
Application of D-S Evidence theory to uncertainty of assessm...
收藏 引用
7th Web Information Systems and Applications Conference, WISA 2010, 5th Workshop on Semantic Web and Ontology, SWON 2010, 4th Workshop on Electronic Government technology and Application, EGTA 2010
作者: Xia, Bing Pan, Heng Zheng, Qiusheng Miao, Fengjun School of Computer Science Zhongyuan University of Technology Zhengzhou Key Lab of Computer Network Security Assessment Zhengzhou China
How to solve uncertainty of assessment result is an important issue in E-government. Current qualitative assessment are based on subjective qualitative evaluation and the rigid division of the quantitative data, howev... 详细信息
来源: 评论
An efficient automated trust negotiation framework supporting adaptive policies
An efficient automated trust negotiation framework supportin...
收藏 引用
2nd International Workshop on Education technology and computer Science, ETCS 2010
作者: Liu, Bailing Lu, Hongwei Zhao, Yizhu College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Lab of Information Network Security Ministry of Public Security Shanghai China
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. Prev... 详细信息
来源: 评论
An immune danger theory inspired model for network security monitoring
An immune danger theory inspired model for network security ...
收藏 引用
2010 International Conference on Challenges in Environmental Science and computer Engineering, CESCE 2010
作者: Sun, Feixian Han, Xinchao Wang, Jianhong School of Computer Science Zhongyuan University of Technology Zhengzhou China Zhengzhou Key Lab of Computer Network Security Assessment Zhengzhou China
In order to overcome the deficiencies of the traditional Artificial Immune Systems (AIS) in the security field of computer information system, an immune danger theory inspired model for network security monitoring is ... 详细信息
来源: 评论