咨询与建议

限定检索结果

文献类型

  • 717 篇 会议
  • 320 篇 期刊文献

馆藏范围

  • 1,037 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 544 篇 工学
    • 413 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 148 篇 信息与通信工程
    • 121 篇 电气工程
    • 65 篇 控制科学与工程
    • 60 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 38 篇 网络空间安全
    • 37 篇 机械工程
    • 27 篇 光学工程
    • 25 篇 交通运输工程
    • 25 篇 安全科学与工程
    • 24 篇 生物医学工程(可授...
    • 22 篇 仪器科学与技术
    • 20 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 动力工程及工程热...
  • 244 篇 理学
    • 153 篇 数学
    • 52 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 43 篇 生物学
    • 21 篇 系统科学
    • 19 篇 化学
  • 127 篇 管理学
    • 76 篇 管理科学与工程(可...
    • 67 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 27 篇 医学
    • 23 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 7 篇 教育学
  • 6 篇 经济学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 102 篇 feature extracti...
  • 98 篇 accuracy
  • 69 篇 federated learni...
  • 66 篇 semantics
  • 65 篇 computational mo...
  • 53 篇 data models
  • 50 篇 training
  • 39 篇 deep learning
  • 35 篇 transformers
  • 34 篇 neural networks
  • 31 篇 robustness
  • 31 篇 adaptation model...
  • 28 篇 optimization
  • 25 篇 predictive model...
  • 25 篇 privacy
  • 24 篇 data mining
  • 24 篇 measurement
  • 24 篇 attention mechan...
  • 23 篇 object detection
  • 22 篇 real-time system...

机构

  • 274 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 60 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 40 篇 shandong provinc...
  • 39 篇 school of comput...
  • 38 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 17 篇 shaanxi key labo...
  • 16 篇 quan cheng labor...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 xi'an key labora...
  • 14 篇 key laboratory o...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 18 篇 xiangzhi liu
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 15 篇 haiyan jin
  • 15 篇 wei zhang
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 chunxiao wang
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lu wenpeng

语言

  • 831 篇 英文
  • 196 篇 其他
  • 18 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
1037 条 记 录,以下是991-1000 订阅
排序:
Parallelization Using Task Parallel Library with Task-Based Programming Model
Parallelization Using Task Parallel Library with Task-Based ...
收藏 引用
2014 IEEE 5th International Conference on Software Engineering and Service Science
作者: Xinhong Hei Jinlong Zhang Bin Wang Haiyan Jin Nasser Giacaman Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In order to reduce the complexity of traditional multithreaded parallel programming,this paper explores a new task-based parallel programming using the *** Task Parallel Library(TPL).Firstly,this paper proposes a cu... 详细信息
来源: 评论
A secure self-destruction scheme with IBE for the internet content privacy
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2014年 第1期37卷 139-150页
作者: Xiong, Jin-Bo Yao, Zhi-Qiang Ma, Jian-Feng Li, Feng-Hua Liu, Xi-Meng Faculty of Software Fujian Normal University Fuzhou 350108 China School of Computer Science and Technology Xidian University Xi'an 710071 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the p... 详细信息
来源: 评论
Attribute-based encryption based access control scheme with constant-size ciphertext in cloud computing
收藏 引用
Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and technology Edition) 2014年 第3期44卷 788-794页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Zhang, Tao Liu, Xi-Meng School of Computer Science and Technology Xidian University Xi'an 710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China School of Telecommunications Engineering Xidian University Xi'an 710071 China
Based on Attribute-Based Encryption (ABE), a variety of access control schemes have been constructed in cloud computing. However, in these schemes, the ciphertext overhead goes linearly with the number of attributes u... 详细信息
来源: 评论
The cross-layer design of wireless mesh networks based on multimedia services
收藏 引用
Journal of Computational Information Systems 2013年 第11期9卷 4495-4504页
作者: Sun, Qindong Zhang, Benliang Yang, Min Wang, Qian Key Lab. for Network Computing and Security of Shaanxi Province Xi'an University of Technology Xi'an 710048 China
In this paper, we have introduced a cross-layer design model which is based on multimedia services in order to favor the QoS demand in wireless mesh networks. By means of this model the relevant parameters in each lay... 详细信息
来源: 评论
A User-Based Document Management Mechanism in Cloud
A User-Based Document Management Mechanism in Cloud
收藏 引用
International Conference on Computational Intelligence and security
作者: Guozhen Shi Mang Su Fenghua Li Jiapeng Lou Qiong Huang Department of Information Security Beijing Electronic Science and Technology Institute Beijing China State Key Laboratory of Integrated Services Network Xidian University Xi'an Shaanxi China State Key Laboratory of Information Security Chinese Academy of Sciences Beijing China
The document plays an important role in the development of cloud computing. The user obtains and shares information by the electronic document. It is rich in content and various in representations. But the challenge t... 详细信息
来源: 评论
Adaptively secure key-policy ABE scheme with fast decryption
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 26-32页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng School of Computer Science and Technology Xidian University Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China Faculty of Software Fujian Normal University Fuzhou350108 China School of Telecommunication Engineering Xidian University Xi'an710071 China
In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc... 详细信息
来源: 评论
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & technology 2013年 第4期28卷 743-748页
作者: 葛爱军 黄欣沂 陈成 马传贵 张锐 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University Institute of Software Chinese Academy of Sciences
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... 详细信息
来源: 评论
25th Annual Computational Neuroscience Meeting CNS-2016, Seogwipo City, South Korea, July 2-7, 2016 Abstracts
收藏 引用
BMC NEUROSCIENCE 2016年 第1期17卷 1-112页
作者: [Anonymous] Computational Neurobiology Laboratory The Salk Institute for Biological Studies San Diego USA UNIC CNRS Gif sur Yvette France The European Institute for Theoretical Neuroscience (EITN) Paris France ATR Computational Neuroscience Laboratories Kyoto Japan Krembil Research Institute University Health Network Toronto Canada Department of Physiology University of Toronto Toronto Canada Department of Medicine (Neurology) University of Toronto Toronto Canada Department of Physics University of New Hampshire Durham USA Department of Neurophysiology Nencki Institute of Experimental Biology Warsaw Poland Department of Theory Wigner Research Centre for Physics of the Hungarian Academy of Sciences Budapest Hungary Department of Mathematical Sciences KAIST Daejoen Republic of Korea Department of Mathematics University of Houston Houston USA Department of Biochemistry & Cell Biology and Institute of Biosciences and Bioengineering Rice University Houston USA Department of Biology and Biochemistry University of Houston Houston USA Grupo de Neurocomputación Biológica Dpto. de Ingeniería Informática Escuela Politécnica Superior Universidad Autónoma de Madrid Madrid Spain Department of Biological Sciences University of Southern California Los Angeles USA Center for Neuroscience Korea Institute of Science and Technology Seoul South Korea Department of Neurology Albert Einstein College of Medicine Bronx USA Center for Neuroscience KIST Seoul South Korea Department of Neuroscience University of Science and Technology Daejon South Korea Systems Neuroscience Group QIMR Berghofer Medical Research Institute Herston Australia Department of Psychology Yonsei University Seoul South Korea Department of Psychiatry Kyung Hee University Hospital at Gangdong Seoul South Korea Department of Psychiatry Veterans Administration Boston Healthcare System and Harvard Medical School Brockton USA Department of Electrical and Electronic Engineering The University of Melbourne Parkvil
A1 Functional advantages of cell-type heterogeneity in neural circuits Tatyana O. Sharpee A2 Mesoscopic modeling of propagating waves in visual cortex Alain Destexhe A3 Dynamics and biomarkers of mental disorders Mits...
来源: 评论
DMAT: A new network and computer attack classification
收藏 引用
Journal of Engineering Science and technology Review 2013年 第5期6卷 101-106页
作者: Jiang, Wei Tian, Zhi-Hong Cui, Xiang College of Computer Science Beijing University of Technology Beijing 100124 China School of Computer National University of Defense Technology Changsha 410073 China Key Laboratory of Information and Network Security Ministry of Public Security Shanghai 201204 China School of Computer Science and Technology Harbin Institute of Technology Haerbin 150001 China The Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
With the rapid development of computer network and information technology, the Internet has been suffering from a variety of security attacks over the past few years. Attacks have become both numerous and complex, and... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论