咨询与建议

限定检索结果

文献类型

  • 1,069 篇 会议
  • 1,001 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,072 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,372 篇 工学
    • 902 篇 计算机科学与技术...
    • 694 篇 软件工程
    • 440 篇 信息与通信工程
    • 197 篇 电子科学与技术(可...
    • 182 篇 电气工程
    • 139 篇 控制科学与工程
    • 92 篇 光学工程
    • 82 篇 网络空间安全
    • 81 篇 生物工程
    • 77 篇 机械工程
    • 73 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 41 篇 建筑学
    • 40 篇 生物医学工程(可授...
    • 38 篇 化学工程与技术
    • 36 篇 土木工程
    • 36 篇 交通运输工程
    • 35 篇 航空宇航科学与技...
  • 609 篇 理学
    • 386 篇 数学
    • 137 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 91 篇 生物学
    • 45 篇 系统科学
    • 39 篇 化学
  • 365 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 56 篇 法学
    • 45 篇 社会学
  • 34 篇 医学
    • 31 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 农学
  • 13 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 4 篇 艺术学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 60 篇 accuracy
  • 51 篇 computational mo...
  • 48 篇 cryptography
  • 44 篇 protocols
  • 43 篇 training
  • 40 篇 wireless sensor ...
  • 37 篇 federated learni...
  • 36 篇 deep learning
  • 33 篇 privacy
  • 30 篇 servers
  • 30 篇 machine learning
  • 30 篇 data models
  • 29 篇 clustering algor...
  • 28 篇 computer network...
  • 27 篇 information secu...
  • 26 篇 data mining
  • 25 篇 laboratories
  • 24 篇 routing

机构

  • 216 篇 shandong provinc...
  • 164 篇 school of comput...
  • 160 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 71 篇 state key labora...
  • 62 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 53 篇 shandong fundame...
  • 45 篇 key laboratory o...
  • 42 篇 shandong enginee...
  • 42 篇 the key laborato...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 school of comput...
  • 41 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 34 篇 school of inform...
  • 31 篇 school of cyber ...
  • 27 篇 state key labora...

作者

  • 43 篇 ren jiadong
  • 40 篇 guo hong
  • 37 篇 zhou deyu
  • 32 篇 jianfeng ma
  • 29 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 26 篇 ma jianfeng
  • 26 篇 hu yupu
  • 21 篇 yang yang
  • 20 篇 han zhu
  • 20 篇 zhang yichen
  • 20 篇 guang cheng
  • 18 篇 hui li
  • 18 篇 ma jian-feng
  • 17 篇 yu song
  • 17 篇 xiaoming wu
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 huang chongwen
  • 16 篇 geng xin

语言

  • 1,814 篇 英文
  • 150 篇 其他
  • 111 篇 中文
检索条件"机构=The Key Laboratory for Computer Networks and Information Integration"
2072 条 记 录,以下是1971-1980 订阅
排序:
An Empirical Measurement of Security Association in 802.11 Mesh networks
An Empirical Measurement of Security Association in 802.11 M...
收藏 引用
The 4th International Conference on Wireless Communications, Networking and Mobile Computing(第四届IEEE无线通信、网络技术及移动计算国际会议)
作者: Xiang Lu Qi Jiang Jianfeng Ma Xinghua Li Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xidian University Xi'an 710071 P.R.China
Security association established by authentication schemes enables wireless networks resilient from external attacks. However, an enhanced security guarantee will influence network performance more or less. In this pa... 详细信息
来源: 评论
Universally composable Secure RFID communication protocol in supply chains
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2008年 第10期31卷 1754-1767页
作者: Zhang, Fan Sun, Xuan Ma, Jian-Feng Cao, Chun-Jie Zhu, Jian-Ming Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Institute of Beijing Computer Technology and Application Second Academy China Aerospace Science and Industry Corporation Beijing 100854 China Huhhot Railway Bureau Huhhot 010020 China School of Information Central University of Finance Economics Beijing 100081 China
Supply chain management is the major field for RFID application. However, little work has been conducted to address the security issues in this context. Existing RFID solutions cannot be applied directly in this field... 详细信息
来源: 评论
A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses
A Verifiable (t, n) Multiple Secret Sharing Scheme and Its A...
收藏 引用
International Symposium on Electronic Commerce and Security
作者: Liaojun Pang Huixian Li Ye Yao Yumin Wang Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an Shaanxi China School of Computer Science and Engineering Northwestern Polytechnical University Xi'an Shaanxi China
In 2000, a new type of multi-secret sharing scheme, called the multiple secret sharing scheme, is proposed by Chien et al., in which more than one secret instead of only one secret can be shared in the same sharing se... 详细信息
来源: 评论
OBJECTIVE INCREMENT BASED HYBRID GA FOR NO-WAIT FLOWSHOPS
OBJECTIVE INCREMENT BASED HYBRID GA FOR NO-WAIT FLOWSHOPS
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: XIA ZHU XIAOPING LI QIAN WANG School of Computer Science and Engineering Southeast University Nanjing P.R.China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing P.R.China
No-wait flowshops with flowtime minimization are typical NP-Complete combinatorial optimization problems, widely existing in practical manufacturing systems. Different from traditional methods by which objective of a ... 详细信息
来源: 评论
A NEW HYBRID GENETIC ALGORITHM FOR THE BI-CRITERIA NO-WAIT FLOWSHOP SCHEDULING PROBLEM WITH MAKESPAN AND TOTAL FLOW TIME MINIMIZATION
A NEW HYBRID GENETIC ALGORITHM FOR THE BI-CRITERIA NO-WAIT F...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: YOU-GEN LIU XIA ZHU XIAO-PING LI School of Computer Science and Engineering Southeast University Nanjing P.R.China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing P.R.China
Multi-objective flowshop scheduling problems have gained wide attention both in practical and academic fields. In this paper, a hybrid multi-objective genetic algorithm is proposed to solve multi-objective no-wait flo... 详细信息
来源: 评论
An Identity-based Broadcast Encryption Protocol for Ad Hoc networks
An Identity-based Broadcast Encryption Protocol for Ad Hoc N...
收藏 引用
The 9th International Conference for Young computer Scientists(第九届国际青年计算机大会)
作者: Leyou Zhang Ningbo Mu Yupu Hu Department of mathematical science Xidian University Xi'an ShaanXi Province 710071 China Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University
An identity-based broadcast encryption protocol for ad hoc networks is proposed. Whenever a new mobile ad hoc network is formed, the proposed protocol only requires each group member to broadcast his/her identity to c... 详细信息
来源: 评论
DECISION SUPPORT SYSTEM OF VARIABLE RATE IRRIGATION BASED ON MATHEMATICAL MODEL AND GIS
DECISION SUPPORT SYSTEM OF VARIABLE RATE IRRIGATION BASED ON...
收藏 引用
第一届国际计算机与计算技术在农业中的应用研讨会
作者: Jianjun Zhou Gang Liu Su Li Xiu Wang Man Zhang Key Laboratory of Modern Precision Agriculture System Integration Research China Agricultural University Computer College Beijing Technology and Business University National Engineering Research Center for Information Technology in Agriculture
Owing to the difference of soil water in the farm,a system of variable rate irrigation was developed with Visual C++ and MapObjects that can save water as well as can improve economy *** water content can be forecaste... 详细信息
来源: 评论
CRMS: A Collusion-Resistant Matrix System for Group key Management in Wireless networks
CRMS: A Collusion-Resistant Matrix System for Group Key Mana...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: W. Wang J. Ma S. Moon Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University Daegu South Korea
In this paper, a collusion-resistant matrix system (CRMS) for group key managements is presented. The CRMS is defined as a collection of subsets of users, and the keys held by users in CRMS are organized in a hierarch... 详细信息
来源: 评论
Storage Requirements for key Distribution in Sensor networks
Storage Requirements for Key Distribution in Sensor Networks
收藏 引用
International Conference on Sensor Technologies and Applications, SensorComm
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University China School of Communication Engineering Xidian University China Mobile Network Security Technology Research Center Kyungpook National University South Korea
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi... 详细信息
来源: 评论
Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor networks
Secure Message Distribution Scheme with Configurable Privacy...
收藏 引用
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC
作者: YaHui Li Ding Yong JianFeng Ma Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China Sch. of Math. & Comput. Sci. Guilin Univ. of Electron. Technol. Guilin Guilin
Security and privacy of wireless sensor networks are key research issues recently. Most existing researches regarding wireless sensor network security consider homogenous sensor networks. To achieve better security an... 详细信息
来源: 评论