咨询与建议

限定检索结果

文献类型

  • 661 篇 期刊文献
  • 344 篇 会议

馆藏范围

  • 1,005 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 844 篇 工学
    • 280 篇 计算机科学与技术...
    • 168 篇 信息与通信工程
    • 148 篇 仪器科学与技术
    • 145 篇 软件工程
    • 126 篇 控制科学与工程
    • 119 篇 电子科学与技术(可...
    • 117 篇 机械工程
    • 93 篇 网络空间安全
    • 44 篇 电气工程
    • 35 篇 材料科学与工程(可...
    • 30 篇 光学工程
    • 24 篇 地质资源与地质工...
    • 23 篇 交通运输工程
    • 18 篇 测绘科学与技术
    • 18 篇 航空宇航科学与技...
    • 9 篇 水利工程
    • 9 篇 化学工程与技术
    • 9 篇 公安技术
  • 228 篇 管理学
    • 207 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 179 篇 理学
    • 62 篇 数学
    • 49 篇 系统科学
    • 30 篇 物理学
    • 14 篇 生物学
    • 13 篇 地理学
    • 9 篇 大气科学
  • 28 篇 经济学
    • 27 篇 应用经济学
  • 25 篇 军事学
    • 24 篇 军队指挥学
  • 24 篇 农学
  • 22 篇 教育学
    • 19 篇 教育学
  • 14 篇 艺术学
    • 14 篇 设计学(可授艺术学...
  • 13 篇 医学
  • 8 篇 文学
  • 5 篇 法学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 23 篇 计算机网络
  • 19 篇 网络安全
  • 13 篇 network
  • 12 篇 internet
  • 12 篇 neural network
  • 9 篇 卷积神经网络
  • 8 篇 control
  • 8 篇 gis
  • 7 篇 网络管理
  • 7 篇 bp神经网络
  • 7 篇 无线传感器网络
  • 6 篇 认证
  • 6 篇 密钥管理
  • 6 篇 qos
  • 6 篇 genetic algorith...
  • 6 篇 cryptography
  • 6 篇 power allocation
  • 6 篇 neural networks
  • 6 篇 入侵检测
  • 6 篇 移动代理

机构

  • 21 篇 东南大学
  • 13 篇 西安电子科技大学
  • 10 篇 同济大学
  • 10 篇 南京信息工程大学
  • 9 篇 中南大学
  • 8 篇 南京大学
  • 7 篇 南京邮电学院
  • 7 篇 北京交通大学
  • 7 篇 南京邮电大学
  • 7 篇 清华大学
  • 7 篇 四川大学
  • 7 篇 上海大学
  • 7 篇 武汉大学
  • 7 篇 济南大学
  • 6 篇 华中科技大学
  • 6 篇 上海交通大学
  • 6 篇 浙江大学
  • 6 篇 东北大学
  • 6 篇 北京邮电大学
  • 5 篇 山东大学

作者

  • 92 篇 china
  • 13 篇 beijing
  • 11 篇 顾冠群
  • 8 篇 王汝传
  • 8 篇 beijing universi...
  • 7 篇 p.r.china
  • 6 篇 beijing 100876
  • 5 篇 ministry of educ...
  • 4 篇 p. r. china
  • 4 篇 陈北京
  • 4 篇 杨波
  • 3 篇 尚玉柱
  • 3 篇 xuanwu zhou key ...
  • 3 篇 hefei
  • 3 篇 魏斌
  • 3 篇 陈贞翔
  • 3 篇 吕燕芳
  • 3 篇 许榕生
  • 3 篇 张民艳
  • 3 篇 徐红

语言

  • 624 篇 英文
  • 381 篇 中文
检索条件"作者=2.eijing Key Laboratory of Advanced information science and network technology, Beijing 100044, china"
1005 条 记 录,以下是1-10 订阅
排序:
RST transforms resistant image watermarking based on centroid and sector-shaped partition
收藏 引用
science china(information sciences) 2012年 第3期55卷 650-662页
作者: ZHAO Yao1,2*, NI RongRong1,2* & ZHU ZhenFeng1,2* 1Institute of information science, beijing Jiaotong University, beijing 100044, china 2.eijing key laboratory of advanced information science and network technology, beijing 100044, china 1. Institute of information science Beijing Jiaotong University Beijing 100044 China2. Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing 100044 China
A novel digital watermarking scheme featuring centroid-based sectoring is proposed in this paper. To get higher robustness against geometric attacks, such as rotation, scaling, and translation (RST), a delicate synchr... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Quantum threshold group signature
收藏 引用
science china(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer science and technology, beijing University of technology, beijing 100124, china 2 State key laboratory of Integrated Services network, Xidian University, Xi’an 710071, china 3 State key laboratory of information Security (Graduate University of Chinese Academy of sciences), beijing 100049, china 4 State key laboratory of networking and Switching technology, beijing University of Posts and Tele-communications, beijing 100876, china College of Computer science and technology Beijing University of Technology Beijing 100124 China State key laboratory of Integrated Services network Xidian University Xi’an 710071 China State key laboratory of information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China State key laboratory of networking and Switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
science china(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer science and technology,beijing University of technology,beijing 100124,china 2 State key laboratory of Integrated Services network,Xidian University,Xi’an 710071,china 3 State key laboratory of information Security (Graduate University of Chinese Academy of sciences),beijing 100049,china 4 State key laboratory of networking and Switching technology,beijing University of Posts and Tele-communications,beijing 100876,china College of Computer science and technology Beijing University of Technology Beijing 100124 China State key laboratory of Integrated Services network Xidian University Xi’an 710071 China State key laboratory of information Security (Graduate University of Chinese Academy of sciences) Beijing 100049 China State key laboratory of networking and Switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
science china(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4 & WEN QiaoYan2 1 College of Computer science and technology,beijing University of technology,beijing 100124,china 2 State key laboratory of networking and Switching technology,beijing University of Posts and Tele-communications,beijing 100876,china 3 State key laboratory of Integrated Services network,Xidian University,Xi’an 710071,china 4 State key laboratory of information Security(Graduate University of Chinese Academy of sciences) ,beijing 100049,china 1. College of Computer science and technology Beijing University of Technology Beijing 100124 China 3. State key laboratory of Integrated Services network Xidian University Xi’an 710071 China 4. State key laboratory of information Security (Graduate University of Chinese Academy of sciences) Beijing 100049 China 2. State key laboratory of networking and Switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Analysis of coupling from core mode to counter-propagating radiation modes in tilted fiber Bragg gratings
收藏 引用
science china(information sciences) 2010年 第5期53卷 1078-1088页
作者: LU ShaoHua 1,2 , XU Ou 1,2 , FENG SuChun 1,2 , DONG XiaoWei 1,2 , PEI Li 1,2 & JIAN ShuiSheng 1,2 1 key laboratory of All Optical network & advanced Telecommunication network of EMC, beijing Jiaotong University, beijing 100044, china 2 Institute of Lightwave technology, beijing Jiaotong University, beijing 100044, china 1. key laboratory of All Optical network & advanced Telecommunication network of EMC Beijing Jiaotong University Beijing 100044 China2. Institute of Lightwave Technology Beijing Jiaotong University Beijing 100044 China
Radiation-mode coupling is stronger and more efficient in tilted fiber Bragg gratings than in other fiber gratings; it has good advantage in such fields as optical communication and optical sensors. A simplified coupl... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Theoretical analysis of transmission characteristics for all fiber,multi-cavity Fabry-Perot filters based on fiber Bragg gratings
收藏 引用
science in china(Series F) 2008年 第9期51卷 1391-1400页
作者: XU Ou1,2,LU ShaoHua1,2,DONG XiaoWei1,2,LI Bin1,2,NING TiGang1,2 & JIAN ShuiSheng1,2 1 key Lab of All Optical network & advanced Telecommunication network of EMC,beijing Jiaotong University,beijing 100044,china 2 Institute of Lightwave technology,beijing Jiaotong University,beijing 100044,china key Lab of All Optical network & advanced Telecommunication network of EMC Beijing Jiaotong University Beijing 100044 China Institute of Lightwave technology Beijing Jiaotong University Beijing 100044 China
The characteristics of transmission spectra for the all fiber, multi-cavity Fabry- Perot (FP) configuration based on fiber Bragg gratings (FBG) are theoretically analyzed and modeled. The general transmission matr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Fuzzy dynamic characteristic model based attitude control of hypersonic vehicle in gliding phase
收藏 引用
science china(information sciences) 2011年 第3期54卷 448-459页
作者: LUO Xiong 1,2 & LI Jiang 1 1 Department of Computer science and technology, key laboratory of advanced Control of Iron and Steel Process (Ministry of Education), University of science and technology beijing, beijing 100083, china 2 National laboratory of Space Intelligent Control, beijing 100190, china 1. Department of Computer science and technology Key Laboratory of Advanced Control of Iron and Steel Process (Ministry of Education) University of Science and Technology Beijing Beijing 100083 China2. National Laboratory of Space Intelligent Control Beijing 100190 China
The intelligent autonomous control of hypersonic vehicles has aroused great interest from the field of spacecraft. To solve the problem of longitudinal attitude control of hypersonic vehicle in gliding phase, a new in... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Multiparty simultaneous quantum identity authentication with secret sharing
收藏 引用
science china(Physics,Mechanics & Astronomy) 2008年 第3期51卷 321-327页
作者: YANG YuGuang1,2,WEN QiaoYan3 & ZHANG Xing4,5 1 College of Computer science and technology,beijing University of technology,beijing 100022,china 2 State key laboratory of information Security (Graduate University of the Chinese Academy of sciences),beijing 100049,china 3 School of science,beijing University of Posts and Telecommunications,beijing 100876,china 4 Institute of Electronic technology,information Engineering University,Zhengzhou 450004,china 5 Trusted Computing laboratory,beijing University of technology,beijing 100022,china College of Computer science technology Beijing University of Technology Beijing 100022 China State key laboratory of information Security [Graduate University of the Chinese Academy of sciences] Beijing 100049 China School of science Beijing University of Posts Telecommunications Beijing 100876 China Institute of Electronic technology Information Engineering University Zhengzhou 450004 China Trusted Computing laboratory Beijing University of Technology Beijing 100022 China
Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first proto... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure network coding in the presence of eavesdroppers
收藏 引用
science china(information sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1information Security Center, State key laboratory of networking and Switching technology, beijing University of Posts and Telecommunications, beijing 100876, china 2key laboratory of network and information Attack and Defence technology of MOE, beijing University of Posts and Telecommunications, beijing 100876, china 3National Engineering laboratory for Disaster Backup and Recovery, beijing University of Posts and Telecommunications, beijing 100876, china 1. information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China3. National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Data-aided synchronization algorithm dispensing with searching procedures for UWB communications
收藏 引用
science china(information sciences) 2012年 第4期55卷 778-788页
作者: REN ZhiYuan 1,JIANG Ting1,ZHONG Yi 2 & ZHAO ChengLin 1 1 key laboratory of Universal Wireless Communications,Ministry of Education of china Wireless network laboratory,beijing University of Posts and Telecommunications,beijing 100876,china 2 School of information Engineering,North china University of technology,beijing 100041,china 1. key laboratory of Universal Wireless Communications Ministry of Education of China Wireless network laboratory Beijing University of Posts and Telecommunications Beijing 100876 China2. School of Information Engineering North China University of Technology Beijing 100041 China
Rapid and accurate synchronization constitutes a major challenge in deploying Ultra-Wideband impulse radio (UWB-IR) for indoor wireless *** paper develops a data-aided (DA) synchro-nization algorithm dispensing with s... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论