咨询与建议

限定检索结果

文献类型

  • 219 篇 期刊文献
  • 26 篇 会议

馆藏范围

  • 245 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 230 篇 工学
    • 155 篇 计算机科学与技术...
    • 110 篇 信息与通信工程
    • 104 篇 电气工程
    • 75 篇 电子科学与技术(可...
    • 68 篇 网络空间安全
    • 51 篇 控制科学与工程
    • 46 篇 软件工程
    • 37 篇 仪器科学与技术
    • 37 篇 材料科学与工程(可...
    • 33 篇 机械工程
    • 14 篇 动力工程及工程热...
    • 13 篇 生物医学工程(可授...
    • 10 篇 环境科学与工程(可...
    • 6 篇 交通运输工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物工程
    • 4 篇 安全科学与工程
    • 3 篇 土木工程
  • 88 篇 理学
    • 46 篇 数学
    • 22 篇 物理学
    • 19 篇 生物学
    • 11 篇 系统科学
    • 8 篇 天文学
    • 4 篇 化学
    • 3 篇 统计学(可授理学、...
  • 49 篇 管理学
    • 36 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
  • 13 篇 医学
    • 10 篇 临床医学
  • 10 篇 军事学
    • 10 篇 军队指挥学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 法学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 艺术学

主题

  • 12 篇 deep learning
  • 9 篇 security
  • 8 篇 blockchain
  • 5 篇 machine learning
  • 5 篇 cloud computing
  • 4 篇 internet of thin...
  • 4 篇 service
  • 4 篇 ieee
  • 4 篇 networks
  • 4 篇 robustness
  • 3 篇 simulation
  • 3 篇 management
  • 3 篇 802.11
  • 3 篇 feature extracti...
  • 3 篇 artificial intel...
  • 3 篇 outage probabili...
  • 3 篇 convolutional ne...
  • 3 篇 anonymity
  • 3 篇 (dos)
  • 3 篇 power allocation

机构

  • 15 篇 ieee
  • 7 篇 ministry of educ...
  • 6 篇 ministry of educ...
  • 4 篇 security enginee...
  • 4 篇 college of compu...
  • 4 篇 guangxi key lab ...
  • 3 篇 school of comput...
  • 3 篇 beijing key labo...
  • 3 篇 riphah school of...
  • 3 篇 department of el...
  • 3 篇 research institu...
  • 3 篇 department of cy...
  • 3 篇 institute of qua...
  • 3 篇 key lab of broad...
  • 2 篇 heilongjiang pro...
  • 2 篇 chongqing key la...
  • 2 篇 school of comput...
  • 2 篇 the nanjing univ...
  • 2 篇 tsinghua nationa...
  • 2 篇 shaanxi provinci...

作者

  • 6 篇 xiaohong guan
  • 5 篇 zheng yan
  • 4 篇 bin cao
  • 4 篇 sanjeev kumar
  • 4 篇 walid el-shafai
  • 4 篇 wei li
  • 4 篇 huifang ma
  • 4 篇 jiang wu
  • 4 篇 zhixin li
  • 3 篇 yabin xu
  • 3 篇 秦丹阳
  • 3 篇 gong bei
  • 3 篇 wei wang
  • 3 篇 muhammad adnan k...
  • 3 篇 jin kwak
  • 3 篇 wuxiong zhang
  • 3 篇 deyu meng
  • 3 篇 baocang ding
  • 3 篇 xu zongben
  • 3 篇 xiaoyuan luo

语言

  • 243 篇 英文
  • 2 篇 中文
检索条件"机构=IEEE Network Security Research Lab"
245 条 记 录,以下是21-30 订阅
排序:
Ramp Scheme Based on CRT for Polynomial Ring over Finite Field
收藏 引用
Journal of Systems Science & Complexity 2023年 第1期36卷 129-150页
作者: DING Jian KE Pinhui LIN Changlu WANG Huaxiong College of Computer and Cyber security Fujian Normal UniversityFuzhou 350007China School of Mathematics and Big Data Chaohu UniveristyHefei 238024China School of Mathematics and Statistics and Fujian Provincial Key Lab of Network Security and CryptologyFujian Normal UniversityFuzhou 350007China School of Physical and Mathematical Sciences Nanyang Technological UniversitySingapore 639798Singapore
Chinese Reminder Theorem(CRT)for integers has been widely used to construct secret sharing schemes for different scenarios,but these schemes have lower information rates than that of Lagrange interpolation-based *** A... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
PosFuzz:augmenting greybox fuzzing with effective position distribution
收藏 引用
Cybersecurity 2023年 第4期6卷 123-143页
作者: Yanyan Zou Wei Zou JiaCheng Zhao Nanyu Zhong Yu Zhang Ji Shi Wei Huo Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber security University of Chinese Academy of SciencesBeijingChina State Key lab of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijingChina Key laboratory of network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key laboratory of network security and Protection Technology BeijingChina Zhongguancun laboratory BeijingChina
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and ***-based greybo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
New Identity Based Proxy Re-Encryption Scheme from Lattices
收藏 引用
China Communications 2019年 第10期16卷 174-190页
作者: Liqiang Wu Xiaoyuan Yang Minqing Zhang Longfei Liu Key lab of network and Information security Engineering University of Chinese Armed Police ForceXi’an 710086China Key lab of Computer network and Information security Xi Dian UniversityXi’an 710071China
Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A recoverable stress testing algorithm for compression and encryption cards
收藏 引用
Journal of Zhejiang University-Science A(Applied Physics & Engineering) 2008年 第10期9卷 1398-1405页
作者: Bao-jun ZHANG Xue-zeng PAN Jie-bing WANG Ling-di PING network and security lab School of Computer Science anc~Technology Zhejiang University Hangzhou 310027 China
This study proposes a recoverable stress testing algorithm (RSTA) for such special devices as compression/decom-pression card and encryption/decryption card. It uses a chaos function to generate a random sequence, and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure fusion of encrypted remote sensing images based on Brovey
收藏 引用
Science China(Information Sciences) 2021年 第2期64卷 243-245页
作者: Junzhi YANG Guohua CHENG Meng SHEN School of Information and Electronics Beijing Institute of Technology School of Computer Science Beijing Institute of Technology Key lab of Information network security of Ministry of Public security (The Third research Institute of Ministry of Public security)
Dear editor,In the field of image fusion, panchromatic images captured by the Satellite Pour l’Observation de la Terre(SPOT) [1]have high spatial resolutions, whereas their spectral resolutions are relatively low. On... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Double-Blockchain Assisted Secure and Anonymous Data Aggregation for Fog-Enabled Smart Grid
收藏 引用
Engineering 2022年 第1期8卷 159-169页
作者: Siguang Chen Li Yang Chuanxin Zhao Vijayakumar Varadarajan Kun Wang Jiangsu Key lab of Broadband Wireless Communication and Internet of Things Nanjing University of Posts and TelecommunicationsNanjing 210003China Jiangsu Engineering research Center of Communication and network Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China Anhui Provincial Key laboratory of network and Information security Anhui Normal UniversityWuhu 241000China School of Computer Science and Engineering Vellore Institute of TechnologyChennai 600127India Department of Electrical and Computer Engineering University of CaliforniaLos AngelesCA 90095USA
As a future energy system,the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable ***,this efficient and reliable service relies on collecting and ana... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Two-step transmission with artificial noise for secure wireless SIMO communications
收藏 引用
Science China(Information Sciences) 2015年 第4期58卷 115-127页
作者: WANG Bo MU PengCheng YANG PeiZhi YIN QinYe Ministry of Education Key lab for Intelligent networks and network security School of Electronic and Information Engineering Xi’an Jiaotong University
The issue of physical layer security of the wireless single-input multiple-output(SIMO) system is addressed in this paper. We propose a two-step transmission scheme with artificial noise to improve the security and th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Caching Strategy Based on Many-to-Many Matching Game in D2D networks
收藏 引用
Tsinghua Science and Technology 2021年 第6期26卷 857-868页
作者: Kaihang Yu Zhonggui Ma Runyu Ni Tao Zhang School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China Key lab of Information network security Ministry of Public SecurityShanghai 201204China
Wireless edge caching has been proposed to reduce data traffic congestion in backhaul links, and it is being envisioned as one of the key components of next-generation wireless networks. This paper focuses on the infl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Analysis of Telephone Call Detail Records based on Fuzzy Decision Tree
收藏 引用
China Communications 2010年 第6期7卷 120-127页
作者: Ding Liping Gu jian Wang Yongji Wu Jingzheng Institute of Software Chinese Academy of Sciences Beijing 100190 P. R. China Key lab of Information network security of Ministry of Public security (The Third research Institute of Ministry of Public security Shanghai 200031 P. R. China
Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
Science China(Information Sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering research Center for Big Data Technology and System Services Computing Technology and System lab Hubei Engineering research Center on Big Data security Shenzhen Huazhong University of Science and Technology research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论