咨询与建议

限定检索结果

文献类型

  • 397 篇 期刊文献
  • 10 篇 会议

馆藏范围

  • 407 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 334 篇 工学
    • 160 篇 计算机科学与技术...
    • 101 篇 网络空间安全
    • 66 篇 软件工程
    • 61 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 49 篇 机械工程
    • 45 篇 仪器科学与技术
    • 43 篇 信息与通信工程
    • 10 篇 电气工程
    • 8 篇 交通运输工程
    • 8 篇 航空宇航科学与技...
    • 7 篇 光学工程
    • 7 篇 材料科学与工程(可...
    • 6 篇 生物工程
    • 4 篇 土木工程
    • 3 篇 动力工程及工程热...
  • 80 篇 管理学
    • 77 篇 管理科学与工程(可...
  • 79 篇 理学
    • 33 篇 物理学
    • 28 篇 数学
    • 5 篇 系统科学
    • 4 篇 化学
    • 3 篇 生物学
  • 33 篇 军事学
    • 33 篇 军队指挥学
  • 15 篇 农学
    • 11 篇 作物学
  • 9 篇 医学
    • 6 篇 临床医学
  • 7 篇 法学
    • 4 篇 社会学
  • 7 篇 艺术学
    • 7 篇 设计学(可授艺术学...
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 文学
    • 3 篇 外国语言文学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 历史学

主题

  • 19 篇 deep learning
  • 19 篇 blockchain
  • 11 篇 security
  • 9 篇 convolutional ne...
  • 8 篇 network security
  • 7 篇 privacy protecti...
  • 7 篇 machine learning
  • 7 篇 neural network
  • 6 篇 feature extracti...
  • 6 篇 attention mechan...
  • 5 篇 internet of thin...
  • 5 篇 image
  • 5 篇 authentication
  • 5 篇 stability
  • 5 篇 privacy
  • 5 篇 cryptography
  • 4 篇 access control
  • 4 篇 identity authent...
  • 4 篇 big data
  • 4 篇 network

机构

  • 7 篇 college of compu...
  • 6 篇 information secu...
  • 6 篇 state key labora...
  • 6 篇 key laboratory o...
  • 5 篇 college of compu...
  • 5 篇 school of comput...
  • 4 篇 state key labora...
  • 4 篇 shandong provinc...
  • 3 篇 college of infor...
  • 3 篇 school of electr...
  • 3 篇 college of crypt...
  • 3 篇 state key labora...
  • 3 篇 school of inform...
  • 3 篇 guangxi key labo...
  • 3 篇 network and data...
  • 3 篇 key laboratory o...
  • 3 篇 information cent...
  • 3 篇 information secu...
  • 3 篇 advanced cryptog...
  • 3 篇 national compute...

作者

  • 8 篇 shibin zhang
  • 6 篇 xiangyang luo
  • 5 篇 xiu-bo chen
  • 5 篇 yiliang han
  • 5 篇 wei wang
  • 4 篇 rui xu
  • 4 篇 fuhui zhou
  • 4 篇 yan chang
  • 4 篇 wei wu
  • 4 篇 jiliang zhang
  • 4 篇 xuehui du
  • 4 篇 gang xu
  • 4 篇 xiaoyuan yang
  • 4 篇 jinyue xia
  • 3 篇 zhen-zhen li
  • 3 篇 jieren cheng
  • 3 篇 hao li
  • 3 篇 chen chen
  • 3 篇 xiaoqiang di
  • 3 篇 lili yan

语言

  • 381 篇 英文
  • 26 篇 中文
检索条件"机构=Jilin Province Key Laboratory of Network and Information Security"
407 条 记 录,以下是1-10 订阅
排序:
A new quantum key distribution resource allocation and routing optimization scheme
收藏 引用
Chinese Physics B 2024年 第3期33卷 244-259页
作者: 毕琳 袁晓同 吴炜杰 林升熙 School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130012China key laboratory of network and information security in jilin province Changchun 130012China
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the g... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1705-1726页
作者: Aodi Liu Na Wang Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang He’nan province key laboratory of information security Information Engineering UniversityZhengzhou450000China
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Flexible Smart Healthcare Platform Conjugated with Artificial Epidermis Assembled by Three‑Dimensionally Conductive MOF network for Gas and Pressure Sensing
收藏 引用
Nano-Micro Letters 2025年 第2期17卷 601-620页
作者: Qingqing Zhou Qihang Ding Zixun Geng Chencheng Hu Long Yang Zitong Kan Biao Dong Miae Won Hongwei Song Lin Xu Jong Seung Kim State key laboratory of Integrated Optoelectronics College of Electronic Science and EngineeringJilin UniversityChangchun 130012People’s Republic of China Department of Chemistry Korea UniversitySeoul 02841Republic of Korea TheranoChem Incorporation Seoul 02856Republic of Korea
The rising flexible and intelligent electronics greatly facilitate the noninvasive and timely tracking of physiological information in telemedicine *** building bionic-sensitive moieties is vital for designing efficie... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Animal Sound Recognition Based on Double Feature of Spectrogram
收藏 引用
Chinese Journal of Electronics 2019年 第4期28卷 667-673页
作者: LI Ying HUANG Hongkeng WU Zhibin College of Mathematics and Computer Science Fuzhou University key laboratory of information security of network Systems (Fuzhou University)
Due to existence of different environments and noises, the existing method is difficult to ensure the recognition accuracy of animal sound in low Signal-to-noise(SNR) conditions. To address these problems, we propose ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
收藏 引用
Chinese Physics B 2013年 第6期22卷 199-202页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 information security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial key laboratory of Computer network Shandong Computer Science Center State key laboratory of information security (Institute of Information EngineeringChinese Academy of Sciences)
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
FPGA based unified architecture for public key and private key cryptosystems
收藏 引用
Frontiers of Computer Science 2013年 第3期7卷 307-316页
作者: Yi WANG Renfa LI Embedded Systems and networking laboratory Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Recently, security in embedded system arises attentions because of modern electronic devices need cau- tiously either exchange or communicate with the sensitive data. Although security is classical research topic in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
MIA-UNet:Multi-Scale Iterative Aggregation U-network for Retinal Vessel Segmentation
收藏 引用
Computer Modeling in Engineering & Sciences 2021年 第11期129卷 805-828页
作者: Linfang Yu Zhen Qin Yi Ding Zhiguang Qin network and Data security key laboratory of Sichuan province University of Electronic Science and Technology of ChinaChengdu610054China
As an important part of the new generation of information technology,the Internet of Things(IoT)has been widely concerned and regarded as an enabling technology of the next generation of health care *** fundus photogr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Erebus Attack Detection Method Oriented to Blockchain network Layer
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 5395-5431页
作者: Qianyi Dai Bin Zhang Kaiyong Xu Shuqin Dong Zhengzhou information Science and Technology Institute Zhengzhou450001Henan ProvinceChina Henan key laboratory of information security Zhengzhou450001Henan ProvinceChina
Recently,the Erebus attack has proved to be a security threat to the blockchain network layer,and the existing research has faced challenges in detecting the Erebus attack on the blockchain network *** cloud-based act... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient and secure image authentication with robustness and versatility
收藏 引用
Science China(information Sciences) 2020年 第12期63卷 179-196页
作者: Haixia CHEN Xinyi HUANG Wei WU Yi MU Fujian Provincial key laboratory of network security and Cryptology Center for Applied Mathematics of Fujian ProvinceCollege of Mathematics and Informatics Fujian Normal University
Image authentication is the technology of verifying image origin, integrity and authenticity. A rich stream of research on image authentication has shown various trade-off among four favorable features,namely robustne... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 260-269页
作者: Jingjing Wang Yiliang Han Xiaoyuan Yang Department of Electronic Technology the Key Laboratory of Network & Information Security of Armed Police Force Engineering University of Armed Police Force
Traditional k-anonymity schemes cannot protect a user's privacy perfectly in big data and mobile network environments. In fact, existing k-anonymity schemes only protect location in datasets with small granularity. B... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论