咨询与建议

限定检索结果

文献类型

  • 3,322 篇 期刊文献
  • 162 篇 会议

馆藏范围

  • 3,484 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,084 篇 工学
    • 1,064 篇 计算机科学与技术...
    • 990 篇 电子科学与技术(可...
    • 844 篇 信息与通信工程
    • 765 篇 仪器科学与技术
    • 651 篇 网络空间安全
    • 454 篇 软件工程
    • 412 篇 控制科学与工程
    • 310 篇 机械工程
    • 169 篇 光学工程
    • 89 篇 航空宇航科学与技...
    • 76 篇 电气工程
    • 57 篇 交通运输工程
    • 36 篇 公安技术
    • 28 篇 材料科学与工程(可...
    • 23 篇 船舶与海洋工程
    • 18 篇 动力工程及工程热...
    • 14 篇 测绘科学与技术
    • 13 篇 土木工程
    • 13 篇 化学工程与技术
    • 12 篇 地质资源与地质工...
  • 626 篇 理学
    • 322 篇 物理学
    • 196 篇 数学
    • 69 篇 系统科学
  • 551 篇 管理学
    • 539 篇 管理科学与工程(可...
  • 274 篇 军事学
    • 271 篇 军队指挥学
  • 72 篇 医学
    • 61 篇 临床医学
  • 57 篇 艺术学
    • 55 篇 设计学(可授艺术学...
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 21 篇 法学
  • 20 篇 农学
  • 11 篇 教育学
    • 11 篇 教育学
  • 10 篇 文学
  • 2 篇 历史学

主题

  • 134 篇 security
  • 119 篇 deep learning
  • 106 篇 blockchain
  • 76 篇 network
  • 63 篇 authentication
  • 58 篇 internet of thin...
  • 57 篇 machine learning
  • 52 篇 communication
  • 48 篇 network security
  • 46 篇 quantum
  • 41 篇 wireless sensor ...
  • 41 篇 resource allocat...
  • 40 篇 physical layer s...
  • 40 篇 cryptography
  • 37 篇 encryption
  • 30 篇 iot
  • 29 篇 cloud computing
  • 27 篇 information secu...
  • 27 篇 neural network
  • 27 篇 quantum key dist...

机构

  • 38 篇 state key labora...
  • 37 篇 state key labora...
  • 31 篇 school of inform...
  • 26 篇 state key labora...
  • 25 篇 national mobile ...
  • 25 篇 information secu...
  • 22 篇 school of inform...
  • 22 篇 institute of qua...
  • 20 篇 state key labora...
  • 18 篇 national mobile ...
  • 17 篇 department of co...
  • 17 篇 information secu...
  • 16 篇 university of ch...
  • 15 篇 school of comput...
  • 15 篇 ieee
  • 15 篇 state key labora...
  • 15 篇 school of commun...
  • 15 篇 school of electr...
  • 14 篇 institute of inf...
  • 14 篇 department of el...

作者

  • 17 篇 qin wang
  • 15 篇 gang xu
  • 15 篇 wei wang
  • 14 篇 温巧燕
  • 14 篇 shibin zhang
  • 13 篇 xin liu
  • 13 篇 xiu-bo chen
  • 13 篇 yu-bo sheng
  • 13 篇 wei chen
  • 13 篇 lan zhou
  • 13 篇 jian li
  • 12 篇 yang yang
  • 12 篇 shi jin
  • 11 篇 li yang
  • 11 篇 nan chi
  • 11 篇 wei li
  • 11 篇 yan chang
  • 11 篇 yiliang han
  • 11 篇 wei zhong
  • 11 篇 yu zhang

语言

  • 3,187 篇 英文
  • 297 篇 中文
检索条件"机构=Shaanxi Key Laboratory of Information Communication Network and Security"
3484 条 记 录,以下是1-10 订阅
排序:
A Novel Video Reversible Data Hiding Algorithm Using Motion Vector for H.264/AVC
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 489-498页
作者: Ke Niu Xiaoyuan Yang Yingnan Zhang key laboratory of network & information security of PAP Engineering College of PAP
A novel reversible data hiding algorithm for H.264/AVC videos is proposed. Histogram Shifting (HS) of motion vector values is used efficiently in reversible data hiding to embed data. By designating a specific decod... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Load Balancing Algorithm of Controller Based on SDN Architecture Under Machine Learning
收藏 引用
Journal of Systems Science and information 2020年 第6期11卷 578-588页
作者: Siyuan LIANG Wenli JIANG Fangli ZHAO Feng ZHAO shaanxi key laboratory of information communication network and security Xi’an University of Posts&TelecommunicationsXi’an 710121China
With the rapid development of cloud computing and other related services,higher requirements are put forward for network transmission and *** to the inherent distributed characteristics of traditional networks,machine... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research on Loophole with Second Distribution of Real Value Detectors
收藏 引用
Chinese Journal of Electronics 2016年 第6期25卷 1141-1150页
作者: WANG Tianbo ZHANG Fengbin XIA Chunhe Beijing key laboratory of network Technology Beihang University network and information security laboratory Harbin University of Science and Technology
Traditional anomaly detection algorithm has improved to some degree the mechanism of negative selection. There still remain many problems such as the randomness of detector generation, incompleteness of selfset and th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Using Reduced Graphene Oxide to Generate Q-Switched Pulses in Er-Doped Fiber Laser
收藏 引用
Chinese Physics Letters 2018年 第11期35卷 32-34页
作者: Lu Li Rui-Dong Lv Si-Cong Liu Zhen-Dong Chen Jiang Wang Yong-Gang Wang Wei Ren School of Science Xi'an University of Posts and TelecommunicationsXi'an 710121 School of Physics and information Technology Shaanxi Normal UniversityXi'an 710119 shaanxi key laboratory of information communication network and security Xi'an University of Posts and TelecommunicationsXi'an 710121
Using the reduced graphene oxide(rGO) as a saturable absorber(SA) in an Er-doped fiber(EDF) laser cavity,we obtain the Q-switching operation. The rGO SA is prepared by depositing the GO on fluorine mica(FM) us... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Modulated symbol-based one-time pad secure transmission scheme using physical layer keys
收藏 引用
Science China(information Sciences) 2024年 第1期67卷 221-239页
作者: Xiaoyan HU Zheng WAN Kaizhi HUANG Liang JIN Mengyao YAN Yajun CHEN Jinmei YANG information Engineering University Purple Mountain Laboratories for network and communication security
This paper proposes a novel modulated symbols-based one-time pad(SOTP) secure transmission scheme using physical layer *** classical physical layer key generation and exclusive OR(XOR)encryption in the discrete binary... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Novel Video Steganography Algorithm Based on Secret Sharing and Error-Correcting Code for H.264/AVC
收藏 引用
Tsinghua Science and Technology 2017年 第2期22卷 198-209页
作者: Yingnan Zhang Minqing Zhang Xiaoyuan Yang Duntao Guo Longfei Liu key laboratory of network & information security of PAP Engineering College of PAPXi’an 710086China
In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient and Practical Public key Cryptosystem with CCA-security on Standard Model
收藏 引用
Tsinghua Science and Technology 2014年 第5期19卷 486-495页
作者: Zhen Liu Xiaoyuan Yang Weidong Zhong Yiliang Han Department of network and information security key laboratory Engineering University of the Armed PoliceForce
Chosen Ciphertext Attack (CCA) security on the standard model is widely accepted as the standard security notion for the public key cryptosystem. The existing CCA-secure public key cryptosystems on the standard mode... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
TAKAP: A Lightweight Three-Party Authenticated key Agreement Protocol with User Anonymity
收藏 引用
Chinese Journal of Electronics 2021年 第4期30卷 686-696页
作者: QIAO Hui DONG Xuewen SHEN Yulong LIU Haozhe YANG Lingxiao School of Computer Science and Technology Xidian University shaanxi key laboratory of network and System security Xidian University
The three-party authenticated key agreement protocol is a significant cryptographic mechanism for secure communication, which encourages two entities to authenticate each other and generate a shared session key with t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Passive Beamforming Design for Intelligent Reflecting Surface Assisted MIMO Systems
收藏 引用
China communications 2021年 第3期18卷 18-28页
作者: Chenghao Feng Wenqian Shen Xinyu Gao Jianping An School of information and Electronics Beijing Institute of TechnologyBeijing 100081China shaanxi key laboratory of information communication network and security Xian University of Posts and TelecommunicationsXianShaanxi 710121China Huawei Technologies Co.Ltd. Beijing 100085China
Intelligent reflecting surfaces(IRSs)constitute passive devices,which are capable of adjusting the phase shifts of their reflected signals,and hence they are suitable for passive *** this paper,we conceive their desig... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Reconstruction methodology for rational secret sharing based on mechanism design
收藏 引用
Science China(information Sciences) 2017年 第8期60卷 240-242页
作者: Hai LIU Xinghua LI Jianfeng MA Mengfan XU Jingjing GUO State key laboratory of Integrated Service networks Xidian University shaanxi key laboratory of network and System security Xidian University School of Cyber Engineering Xidian University
Rational secret sharing[1]is the intersection of game theory[2]and traditional secret sharing[3].In rational secret sharing,the players are selfish and always behave in accordance with profit *** this implies,primaril... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论