咨询与建议

限定检索结果

文献类型

  • 3,083 篇 期刊文献
  • 134 篇 会议

馆藏范围

  • 3,217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,745 篇 工学
    • 1,343 篇 计算机科学与技术...
    • 606 篇 软件工程
    • 604 篇 网络空间安全
    • 511 篇 电子科学与技术(可...
    • 477 篇 控制科学与工程
    • 409 篇 仪器科学与技术
    • 396 篇 信息与通信工程
    • 292 篇 机械工程
    • 86 篇 电气工程
    • 85 篇 材料科学与工程(可...
    • 57 篇 光学工程
    • 57 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 航空宇航科学与技...
    • 30 篇 公安技术
    • 26 篇 动力工程及工程热...
    • 22 篇 水利工程
    • 20 篇 土木工程
  • 679 篇 管理学
    • 652 篇 管理科学与工程(可...
  • 579 篇 理学
    • 254 篇 数学
    • 183 篇 物理学
    • 50 篇 系统科学
    • 23 篇 化学
    • 23 篇 生物学
  • 181 篇 军事学
    • 178 篇 军队指挥学
  • 81 篇 医学
    • 57 篇 临床医学
  • 51 篇 艺术学
    • 49 篇 设计学(可授艺术学...
  • 43 篇 农学
    • 17 篇 作物学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 29 篇 法学
    • 19 篇 社会学
  • 21 篇 文学
  • 16 篇 教育学
  • 3 篇 历史学

主题

  • 142 篇 deep learning
  • 117 篇 security
  • 108 篇 blockchain
  • 79 篇 cloud computing
  • 76 篇 machine learning
  • 70 篇 network
  • 52 篇 internet of thin...
  • 43 篇 cryptography
  • 41 篇 neural network
  • 38 篇 network security
  • 37 篇 authentication
  • 37 篇 convolutional ne...
  • 31 篇 edge computing
  • 29 篇 intrusion detect...
  • 28 篇 privacy protecti...
  • 28 篇 information secu...
  • 28 篇 encryption
  • 28 篇 privacy
  • 27 篇 iot
  • 26 篇 mobile edge comp...

机构

  • 67 篇 university of ch...
  • 42 篇 state key labora...
  • 28 篇 information secu...
  • 27 篇 state key labora...
  • 26 篇 state key labora...
  • 25 篇 university of ch...
  • 24 篇 ieee
  • 19 篇 state key labora...
  • 18 篇 state key labora...
  • 16 篇 information secu...
  • 16 篇 school of comput...
  • 16 篇 state key labora...
  • 16 篇 institute of com...
  • 15 篇 institute of inf...
  • 15 篇 trusted computin...
  • 15 篇 department of co...
  • 15 篇 school of comput...
  • 14 篇 school of inform...
  • 14 篇 state key labora...
  • 13 篇 school of cybers...

作者

  • 20 篇 gang xu
  • 20 篇 wei wang
  • 17 篇 zhang huanguo
  • 15 篇 wei li
  • 15 篇 xiu-bo chen
  • 14 篇 xin liu
  • 13 篇 xiangyang luo
  • 13 篇 huanguo zhang
  • 12 篇 xiubo chen
  • 11 篇 qi liu
  • 11 篇 chen chen
  • 11 篇 温巧燕
  • 11 篇 yiliang han
  • 11 篇 xiaohong guan
  • 10 篇 chao wang
  • 10 篇 jun li
  • 10 篇 wei zhang
  • 10 篇 xiaoyuan yang
  • 9 篇 shuiying xiang
  • 9 篇 jing liu

语言

  • 2,962 篇 英文
  • 255 篇 中文
检索条件"机构=Shaanxi Key Laboratory of Network Computing and Security"
3217 条 记 录,以下是1-10 订阅
排序:
A Study on Influential User Identification in Online Social networks
收藏 引用
Chinese Journal of Electronics 2016年 第3期25卷 467-473页
作者: WANG Nan SUN Qindong ZHOU Yadong SHEN Si shaanxi key laboratory of network computing and security Xi'an University of Technology Ministry of Education key laboratory For Intelligent network and network security Xi'an Jiaotong University
Influential user evaluation is great importance in many application areas of online social *** order to identify influential users in a more adequate and practical way, we propose a Dynamic regional interaction model(... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An efficient quantum proactive incremental learning algorithm
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2025年 第1期Mechanics & Astronomy) .卷 49-57页
作者: Lingxiao Li Jing Li Yanqi Song Sujuan Qin Qiaoyan Wen Fei Gao State key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications School of Cyberspace security Beijing University of Posts and Telecommunications
In scenarios where a large amount of data needs to be learned, incremental learning can make full use of old knowledge, significantly reduce the computational cost of the overall learning process, and maintain high pe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Method and Practice of Trusted Embedded computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology shaanxi key laboratory for network computing and security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security proble... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
TAKAP: A Lightweight Three-Party Authenticated key Agreement Protocol with User Anonymity
收藏 引用
Chinese Journal of Electronics 2021年 第4期30卷 686-696页
作者: QIAO Hui DONG Xuewen SHEN Yulong LIU Haozhe YANG Lingxiao School of Computer Science and Technology Xidian University shaanxi key laboratory of network and System security Xidian University
The three-party authenticated key agreement protocol is a significant cryptographic mechanism for secure communication, which encourages two entities to authenticate each other and generate a shared session key with t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Dynamic Matching-Based Spectrum Detection in Cognitive Radio networks
收藏 引用
China Communications 2019年 第4期16卷 47-58页
作者: Yu Gu Qingqi Pei Hongning Li shaanxi key laboratory of BlockChain and security computing Xidian University The State key laboratory of Integrated Services networks Xidian University
Cognitive Radio network provides an opportunity to reduce the spectrum resource crisis by allowing secondary users to access the idle spectrum allocated to primary users. The precondition of spectrum sharing is to obt... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Reconstruction methodology for rational secret sharing based on mechanism design
收藏 引用
Science China(Information Sciences) 2017年 第8期60卷 240-242页
作者: Hai LIU Xinghua LI Jianfeng MA Mengfan XU Jingjing GUO State key laboratory of Integrated Service networks Xidian University shaanxi key laboratory of network and System security Xidian University School of Cyber Engineering Xidian University
Rational secret sharing[1]is the intersection of game theory[2]and traditional secret sharing[3].In rational secret sharing,the players are selfish and always behave in accordance with profit *** this implies,primaril... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Never Lost keys:A Novel key Generation Scheme Based on Motor Imagery EEG in End-Edge-Cloud System
收藏 引用
China Communications 2022年 第7期19卷 172-184页
作者: Yichuan Wang Dan Wu Xiaoxue Liu Xinhong Hei School of computer science and Engineering Xi’an University of TechnologyXi’an 710048China shaanxi key laboratory for network computing and security Technology Xi’an 710048China
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in ***,the current prevailing biometric key generation techniques such as fingerprint recognition a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Distributed Information Flow Verification for Secure Service Composition in Smart Sensor network
收藏 引用
China Communications 2016年 第4期13卷 119-130页
作者: XI Ning SUN Cong MA Jianfeng CHEN Xiaofeng SHEN Yulong shaanxi key laboratory of network and System security XIDIAN University School of Cyber Engineering XIDIAN University
Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, dif... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Novel Video Reversible Data Hiding Algorithm Using Motion Vector for H.264/AVC
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 489-498页
作者: Ke Niu Xiaoyuan Yang Yingnan Zhang key laboratory of network & Information security of PAP Engineering College of PAP
A novel reversible data hiding algorithm for H.264/AVC videos is proposed. Histogram Shifting (HS) of motion vector values is used efficiently in reversible data hiding to embed data. By designating a specific decod... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords
收藏 引用
Chinese Physics B 2015年 第11期24卷 163-170页
作者: 谢琪 胡斌 陈克非 刘文浩 谭肖 Hangzhou key laboratory of Cryptography and network security Hangzhou Normal University
In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, su... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论