咨询与建议

限定检索结果

文献类型

  • 356 篇 期刊文献
  • 16 篇 会议

馆藏范围

  • 372 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 319 篇 工学
    • 117 篇 计算机科学与技术...
    • 97 篇 信息与通信工程
    • 93 篇 电子科学与技术(可...
    • 88 篇 仪器科学与技术
    • 58 篇 软件工程
    • 56 篇 网络空间安全
    • 47 篇 控制科学与工程
    • 41 篇 机械工程
    • 11 篇 光学工程
    • 10 篇 电气工程
    • 9 篇 动力工程及工程热...
    • 6 篇 化学工程与技术
    • 5 篇 交通运输工程
    • 5 篇 航空宇航科学与技...
    • 4 篇 建筑学
    • 2 篇 材料科学与工程(可...
    • 2 篇 土木工程
  • 74 篇 理学
    • 28 篇 数学
    • 24 篇 物理学
    • 8 篇 系统科学
    • 5 篇 生物学
    • 3 篇 化学
    • 2 篇 地理学
    • 2 篇 地球物理学
  • 63 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 4 篇 公共管理
  • 21 篇 军事学
    • 21 篇 军队指挥学
  • 8 篇 医学
    • 6 篇 临床医学
  • 3 篇 法学
  • 3 篇 农学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 15 篇 deep learning
  • 15 篇 security
  • 8 篇 network
  • 8 篇 wireless sensor ...
  • 8 篇 blockchain
  • 7 篇 networks
  • 6 篇 cognitive radio
  • 5 篇 intrusion detect...
  • 5 篇 wireless sensor ...
  • 5 篇 outage probabili...
  • 5 篇 cryptography
  • 5 篇 energy efficienc...
  • 4 篇 routing
  • 4 篇 quantum
  • 4 篇 machine learning
  • 4 篇 neural network
  • 4 篇 network security
  • 4 篇 artificial intel...
  • 4 篇 robustness
  • 3 篇 internet of thin...

机构

  • 11 篇 jiangsu high tec...
  • 10 篇 college of compu...
  • 7 篇 ministry of educ...
  • 6 篇 ministry of educ...
  • 5 篇 college of compu...
  • 4 篇 key lab of broad...
  • 4 篇 institute of qua...
  • 4 篇 state key labora...
  • 4 篇 guangxi key lab ...
  • 4 篇 heilongjiang key...
  • 4 篇 shandong provinc...
  • 4 篇 ministry of educ...
  • 3 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 college of compu...
  • 3 篇 key lab of broad...
  • 3 篇 school of mathem...
  • 3 篇 school of commun...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...

作者

  • 7 篇 xiaohong guan
  • 6 篇 jiang wu
  • 6 篇 wang ruchuan
  • 5 篇 yin qinye
  • 4 篇 bin cao
  • 4 篇 deyu meng
  • 4 篇 yi ping
  • 4 篇 ruchuan wang
  • 4 篇 胡予濮
  • 4 篇 zheng yan
  • 3 篇 ma jianfeng
  • 3 篇 chao wang
  • 3 篇 baocang ding
  • 3 篇 wei li
  • 3 篇 qingyu yang
  • 3 篇 xu zongben
  • 3 篇 huifang ma
  • 3 篇 jie wu
  • 3 篇 qin wang
  • 3 篇 hong wang

语言

  • 350 篇 英文
  • 22 篇 中文
检索条件"机构=the Ministry of Education Key Lab for Intelligent Networks and Network Security"
372 条 记 录,以下是91-100 订阅
排序:
An Integrated Seismic Assessment Method for Urban Buildings and Roads
收藏 引用
International Journal of Disaster Risk Science 2024年 第6期15卷 935-953页
作者: Siwei Zhang Shuang Li Changhai Zhai Jia Xiao key lab of Structures Dynamic Behavior and Control of the ministry of education Harbin Institute of Technology key lab of Smart Prevention and Mitigation of Civil Engineering Disasters of the ministry of Industry and Information Technology Harbin Institute of Technology
Seismic simulation of urban buildings and roads is significant for regional pre-disaster mitigation and post-disaster recovery. To consider the interrelated influences of buildings and roads, an integrated seismic ass... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A NEW PRIVACY-PRESERVING EUCLID-DISTANCE PROTOCOL AND ITS APPLICATIONS IN WSNS
收藏 引用
Journal of Electronics(China) 2013年 第2期30卷 190-197页
作者: Chen Ping Ji Yimu Wang Ruchuan Huang Haiping Zhang Dan College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research key laboratory for Wireless Sensor networks key lab of Broadband Wireless Communication and Sensor network Technology of ministry of education Nanjing University of Posts and Telecommunications
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Load Feedback-Based Resource Scheduling and Dynamic Migration-Based Data Locality for Virtual Hadoop Clusters in OpenStack-Based Clouds
收藏 引用
Tsinghua Science and Technology 2017年 第2期22卷 149-159页
作者: Dan Tao Zhaowen Lin Bingxu Wang School of Electronic and Information Engineering Beijing Jiaotong UniversityBeijing 100044China Jiangsu High Technology Research key laboratory for Wireless Sensor networks Nanjing 210003China network and Information Center Institute of Network TechnologyScience and Technology on Information Transmission and Dissemination in Communication Networks LaboratoryNational Engineering Laboratory for Mobile Network SecurityBeijing University of Posts and TelecommunicationsBeijing 100876China
With cloud computing technology becoming more mature, it is essential to combine the big data processing tool Hadoop with the Infrastructure as a Service(Iaa S) cloud platform. In this study, we first propose a new ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Data-driven Computation of Natural Gas Pipeline network Hydraulics
Data-driven Computation of Natural Gas Pipeline Network Hydr...
收藏 引用
第31届中国过程控制会议(CPCC2020)
作者: CUI Gaochen JIA Qing-Shan GUAN Xiaohong LIU Qing Center for intelligent and networked Systems (CFINS) Department of Automation BNRist Tsinghua University ministry of education key lab for intelligent networks and network security Xi’an Jiaotong University Beijing Gas
Hydraulic calculation is a major path to the management of natural gas pipeline network. However, the investigated physical parameters of the pipes are usually obtained from blueprint or factory technical tests, which... 详细信息
来源: cnki会议 评论
Demonstration of Einstein–Podolsky–Rosen Steering with Multiple Observers via Sequential Measurements
收藏 引用
Chinese Physics Letters 2022年 第11期39卷 1-5页
作者: Jian Li Yang Zhou Qin Wang Institute of Quantum Information and Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China key lab of Broadband Wireless Communication and Sensor network Technology(ministry of education) Nanjing University of Posts and TelecommunicationsNanjing 210003China National Engineering Research Center of Telecommunication and networks Nanjing University of Posts and TelecommunicationsNanjing 210003China
Quantum correlation is a fundamental property that distinguishes quantum systems from classical ones,and is also a fragile resource under projective ***,it has been shown that a subsystem in entangled pairs can share ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SELECTION OF THE LINEAR COMBINING VECTOR G OF THE GENERALIZED SELF-SHRINKING GENERATORS
收藏 引用
Journal of Electronics(China) 2006年 第4期23卷 506-509页
作者: Dong Lihua Zeng Yong Hu Yupu The key lab of Computer networks and lnformation security the Ministry of Education Xidian University Xi'an 710071 China
Given an m-sequence, the main factor influencing the least period of the Generalized Self-Shrinking (GSS) sequence is the selection of the linear combining vector G. Based on the calculation of the minimal polynomia... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Analysis and improvement of a provable secure fuzzy identity-based signature scheme
收藏 引用
Science China(Information Sciences) 2014年 第9期57卷 156-160页
作者: XIONG Hu CHEN YaNan ZHU GuoBin QIN ZhiGuang School of Computer Science and Engineering University of Electronic Science and Technology of China Chongqing key lab of Computer network and Communication Technology key lab of network security and Cryptology Fujian Normal University School of Traffic and Transportation Beijing Jiaotong University
To enjoy the property of error tolerance in the biometric identities extraction,the fuzzy identitybased signature has been initialized to issue a signature on behalf of a descriptive attributes setωinstead of a singl... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Koblitz Elliptic Curves Generating Based on Evolutionary Cryptography Theory and Verifying Parameters Recommended by NIST
收藏 引用
China Communications 2011年 第4期8卷 41-49页
作者: 王潮 张焕国 刘礼黎 key lab of Specialty Fiber Optics and Optical Access network Ministry of Education Shanghai University key laboratory of Aerospace Information security and Trusted Computing Ministry of Education Computer School Wuhan University Huawei Technologies Co. Ltd
Elliptic curve cryptography is one of the most important public-key *** Koblitz Curve is a special kind of elliptic curve in ECC and its security mainly depends on the base *** on Evolutionary Cryptography theory,whic... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A NEW APPROACH TO DVC COMBINED WITH ROI EXTRACTION AND RESIDUAL VIDEO CODING FOR MULTIMEDIA SENSOR networks
收藏 引用
Journal of Electronics(China) 2013年 第1期30卷 17-24页
作者: Lin Zhaoxiao Sun Lijuan Xiao Fu Wang Ruchuan College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research key laboratory for Wireless Sensor networks key lab of Broadband Wireless Communication and Sensor network Technology (Nanjing University of Posts and Telecommunications) Ministry of Education Jiangsu Province
The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual co... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Trusted Routing Based on Identity-Based Threshold Signature for Opportunistic networks
收藏 引用
China Communications 2011年 第4期8卷 132-140页
作者: 陈曦 田有亮 李兴华 马建峰 key laboratory of Computer networks and Information security Ministry of EducationXidian University networking and Information Processing laboratory Rochester Institute of Technology
In opportunistic networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes *** solve this problem,we propose a security scheme based on the identity-based thres... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论