欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
立项数据库
> 立项详情页
数字家庭网络安全管理关键技术研究
项目名称:数字家庭网络安全管理关键技术研究
项目类别:联合基金项目
批准号:U0835001
项目来源:国家自然科学基金
研究期限:1900-01-01-1900-01-01
项目负责人:杨义先
依托单位:北京邮电大学
批准年度:2008
成果综合统计
成果类型
数量
期刊论文
会议论文
专利
获奖
著作
71
53
0
8
3
期刊论文
一种保持非负整数值的图像加密算法
A Comparative Study on Flood DoS and Low-Rate DoS Attacks
Blind channel equalization algorithm for chaotic MIMO communication systems
GF(2192)域上ECC加密的FPGA实现研究
Xen虚拟机的优化网络适配器研究与实现
A new hyperchaotic system and its circuit realization
Sensor selection for source extraction in heterogeneous wireless sensor networks
高阶电荷泵锁相环滤波器的设计
Codebook Design for Vector Quantization Based on a Kernel Fuzzy Learning Algorithm
文档安全生命周期管理研究与实现
Blind Source Separation of Continuous-Time Chaotic Signals Based on Fast Random Search Algorithm
一种改进的椭圆曲线安全代理签名方案
固定增益的两跳OSTBC中断概率分析
采用冒泡原理进行多轨迹识别的方法
KFCE: A dictionary generation algorithm for sparse representation
AN ALGORITHM FOR DICTIONARY GENERATION IN SPARSE REPRESENTATION
An Adaptive Denoising Algorithm for Noisy Chaotic Signals Based on Local Sparse Representation
Stability Analysis of Periodic Orbits of Non-Autonomous Piecewise Linear Systems by Mapping Approach
Discrete-Time Modeling and Stability Analysis of Periodic Orbits With Sliding for Switched Linear Sy
基于PDF文档结构的数字水印算法
GF(2~(192))域上ECC加密的FPGA实现
评价离散度敏感的P2P交易系统信任模型
一种双轴轮室内服务机器人小车伺服控制系统
Filtering noisy chaotic signal via sparse representation based on random frame dictionary
AN ALGORITHM FOR DICTIONARY GENERATION IN SPARSE REPRESENTATION
Video stabilization motion filtering based on constraint unscented Kalman filter
Contrastive Analysis of Software Networks Based on Different Coupling Relationships
基于联合特征匹配的多视角三维重建方法
一种基于物联网技术的食品安全预警系统
一个新的超混沌系统
基于UKF的多用户混沌通信
一种混沌映射的相空间去噪方法
混沌信号在无线传感器网络中的盲分离
一种基于人工蜂群算法的混沌信号盲分离方法
基于广义似然比判决的混沌信号重构方法
一种参数优化的混沌信号自适应去噪算法
一种水下无线传感器网络数据的盲分离算法
双跳MIMO无线传感器网络的通信性能分析
功率平衡理论在研究非线性电路与混沌中的进展
基于非局部均值的混沌映射噪声抑制算法
Dispersion compensation in an open-loop all-optical chaotic communication system
A sparse projection clustering algorithm
基于超宽带信号和地面数字电视信号的无线联合定位系统
两跳OSTBC传输的通信性能分析
Real-time nonlinear structural system identification via iterated unscented Kalman filter
会议论文
Optimized Source Authentication Scheme for Multicast Based on Merkle Tree and TESLA
An Improved PrefixSpan-based Signatures Mining Algorithm with Offset Constraint
A Blind Source Separation Method Based on Kalman Filtering
Efficient Ciphertext-Policy Attribute-based Encryption with Revocation
New Optimistic Fair Exchange Protocol Based on VE-RSA Signature
A Color Image Watermarking Algorithm Resistant to Print–Scan
Passive NATted Hosts Detect Algorithm Based on Directed Acyclic Graph Support Vector Machine
A Robust Zero-watermark Algorithm Based on SVD for Digital Right Management
A Method for Security Evaluation on AJAX-Based Applications
A Digital Image Watermarking Algorithm Based on Chaos and Fresnel Transform
A DDoS attack defending scheme based on network processor
Blind Steganalysis Based on Features in Fractional Fourier Transform Domain
A NOVEL SYMBOLIC EXECUTION FRAMEWORK FOR MULTI-PROCEDURE PROGRAM ANALYSIS
Network Worm Propagating Model Based on Network Topology Unit
A Method for System Auditing Based on Baseline Assessment
The Analysis of Information System Software Security Based on The K-core Decomosition
A Novel Digital Image Transforming Method And Its Watermarking Scheme
Vulnerabilities Analyzing Model for Alert Correlation in Distributed Environment
Network Worm Propagating Model Based on Network Topology Unit
The Studies of Comprehensive Decision Quantitative Models on Information System Security Detection
Uniform and Orthogonal Evolution Algorithm with Powell Local Search
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency
Blind Steganalysis Based on Features in Fractional Fourier Transform Domain
A NOVEL SYMBOLIC EXECUTION FRAMEWORK FOR MULTI-PROCEDURE PROGRAM ANALYSIS
Network Worm Propagating Model Based on Network Topology Unit
A new framework of global object-oriented dataflow analysis
An Application-level Features Mining Algorithm based on PrefixSpan
Information System Security Function Validating Using Model Checking
Reconstruction of Chaotic Signals in Wireless Sensor Networks
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency
A DDoS attack defending scheme based on network processor
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency
A DDoS attack defending scheme based on network processor
Blind Steganalysis Based on Features in Fractional Fourier Transform Domain
A NOVEL SYMBOLIC EXECUTION FRAMEWORK FOR MULTI-PROCEDURE PROGRAM ANALYSIS
Disassortativity and Degree Distribution of Software Coupling Networks in Object-oriented Software S
Runtime Protecting System for Java Applications with Dynamic Data Flow Analyzing
The Analysis of Classified Protection Compliance Detection Based on Dempster-Shafer Theory
Improved Algorithm of Pattern Matching based on BMHS
Comment on A Novel Non-interactive Verifiable Secret Sharing Scheme
RE-KEYING SCHEME FOR SECURE MULTICAST BASED ON MULTI-GROUP KEY TREE
A Method for Topology Conformance Tests under Logical Constraints
Model Checking Based Security Policy Verification and Validation
Protocol Adaption of NAC in Mobile Telecommunication Networks
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency
A DDoS attack defending scheme based on network processor
Blind Steganalysis Based on Features in Fractional Fourier Transform Domain
A NOVEL SYMBOLIC EXECUTION FRAMEWORK FOR MULTI-PROCEDURE PROGRAM ANALYSIS
A REAL-TIME INFORMATION HIDING ALGORITHM BASED ON HTTP PROTOCOL
DYNAMIC DATA FLOW GRAPH-BASED SOFTWARE WATERMARKING
The Research of Group Key Distribution Scheme in TNC
A SECRET SHARING SCHEME BASED ON NEAR-MDS CODES
Network Worm Propagating Model Based on Network Topology Unit
获奖
高等学校教学名师奖
第六届高等教育国家级教学成果二等奖
2009年国家级教学团队
国家信息安全公共服务共性支撑技术研究及应用示范
高等学校教学名师奖
第六届高等教育国家级教学成果二等奖
2009年国家级教学团队
国家信息安全公共服务共性支撑技术研究及应用示范
著作
传感器网络中的盲源分离与信号重构
混沌信号与信息处理
PRIME FACFORIZATION THEORY OF NETWORKS
杨义先的项目
可重构的动态逻辑门基础理论研究
期刊论文 14
获奖 1
专利 1
混沌压缩感知关键基础理论研究
期刊论文 1
国际通信和信息会议
通信编码方法在密码中的应用
基于混沌动力学与复杂网络的群智能优化研究
期刊论文 44
会议论文 5
信息通信技术国际会议
期刊论文 3
代数交换与网络编码
期刊论文 16
专利 3
信号理论与信号处理
期刊论文 5
入侵检测理论与技术
密钥托管加密系统应用基础研究
期刊论文 10
安全电子支付系统的关键理论与技术研究
期刊论文 8
基于短消息的安全微支付理论与技术研究
期刊论文 60
会议论文 2
著作 1
计算智能在现代编码中的应用研究
期刊论文 8