咨询与建议

限定检索结果

文献类型

  • 1,952 篇 期刊文献
  • 1,814 篇 会议
  • 1 册 图书

馆藏范围

  • 3,767 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,641 篇 工学
    • 1,809 篇 计算机科学与技术...
    • 1,409 篇 软件工程
    • 633 篇 信息与通信工程
    • 410 篇 电气工程
    • 361 篇 控制科学与工程
    • 318 篇 电子科学与技术(可...
    • 226 篇 生物工程
    • 199 篇 机械工程
    • 160 篇 网络空间安全
    • 149 篇 光学工程
    • 136 篇 生物医学工程(可授...
    • 129 篇 仪器科学与技术
    • 110 篇 动力工程及工程热...
    • 108 篇 安全科学与工程
    • 105 篇 交通运输工程
    • 71 篇 建筑学
    • 66 篇 化学工程与技术
    • 65 篇 土木工程
  • 1,282 篇 理学
    • 688 篇 数学
    • 349 篇 物理学
    • 250 篇 生物学
    • 220 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 67 篇 化学
  • 660 篇 管理学
    • 426 篇 管理科学与工程(可...
    • 259 篇 图书情报与档案管...
    • 158 篇 工商管理
  • 145 篇 法学
    • 92 篇 社会学
  • 136 篇 医学
    • 119 篇 临床医学
    • 100 篇 基础医学(可授医学...
  • 58 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 92 篇 feature extracti...
  • 72 篇 federated learni...
  • 68 篇 semantics
  • 68 篇 security
  • 63 篇 deep learning
  • 63 篇 optimization
  • 63 篇 computational mo...
  • 62 篇 training
  • 61 篇 accuracy
  • 61 篇 cryptography
  • 56 篇 blockchain
  • 54 篇 computer science
  • 53 篇 laboratories
  • 51 篇 privacy
  • 48 篇 authentication
  • 39 篇 servers
  • 39 篇 data models
  • 39 篇 robustness
  • 38 篇 data mining
  • 37 篇 protocols

机构

  • 149 篇 department of co...
  • 77 篇 key laboratory o...
  • 75 篇 national key lab...
  • 66 篇 school of softwa...
  • 62 篇 shandong provinc...
  • 57 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 48 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 37 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 31 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 hai jin
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 14 篇 xin wang
  • 13 篇 wu yuan
  • 13 篇 ming gu

语言

  • 3,124 篇 英文
  • 550 篇 其他
  • 104 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3767 条 记 录,以下是2921-2930 订阅
排序:
Implicit knowledge discovery in biomedical ontologies: Computing interesting relatednesses
Implicit knowledge discovery in biomedical ontologies: Compu...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Tian Bai Leiguang Gong Casimir A. Kulikowski Lan Huang Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China College of Computer Science and Technology Jilin University Changchun China Yantai Intelligent Information Technologies Ltd. Yantai China Department of Computer Science Rutgers The State University of New Jersey Piscataway NJ USA
Ontologies, seen as effective representations for sharing and reusing knowledge, have become increasingly important in biomedicine, usually focusing on taxonomic knowledge specific to a subject. Efforts have been made... 详细信息
来源: 评论
A batch-mode active learning method based on the nearest average-class distance (NACD) for multiclass brain-computer interfaces
收藏 引用
Journal of Fiber Bioengineering and Informatics 2014年 第4期7卷 627-636页
作者: Chen, Minyou Tan, Xuemin Gan, John Q. Zhang, Li Jian, Wenjuan State Key Laboratory of Power Transmission Equipment and System Security and New Technology School of Electrical Engineering Chongqing University Chongqing China School of Computer Science and Electronic Engineering University of Essex Colchester CO4 3SQ United States
In this paper, a novel batch-mode active learning method based on the nearest average-class distance (ALNACD) is proposed to solve multi-class problems with Linear Discriminate Analysis (LDA) classifiers. Using the Ne... 详细信息
来源: 评论
A 20 GHz high speed, low jitter, high accuracy and wide correction range duty cycle corrector
A 20 GHz high speed, low jitter, high accuracy and wide corr...
收藏 引用
IEEE International SOC Conference
作者: Jun Guo Peng Liu Weidong Wang Jicheng Chen Yingtao Jiang College of Information Science and Electronic Engineering Zhejiang University Hangzhou China State Key Laboratory of High-end Server & Storage Technology Beijing China Department of Electrical and Computer Engineering University of Nevada Las Vegas Las Vegas NV USA
Duty-cycle correctors (DCCs) are employed in most high-speed VLSI systems to calibrate the clock duty-cycle at 50% to reduce the deterministic jitter introduced by duty-cycle distortion. An all-analogue feedback DCC c... 详细信息
来源: 评论
Improved preimage attacks against reduced HAS-160
Improved preimage attacks against reduced HAS-160
收藏 引用
10th International Conference on information security Practice and Experience, ISPEC 2014
作者: Hao, Ronglin Li, Bao Ma, Bingke Li, Xiaoqian Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China
HAS-160 is a Korean industry standard for hash functions. It has a similar structure to SHA-1 and produces a 160-bit hash value. In this paper, we propose improved preimage attacks against step-reduced HAS-160 using t... 详细信息
来源: 评论
A database encryption scheme based on the generalized aryabhata remainder theorem
收藏 引用
Journal of information Hiding and Multimedia Signal Processing 2014年 第4期5卷 603-613页
作者: Liu, Yanjun Liu, Yanjun Chang, Chin-Chen Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei230039 China Department of Computer Science and Information Engineering Asia University Taichung413 Taiwan No.26 Hexing Road Xiangfang District Harbin China Department of Information Engineering and Computer Science Feng Chia University Taichung407 Taiwan
Database security prevents the disclosure of confidential data within a database to unauthorized users, and has become an urgent challenge for a tremendous number of database applications. Data encryption is a widely-... 详细信息
来源: 评论
Potential predictability of vehicular staying time for large-scale Urban Environment
收藏 引用
IEEE Transactions on Vehicular technology 2014年 第1期63卷 322-333页
作者: Li, Yong Ren, Wenyu Jin, Depeng Hui, Pan Zeng, Lieguang Wu, Dapeng State Key Laboratory on Microwave and Digital Communications Tsinghua National Laboratory for Information Science and Technology Department of Electronic Engineering Beijing 100084 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Hong Kong Telekom Innovation Laboratories Berlin 10587 Germany Department of Electrical and Computer Engineering University of Florida Gainesville FL 32611-6130 United States
The newly emerged vehicular communication network is seen as a key technology for solving increasingly serious vehicular traffic congestion and improving road safety. New applications of vehicular networks are also em... 详细信息
来源: 评论
Convergence enhanced multi-objective particle swarm optimization with introduction of quorum-sensing inspired turbulence
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8794卷 394-403页
作者: Cheng, Shan Chen, Min-You Hu, Gang College of Electrical Engineering and New Energy China Three Gorges University Yichang443002 China State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing400044 China School of Electrical and Information Engineering Chongqing University of Science and Technology Chongqing401331 China
Enhancing the convergence property is one of the main goals to achieve when designing a multi-objective particle swarm optimization (MOPSO) algorithm. To promote convergence, a turbulence mechanism derived from the ba... 详细信息
来源: 评论
ONSA: Optimal non-uniformly statistic-source anonymity protocol in WSN
收藏 引用
Tongxin Xuebao/Journal on Communications 2015年 第6期36卷 2015143-01-2015143-12页
作者: Niu, Xiao-Guang Wei, Chuan-Bo Feng, Wei-Jiang Peng, Guo-Jun Zhang, Huan-Guo School of Computer Science Wuhan University Wuhan430072 China Key Laboratory of Aerospace Information Security and Trusted Computing MOE Wuhan University Wuhan430072 China School of Computer Science National University of Defense Technology Changsha410073 China
According to the characteristics of hierarchical event source-location privacy (SLP) in wireless sensor networks (WSN). Firstly, the effect of the cluster size and the statistical property of fake packet injection on ... 详细信息
来源: 评论
Noninvasive electrocardiographic imaging of cardiac arrhythmias: Enhance the diagnosis of bundle branch block
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8680卷 68-75页
作者: Wang, Liansheng Chen, Yiping Lin, Huangjing Ni, Dong Department of Computer Science School of Information Science and Engineering Xiamen University Xiamen China Guangdong Key Laboratory for Biomedical Measurements and Ultrasound Imaging Shenzhen518060 China College of Electronic Science and Engineering National University of Defense Technology Changsha China
Bundle Branch Block (BBB) is a heart disease which is usually diagnosed by the analysis of the ECG morphology and the duration of its QRS complex. Although body surface potential mapping (BSPM) provides more informati... 详细信息
来源: 评论
Utility-based cooperative decision in cooperative authentication
Utility-based cooperative decision in cooperative authentica...
收藏 引用
33rd IEEE Conference on computer Communications, IEEE INFOCOM 2014
作者: Guo, Yunchuan Yin, Lihua Liu, Licai Fang, Binxing Institute of Information Engineering Chinese Academy of Sciences Beijing China Department of Computer Science Beijing University of Posts and Telecommunications Beijing China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology China Beijing Key Laboratory of IOT Information Security Institute of Information Engineering CAS China
In mobile networks, cooperative authentication is an efficient way to recognize false identities and messages. However, an attacker can track the location of cooperative mobile nodes by monitoring their communications... 详细信息
来源: 评论