咨询与建议

限定检索结果

文献类型

  • 1,952 篇 期刊文献
  • 1,814 篇 会议
  • 1 册 图书

馆藏范围

  • 3,767 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,641 篇 工学
    • 1,809 篇 计算机科学与技术...
    • 1,409 篇 软件工程
    • 633 篇 信息与通信工程
    • 410 篇 电气工程
    • 361 篇 控制科学与工程
    • 318 篇 电子科学与技术(可...
    • 226 篇 生物工程
    • 199 篇 机械工程
    • 160 篇 网络空间安全
    • 149 篇 光学工程
    • 136 篇 生物医学工程(可授...
    • 129 篇 仪器科学与技术
    • 110 篇 动力工程及工程热...
    • 108 篇 安全科学与工程
    • 105 篇 交通运输工程
    • 71 篇 建筑学
    • 66 篇 化学工程与技术
    • 65 篇 土木工程
  • 1,282 篇 理学
    • 688 篇 数学
    • 349 篇 物理学
    • 250 篇 生物学
    • 220 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 67 篇 化学
  • 660 篇 管理学
    • 426 篇 管理科学与工程(可...
    • 259 篇 图书情报与档案管...
    • 158 篇 工商管理
  • 145 篇 法学
    • 92 篇 社会学
  • 136 篇 医学
    • 119 篇 临床医学
    • 100 篇 基础医学(可授医学...
  • 58 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 92 篇 feature extracti...
  • 72 篇 federated learni...
  • 68 篇 semantics
  • 68 篇 security
  • 63 篇 deep learning
  • 63 篇 optimization
  • 63 篇 computational mo...
  • 62 篇 training
  • 61 篇 accuracy
  • 61 篇 cryptography
  • 56 篇 blockchain
  • 54 篇 computer science
  • 53 篇 laboratories
  • 51 篇 privacy
  • 48 篇 authentication
  • 39 篇 servers
  • 39 篇 data models
  • 39 篇 robustness
  • 38 篇 data mining
  • 37 篇 protocols

机构

  • 149 篇 department of co...
  • 77 篇 key laboratory o...
  • 75 篇 national key lab...
  • 66 篇 school of softwa...
  • 62 篇 shandong provinc...
  • 57 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 48 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 37 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 31 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 hai jin
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 14 篇 xin wang
  • 13 篇 wu yuan
  • 13 篇 ming gu

语言

  • 3,124 篇 英文
  • 550 篇 其他
  • 104 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3767 条 记 录,以下是2931-2940 订阅
排序:
On YASS’s Non-monotonic security Performance
收藏 引用
Circuits, systems, and Signal Processing 2014年 第11期33卷 3527-3537页
作者: Yu, Lifang Zhao, Yao Ni, Rongrong Shi, Yun Qing Institute of Information Science Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Signal and Information Processing for High-end Printing Equipments Beijing Institute of Graphic Communication Beijing102600 China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States
Recently, researchers have discovered unexpected bumps in the detection rate curve of yet another steganographic scheme (YASS). We refer to this abnormal phenomenon as non-monotonic security performance. This paper fi... 详细信息
来源: 评论
A refined end-to-end discourse parser  19
A refined end-to-end discourse parser
收藏 引用
19th Conference on Computational Natural Language Learning: Shared Task, CoNLL 2015
作者: Wang, Jianxiang Lan, Man Shanghai Key Laboratory of Multidimensional Information Processing Department of Computer Science and Technology East China Normal University Shanghai200241 China
The CoNLL-2015 shared task focuses on shallow discourse parsing, which takes a piece of newswire text as input and returns the discourse relations in a PDTB style. In this paper, we describe our discourse parser that ... 详细信息
来源: 评论
Experimental Verification of a Multi-robot Distributed Control Algorithm with Containment and Group Dispersion Behaviors: the Case of Dynamic Leaders
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2014年 第1期1卷 54-60页
作者: Hejin Zhang Zhiyun Zhao Ziyang Meng Zongli Lin Department of Automation and Key Laboratory for System Control and Information Processing of Ministry of Education Shanghai Jiao Tong University the Access Linnaeus Centre School of Electrical Engineering Royal Institute of Technology Charles L. Brown Department of Electrical and Computer Engineering University of Virginia
This paper studies the containment and group dispersion control for a multi-robot system in the presence of dynamic leaders. Each robot is represented by a doubleintegrator dynamic model and a distributed control algo... 详细信息
来源: 评论
Safety and health monitoring of bridge construction based on wireless sensor network
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous Engineering 2014年 第3期9卷 257-268页
作者: Li, Xiaoling Yuan, Jimin School of Computer Science and Technology Chengdu University Chengdu 610106 China University Key Laboratory of Pattern Recognition and Intelligent information Processing Chengdu 610106 China The Department Computer Engineering Chengdu Aeronautic Vocational and Technical College Chengdu 610000 China
The existing safety and health monitoring methods for bridge construction are mainly manual monitoring and wired monitoring with many disadvantages, such as low efficiency, poor accuracy, great implementation difficul... 详细信息
来源: 评论
Estimating credibility of user clicks with mouse movement and eye-tracking information  3
Estimating credibility of user clicks with mouse movement an...
收藏 引用
3rd CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2014
作者: Mao, Jiaxin Liu, Yiqun Zhang, Min Ma, Shaoping State Key Laboratory of Intelligent Technology and Systems Beijing1000084 China Tsinghua National Laboratory for Information Science and Technology Beijing1000084 China Department of Computer Science and Technology Tsinghua University Beijing1000084 China
Click-through information has been regarded as one of the most important signals for implicit relevance feedback in Web search engines. Because large variation exists in users’ personal characteristics, such as searc... 详细信息
来源: 评论
Construction and analysis of website intrusion forensics model
Construction and analysis of website intrusion forensics mod...
收藏 引用
2014 International Conference on Manufacturing technology and Electronics Applications, ICMTEA 2014
作者: Chen, Yu Liu, Pei Yu Department of Information Science and Engineering Shandong Normal University China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology China
According to the website security and judicial forensics demands, a new Website Intrusion Forensics Model is proposed foe research. The model can discovery the website intrusion and forensic in time. This paper first ... 详细信息
来源: 评论
Study of test classification algorithm based on domain knowledge
Study of test classification algorithm based on domain knowl...
收藏 引用
Third International Conference on Cyberspace technology (CCT 2015)
作者: Yutong Gao Feifan Song Xiaqing Xie Qing Sun Xu Wu Department of Computer Science and Information Engineering National Taipei University of Technology China School of Economics andManagement Beijing University of Posts and Telecommunications China Beijing University of Posts and Telecommunications Library China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China
When facing various and massive data resources, how to effectively utilize the resources according to the division field is one of the core problem of the institutional repository research. In this paper, we improved ... 详细信息
来源: 评论
Positional translation language model for ad-hoc information retrieval
Positional translation language model for ad-hoc information...
收藏 引用
18th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2014
作者: Tu, Xinhui Luo, Jing Li, Bo He, Tingting Gu, Jinguang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Department of Computer Science Central China Normal University Wuhan China State Key Lab. of Software Engineering Wuhan University Wuhan China
Most existing language modeling approaches are based on the term independence hypothesis. To go beyond this assumption, two main directions were investigated. The first one considers the use of the proximity features ... 详细信息
来源: 评论
Independent component analysis based on information bottleneck
Abstract and Applied Analysis
收藏 引用
Abstract and Applied Analysis 2015年 第1期2015卷
作者: Ke, Qiao Zhang, Jiangshe Srivastava, H.M. Wei, Wei Chen, Guang-Sheng School of Mathematics and Statistics Xi'An Jiaotong University Xi'an 710049 China Department of Mathematics and Statistics University of Victoria Victoria V8W3R4 BC Canada School of Computer Science and Engineering Xi'An University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an 710048 China Department of Construction and Information Engineering Guangxi Modern Vocational Technology College Hechi Guangxi 547000 China
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
来源: 评论
A cloaking-based approach to protect location privacy in location-based services  33
A cloaking-based approach to protect location privacy in loc...
收藏 引用
Proceedings of the 33rd Chinese Control Conference, CCC 2014
作者: Zheng, Jiangyu Tan, Xiaobin Zou, Cliff Niu, Yukun Zhu, Jin CAS Key Laboratory of Technology in Geo-spatial Information Processing and Application System University of Science and Technology of China Hefei230026 China Department of Automation University of Science and Technology of China Hefei230026 China Department of Electrical Engineering and Computer Science University of Central Florida OrlandoFL32816-2362 United States
With the widespread use of mobile devices, the location-based service (LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a ... 详细信息
来源: 评论