咨询与建议

限定检索结果

文献类型

  • 1,952 篇 期刊文献
  • 1,814 篇 会议
  • 1 册 图书

馆藏范围

  • 3,767 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,641 篇 工学
    • 1,809 篇 计算机科学与技术...
    • 1,409 篇 软件工程
    • 633 篇 信息与通信工程
    • 410 篇 电气工程
    • 361 篇 控制科学与工程
    • 318 篇 电子科学与技术(可...
    • 226 篇 生物工程
    • 199 篇 机械工程
    • 160 篇 网络空间安全
    • 149 篇 光学工程
    • 136 篇 生物医学工程(可授...
    • 129 篇 仪器科学与技术
    • 110 篇 动力工程及工程热...
    • 108 篇 安全科学与工程
    • 105 篇 交通运输工程
    • 71 篇 建筑学
    • 66 篇 化学工程与技术
    • 65 篇 土木工程
  • 1,282 篇 理学
    • 688 篇 数学
    • 349 篇 物理学
    • 250 篇 生物学
    • 220 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 67 篇 化学
  • 660 篇 管理学
    • 426 篇 管理科学与工程(可...
    • 259 篇 图书情报与档案管...
    • 158 篇 工商管理
  • 145 篇 法学
    • 92 篇 社会学
  • 136 篇 医学
    • 119 篇 临床医学
    • 100 篇 基础医学(可授医学...
  • 58 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 92 篇 feature extracti...
  • 72 篇 federated learni...
  • 68 篇 semantics
  • 68 篇 security
  • 63 篇 deep learning
  • 63 篇 optimization
  • 63 篇 computational mo...
  • 62 篇 training
  • 61 篇 accuracy
  • 61 篇 cryptography
  • 56 篇 blockchain
  • 54 篇 computer science
  • 53 篇 laboratories
  • 51 篇 privacy
  • 48 篇 authentication
  • 39 篇 servers
  • 39 篇 data models
  • 39 篇 robustness
  • 38 篇 data mining
  • 37 篇 protocols

机构

  • 149 篇 department of co...
  • 77 篇 key laboratory o...
  • 75 篇 national key lab...
  • 66 篇 school of softwa...
  • 62 篇 shandong provinc...
  • 57 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 48 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 37 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 31 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 hai jin
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 14 篇 xin wang
  • 13 篇 wu yuan
  • 13 篇 ming gu

语言

  • 3,124 篇 英文
  • 550 篇 其他
  • 104 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3767 条 记 录,以下是2941-2950 订阅
排序:
Pitfalls in an ECC-based lightweight authentication protocol for low-cost RFID
收藏 引用
Journal of information Hiding and Multimedia Signal Processing 2014年 第4期5卷 642-648页
作者: Chen, Chien-Ming Chen, Shuai-Min Zhen, Xinying Yan, Lijun Wang, Huaxiong Sun, Hung-Min Innovative Information Industry Research Center School of Computer Science and Technology Shenzhen Graduate School Harbin Institute of Technology Shenzhen518055 China Shenzhen Key Laboratory of Internet Information Collaboration Shenzhen518055 China Department of Computer Science National Tsing Hua University Hisnchu30013 Taiwan Division of Mathematical Sciences School of Physical and Mathematical Sciences Nanyang Technological University Singapore
RFID technology has become popular in many applications;however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In 2009, Chien and Laih proposed... 详细信息
来源: 评论
Depth enhanced saliency detection method  14
Depth enhanced saliency detection method
收藏 引用
6th International Conference on Internet Multimedia Computing and Service, ICIMCS 2014
作者: Cheng, Yupeng Fu, Huazhu Wei, Xingxing Xiao, Jiangjian Cao, Xiaochun School of Computer Science and Technology Tianjin University China School of Computer Engineering Nanyang Technological University Singapore State Key Laboratory of Information Security Chinese Academy of Sciences China Ningbo Industrial Technology Research Institute Chinese Academy of Sciences China
Human vision system understands the environment from 3D perception. However, most existing saliency detection algorithms detect the salient foreground based on 2D image information. In this paper, we propose a salienc... 详细信息
来源: 评论
Improvement of a remote data possession checking protocol from algebraic signatures
Improvement of a remote data possession checking protocol fr...
收藏 引用
10th International Conference on information security Practice and Experience, ISPEC 2014
作者: Yu, Yong Ni, Jianbing Ren, Jian Wu, Wei Chen, Lanxiang Xia, Qi School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Department of Electrical and Computer Engineering Michigan State University MI 4882 United States School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China
Cloud storage allows cloud users to enjoy the on-demand and high quality data storage services without the burden of local data storage and maintenance. However, the cloud servers are not necessarily fully trusted. As... 详细信息
来源: 评论
ESYN: Efficient synchronization clustering algorithm based on dynamic synchronization model
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 86-93页
作者: Dong, Xue-Wen Yang, Chao Sheng, Li-Jie Ma, Jian-Feng Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China School of Computer Science and Technology Xidian University Xi'an710071 China
Clustering is an important research field in data mining. Based on dynamical synchronization model, an efficient synchronization clustering algorithm ESYN is proposed. Firstly, based on local structure information of ... 详细信息
来源: 评论
Dominant Skyline Query Processing over Multiple Time Series
收藏 引用
Journal of computer science & technology 2013年 第4期28卷 625-635页
作者: 汪浩 王朝坤 徐亚军 宁苑池 Department of Computer Science and Technology Tsinghua University Tsinghua National Laboratory for Information Science and Technology Key Laboratory for Information System Security Ministry of Education School of Software Tsinghua University
Multiple time series (MTS), which describes an object in multi-dimensions, is based on single time series and has been proved to be useful. In this paper, a new analytical method called α/β-Dominant-Skyline on MTS... 详细信息
来源: 评论
Mechanism of heuristic strategy based partition algorithm for massive semantic data flow
收藏 引用
Xitong Gongcheng Lilun yu Shijian/system Engineering Theory and Practice 2014年 34卷 248-254页
作者: Chen, Feng-Jiao Fu, Hai-Dong Wu, Gang Gu, Jin-Guang Department of Computer Science and Technology Wuhan University of Science and Technology Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan430065 China
The dramatic growth of massive semantic data has brought about great challenges to the distributed storage for large data. The core technology of distributed storage is graph partitioning. This paper discussed the par... 详细信息
来源: 评论
STSHC: Secure and trusted scheme for Hadoop cluster
收藏 引用
International Journal of High Performance systems Architecture 2014年 第1期5卷 63-69页
作者: Zhou, Quan Wu, Daixian Tang, Chunming Rong, Chunming Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes Guangzhou University 510006 Guangzhou China College of Computer and Information Science and College of Software Southwest University 400715 Chongqing China School of Mathematics and Information Science Guangzhou University 510006 Guangzhou China Department of Science and Technology University of Stavanger 4036 Stavanger Norway
Hadoop is a distributed big data storage and processing framework hugely adopted in different sectors from online media, education, government and social media to handle the enormous growth of information in their res... 详细信息
来源: 评论
Matching heterogeneous events with patterns
Matching heterogeneous events with patterns
收藏 引用
International Conference on Data Engineering
作者: Xiaochen Zhu Shaoxu Song Jianmin Wang Philip S. Yu Jiaguang Sun Key Laboratory for Information System Security Tsinghua University Beijing China Department of Computer Science University of Illinois at Chicago USA
A large amount of heterogeneous event data are increasingly generated, e.g., in online systems for Web services or operational systems in enterprises. Owing to the difference between event data and traditional relatio... 详细信息
来源: 评论
A secure self-destruction scheme with IBE for the internet content privacy
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2014年 第1期37卷 139-150页
作者: Xiong, Jin-Bo Yao, Zhi-Qiang Ma, Jian-Feng Li, Feng-Hua Liu, Xi-Meng Faculty of Software Fujian Normal University Fuzhou 350108 China School of Computer Science and Technology Xidian University Xi'an 710071 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the p... 详细信息
来源: 评论
Research of the issues based on trusted cloud security
Research of the issues based on trusted cloud security
收藏 引用
4th International Conference on Materials science and information technology, MSIT 2014
作者: Huang, Yi Ma, Xin Qiang Liu, You Yuan Li, Dan Ning Key Laboratory of Machine Vision and Intelligent Information System Chongqing University of Arts and Sciences Chongqing 402160 China Guizhou Academy of Science Guiyang 550001 China School of Computer Science and Technology Guizhou University Guiyang 550025 China
Cloud computing represents one of the most significant shifts in information technology many of us are likely to see in our lifetimes. It offers an innovative business model for organizations to adopt IT services with... 详细信息
来源: 评论