咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是2981-2990 订阅
排序:
LaFT-tree: Perceiving the expansion trace of one's circle of friends in online social networks  13
LaFT-tree: Perceiving the expansion trace of one's circle of...
收藏 引用
6th ACM International Conference on Web Search and Data Mining, WSDM 2013
作者: Zhang, Jun Wang, Chaokun Wang, Jianmin Yu, Philip S. Department of Computer Science and Technology Tsinghua University Beijing China School of Software Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security Ministry of Education China Department of Computer Science University of Illinois at Chicago Chicago IL United States
Many patterns have been discovered to explain and analyze how people make friends. Among them is the triadic closure, supported by the principle of the transitivity of friendship, which means for an individual the fri... 详细信息
来源: 评论
Anything is service: Using LIR-OSGi and R2-OSGi to construct ubiquitous service network
Journal of Software
收藏 引用
Journal of Software 2013年 第1期8卷 236-242页
作者: Liu, Jinzhao Wang, Dan Chen, Yu Lv, Yongqiang College of Computer Science Beijing University of Technology Beijing China Department of Computer Science and Technology Tsinghua University China Research Institute of Information Technology Key Laboratory of Pervasive Computing Ministry of Education Tsinghua University China
As an emerging portable service platform, OSGi is now taking a more and more important role in constructing a ubiquitous computing system. Since ubiquitous computing system is always a distributed system, people may f... 详细信息
来源: 评论
Parallel multi-recipient proxy re-encryption for secure group communication in wireless networks
收藏 引用
ICIC Express Letters 2013年 第8期7卷 2203-2209页
作者: Zhang, Minqing Wu, Xuguang Han, Yiliang School of Computer Science and Engineering Northwestern Polytechnical University Xi'an 710068 China Key Laboratory on Networks and Information Security of CAPF Department of Electronic Technology Engineering University of Armed Police Force Sanqiao Xi'an 710086 China
A parallel multi-recipient proxy re-encryption scheme is proposed, which significantly improves the efficiency of group communication in decentralized wireless networks. The network model is presented, that is, powerf... 详细信息
来源: 评论
An efficient scheme for detecting copy-move forged images by local binary patterns
收藏 引用
Journal of information Hiding and Multimedia Signal Processing 2013年 第1期4卷 46-56页
作者: Li, Leida Li, Shushang Zhu, Hancheng Chu, Shu-Chuan Roddick, John F. Pan, Jeng-Shyang School of Information and Electrical Engineering China University of Mining and Technology Xuzhou 221116 China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai 200240 China School of Computer Science Engineering and Mathematics Flinders University of South Australia SA 5001 Australia Department of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School Shenzhen 518055 China
Copy-move is one of the most common image tampering method. Many schemes have been proposed to detect and locate the forged regions. However, many existing schemes fail when the copied region is rotated or ipped befor... 详细信息
来源: 评论
Rate-adaptive reconciliation and its estimator for quantum bit error rate
Rate-adaptive reconciliation and its estimator for quantum b...
收藏 引用
International Symposium on Communications and information Technologies (ISCIT)
作者: Patcharapong Treeviriyanupab Tharathorn Phromsa-ard Chun-Mei Zhang Mo Li Paramin Sangwongngam Tomeyot Sanevong Na Ayutaya Nattapong Songneam Ronnagorn Rattanatamma Chanvate Ingkavet Wasana Sanor Wei Chen Zheng-Fu Han Keattisak Sripimanwat Department of Computer Science Phranakhon Rajabhat University (PNRU) Bangkok Thailand Chulalongkorn University Bangkok TH Key Laboratory of Quantum Information University of Science and Technoloey of China (USTC) Hefei China National Science and Technology Development Agency (NSTDA) National Electronics and Computer Technology Center (NECTEC) Pathum Thani Thailand Phranakhon Rajabhat University Bangkok TH
The purpose of reconciliation, one of classical aspects of quantum key distribution (QKD) protocol, is to mitigate errors after the distribution of quantum information over a quantum channel. In this paper, a rate-ada... 详细信息
来源: 评论
Erratum to “Consensus seeking over directed networks with limited information communication” [Automatica 49 (2) (2013) 610–618]
收藏 引用
Automatica 2014年 第9期50卷 2430-2431页
作者: Dequan Li Qipeng Liu Xiaofan Wang Zongli Lin School of Science Anhui University of Science and Technology Huainan 232001 Anhui Province PR China Department of Automation Shanghai Jiao Tong University Shanghai 200240 PR China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai 200240 PR China Charles L. Brown Department of Electrical and Computer Engineering University of Virginia P.O. Box 400743 Charlottesville VA 22904-4743 USA
来源: 评论
SA4WSs: A security architecture for web services
SA4WSs: A security architecture for web services
收藏 引用
International Conference on information and Communication technology, ICT-EurAsia 2013
作者: Liu, Lingxia Wang, Dongxia Zhao, Jinjing Huang, Minhuan Beijing Institute of System Engineering Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China Information and Navigation Institute Air Force Engineering University Xi'an China
With the rapid development and wide application of the Web services, its security flaws and vulnerabilities are increasing. security has become one of the key issues to constrain the development of Web services techno... 详细信息
来源: 评论
An integrated security framework for SOA
An integrated security framework for SOA
收藏 引用
2nd International Conference on Mechanical Engineering, Industrial Electronics and Informatization, MEIEI 2013
作者: Liu, Ling Xia Wang, Dong Xia Huang, Min Huan Zhang, Rui Beijing Institute of System Engineering Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China The Information and Navigation Institute Air Force Engineering University Xi'an China
In today's Web environment, Service Oriented Architecture (SOA) becomes an efficient paradigm to integrate distributed applications. Due to loosely coupled nature of SOA, security is one of the most important issu... 详细信息
来源: 评论
A network forensics system for information leak events
A network forensics system for information leak events
收藏 引用
8th International Conference on Wireless Algorithms, systems, and Applications, WASA 2013
作者: Zou, Tao Alam, Mansoor Song, Min Department of Electrical Engineering and Computer Science University of Toledo Toledo OH 43606 United States Beijing Institute of System Engineering Beijing 100101 China Science and Technology Laboratory of Information System Security Beijing 100101 China
The events of information leak and illegal content propagation often occur on the network. The existing techniques cannot collect sufficient evidences about users' contents to support forensics for these events. A... 详细信息
来源: 评论
A semi-informative aware approach using topic model for medical search
A semi-informative aware approach using topic model for medi...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Qinmin Vivian Hu Liang He Mingyao Li Jimmy Xiangji Huang E. Mark Haacke Shanghai Key Laboratory of Multidimensional Information Processing MR Research Facility Wayne State University Detroit MI USA Department of Computer Science & Technology East China Normal University Shanghai China Information Retrieval and Knowledge Management Research Lab York University Toronto Canada
We propose a semi-informative aware approach using the topic model on query expansion problem in the biomedicine domain. the demographics and disease information is applied to semi-structure the topic model as the “k... 详细信息
来源: 评论