咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是2991-3000 订阅
排序:
Implementation of rate matching with low latency and little memory for LTE turbo code
收藏 引用
Journal of information and Computational science 2013年 第13期10卷 4117-4125页
作者: He, Suqin Hu, Qiaozhi Zhang, Haijun Department of Computer Science and Technology Beijing University of Chemical Technology Beijing 100029 China Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing 100876 China
In LTE (Long Term Evolution), the high utilization for physical resources is achieved by scheduling suitable number of time frequency resource elements for one user in one subframe. This is supported by the rate match... 详细信息
来源: 评论
A Two-Stage State Recognition Method for Asynchronous SSVEP-Based Brain-computer Interface system
收藏 引用
机器人 2013年 第1期35卷 45-51页
作者: ZHANG Zimu DENG Zhidong State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and TechnologyDepartment of Computer Science and TechnologyTsinghua University
A two-stage state recognition method is proposed for asynchronous SSVEP(steady-state visual evoked potential) based brain-computer interface(SBCI) *** two-stage method is composed of the idle state(IS) detection and c... 详细信息
来源: 评论
High-Order Terminal Sliding-Mode Control Strategy for Wind Energy Integration into Power Network
High-Order Terminal Sliding-Mode Control Strategy for Wind E...
收藏 引用
第三十二届中国控制会议
作者: FENG Yong ZHOU Minghao WANG Yuye YANG Yongming Department of Electrical Engineering Harbin Institute of Technology Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University College of Information and Communication Engineering Harbin Engineering University
This paper proposes a high-order terminal sliding-mode control strategy for wind energy integration into power network.A typical wind energy- conversion system and its mathematical model are *** a wind turbine to have... 详细信息
来源: 评论
Object coding on the semantic graph for scene classification  13
Object coding on the semantic graph for scene classification
收藏 引用
21st ACM International Conference on Multimedia, MM 2013
作者: Chen, Jingjing Han, Yahong Cao, Xiaochun Tian, Qi School of Computer Science and Technology Tianjin University China State Key Laboratory of Information Security Chinese Academy of Sciences China Tianjin Key Laboratory of Cognitive Computing and Application China Department of Computer Science University of Texas at San Antonio United States
In the scene classification, a scene can be considered as a set of object cliques. Objects inside each clique have semantic correlations with each other, while two objects from different cliques are relatively indepen... 详细信息
来源: 评论
Boundary feedback control design and stability of open-channel networks
Communications in Computer and Information Science
收藏 引用
Communications in computer and information science 2013年 355卷 342-350页
作者: Cen, Lihui Xi, Yugeng Li, Dewei Cen, Yigang Department of Control Engineering Central South University Changsha China Key Laboratory of System Control and Information Processing Ministry of Education Department of Automation Shanghai Jiaotong University Shanghai China School of Computer and Information Technology Beijing Jiaotong University Beijing China
This paper proposed a boundary feedback control design for open-channel networks with trapezoidal cross sections by using a Riemann invariants approach. The open-channel network is well modeled by the nonlinear Saint-... 详细信息
来源: 评论
Gaussian-modulated coherent-state measurement-device-independent quantum key distribution
收藏 引用
Physical Review A 2014年 第4期89卷 042335-042335页
作者: Xiang-Chun Ma Shi-Hai Sun Mu-Sheng Jiang Ming Gui Lin-Mei Liang College of Science National University of Defense Technology Changsha 410073 People's Republic of China Centre for Quantum Information and Quantum Control Department of Physics and Department of Electrical and Computer Engineering University of Toronto Toronto Ontario Canada M5S 3G4 State Key Laboratory of High Performance Computing National University of Defense Technology Changsha 410073 People's Republic of China
Measurement-device-independent quantum key distribution (MDI-QKD), leaving the detection procedure to the third partner and thus being immune to all detector side-channel attacks, is very promising for the constructio... 详细信息
来源: 评论
Cryptanalysis of 2-layer nonlinear piece in hand method
Cryptanalysis of 2-layer nonlinear piece in hand method
收藏 引用
CD-ARES 2013 Workshops: 2nd International Workshop on Modern Cryptography and security Engineering, MoCrySEn 2013 and 3rd International Workshop on security and Cognitive Informatics for Homeland Defense, SeCIHD 2013
作者: Nie, Xuyun Petzoldt, Albrecht Buchmann, Johannes School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Technische Universität Darmstadt Department of Computer Science Hochschulstraße 10 64289 Darmstadt Germany State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Network and Data Security Key Laboratory of Sichuan Province China
Piece in Hand method is a security enhancement method for Multivariate Public key Cryptosystems (MPKCs). Since 2004, many types of this method have been proposed. In this paper, we consider the 2-layer nonlinear Piece... 详细信息
来源: 评论
An expressive decentralizing KP-ABE scheme with constant-size ciphertext
收藏 引用
International Journal of Network security 2013年 第3期15卷 131-140页
作者: Li, Qinyi Xiong, Hu Zhang, Fengli Zeng, Shengke School of Computer Science and Engineering University of Electronic Science and Technology of China No.2006 Xiyuan Avenue West Hi-tech Zone Chengdu 611731 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100080 China
Decentralizing attribute based encryption is a variant of multi-authority attribute based encryption which doesn't require a trusted central authority to conduct the system setup. In this paper, we propose an expr... 详细信息
来源: 评论
Secure Deduplication Storage systems with keyword Search
Secure Deduplication Storage Systems with Keyword Search
收藏 引用
IEEE International Conference on Advanced information Networking and Applications
作者: Jin Li Xiaofeng Chen Fatos Xhafa Leonard Barolli School of Computer Science Guangzhou University China State Key Laboratory of Integrated Service Networks (ISN) Xidian University P.R. China Department of Languages and Informatics Systems Technical University of Catalonia Barcelona Spain Department of Information and Communication Engineering Fukuoka Institute of Technology Japan
Data deduplication is an attractive technology to reduce storage space and upload bandwidth for increasing vast amount of duplicated and redundant data. In a cloud storage system with data deduplication, duplicate cop... 详细信息
来源: 评论
Petri net based techniques for constructing reliable service composition
Petri net based techniques for constructing reliable service...
收藏 引用
作者: Fan, Guisheng Yu, Huiqun Chen, Liqiong Liu, Dongmei Department of Computer Science and Engineering East China University of Science and Technology China Shanghai Key Laboratory of Computer Software Evaluating and Testing China Department of Computer Science and Information Engineering Shanghai Institute of Technology China
Service composition is an important mean for integrating the individual Web services to create new value added systems that satisfy complex requirements. However, it is challenging to guarantee the reliability of serv... 详细信息
来源: 评论