咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是3001-3010 订阅
排序:
Approach for automatic construction of ontology based on medication guide
Approach for automatic construction of ontology based on med...
收藏 引用
7th Chinese Semantic Web Symposium and the 2nd Chinese Web scienceConference, CSWS 2013
作者: Lu, Yuting Gu, Jinguang Huang, Zhisheng Computer Science and Technology Wuhan University of Science and Technology Wuhan 430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan 430065 China Department of Computer Science Vrije University of Amsterdam 1081hv Amsterdam Netherlands
Medication guide ontology has great significance for semantic study of rational use of drugs. Nowadays, medical ontology is mainly constructed manually, which spends a lot in time and manpower, and is also difficult t... 详细信息
来源: 评论
Towards Thwarting Unauthorized Network Accesses with a Feather-Weight Hypervisor
Towards Thwarting Unauthorized Network Accesses with a Feath...
收藏 引用
International Conference on Cloud Computing and Big Data (CloudCom-Asia)
作者: Yan Wen Jinjing Zhao Hua Chen Lufeng Zhang Information System Security National Key Laboratory of Science and Technology Beijing China
In the cloud computing environment, most of applications rely on the network access to achieve their functionalities. Untrusted or vulnerable cloud applications will incur unauthorized network accesses which may bring... 详细信息
来源: 评论
Exponential-condition-based barrier certificate generation for safety verification of hybrid systems
收藏 引用
25th International Conference on computer Aided Verification, CAV 2013
作者: Kong, Hui He, Fei Song, Xiaoyu Hung, William N. N. Gu, Ming Dept. of Computer Science and Technology Tsinghua University Beijing China School of Software Tsinghua University Beijing China Dept. of ECE Portland State University OR United States Synopsys Inc. Mountain View CA United States Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security MOE China
A barrier certificate is an inductive invariant function which can be used for the safety verification of a hybrid system. Safety verification based on barrier certificate has the benefit of avoiding explicit computat... 详细信息
来源: 评论
Mining user interests in web logs of an online news service based on memory model
Mining user interests in web logs of an online news service ...
收藏 引用
2013 IEEE 8th International Conference on Networking, Architecture and Storage, NAS 2013
作者: Wang, Wei Zhao, Dongyan Luo, Haining Wang, Xin Key Laboratory on Information Security Engineering University of CAPF Xi'an China Institute of Computer Science and Technology Peking University Beijing China Computer Management Center Armed Police General Hospital Beijing China
User profiling plays an important role in online news recommendation systems. In this paper, we analyze the relationship between users' clicking behaviors and the category of the news story to model user's int... 详细信息
来源: 评论
Mountain landslide monitoring based on wireless sensor network
收藏 引用
information technology Journal 2013年 第15期12卷 3357-3362页
作者: Li, Xiaoling Yuan, Jimin School of Computer Science and Technology Chengdu University 610106 Chengdu China University Key Laboratory of Pattern Recognition Intelligent Information Processing 610106 Chengdu China Department Computer Engineering Chengdu Aeronautic Vocational and Technical College Chengdu 610000 China
The study provides a design scheme for the mountain landslide monitoring system based on wireless sensor networks. Different sensors are mainly used to collect data about the water depth in the soil and the sloping an... 详细信息
来源: 评论
Index modulated OFDM with ICI self-cancellation in underwater acoustic communications
Index modulated OFDM with ICI self-cancellation in underwate...
收藏 引用
Asilomar Conference on Signals, systems & computers
作者: Miaowen Wen Yuke Li Xiang Cheng Liuqing Yang School of Electronic and Information Engineering South China University of Technology Guangzhou China State Key Laboratory of Management and Control for Complex Systems Institute of Automation Chinese Academy of Sciences Beijing China School of Electronics Engineering and Computer Science Peking University Beijing China Department of Electrical and Computer Engineering Colorado State University Fort Collins CO USA
OFDM is promising for underwater acoustic (UWA) communications due to its potential to combat the large delay spread. However, the performance of the OFDM system is seriously deteriorated by the inter-carrier interfer... 详细信息
来源: 评论
Research on the degeneration problem of key sequence based on chaos
Research on the degeneration problem of key sequence based o...
收藏 引用
5th IEEE International Conference on Intelligent Networking and Collaborative systems, INCoS 2013
作者: Wang, Jing-Jing Wei, Ping Chen, Jia-Yong Key Laboratory of Network and Information Security of APF Department of Electronic Technology Engineering University of APF Xi'an 710086 China Laboratory-Center of Computer Department of Information Engineering Engineering University of APF Xi'an 710086 China Laboratory of Information and Network of APF Department of Information Engineering Engineering University of APF Xi'an 710086 China
In view of the degeneration problem of chaos characteristics of the secret-key sequences, a new key sequence generation system was designed, combining chaos and cryptography. The simulation results shows that, not onl... 详细信息
来源: 评论
A big data based data storage systems for rock burst experiment
收藏 引用
International Journal of Wireless and Mobile Computing 2013年 第5期6卷 463-472页
作者: Zhang, Yu Bai, Yan-Ping Zhu, Dong-Feng Lv, Zhao-Yong Department of Computer Science Beijing University of Civil Engineering and Architecture Beijing China State Key Laboratory for GeoMechanics and Deep Underground Engineering China University of Mining and Technology Beijing China School of Management Capital Normal University Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China Department of Computer Teaching and Network Information Beijing University of Civil Engineering and Architecture Beijing China
State key laboratory for GeoMechanics and Deep Underground Engineering, Deep-Lab for short, has been committed to the study of rock burst. Deep-Lab accumulated a large number of rock-burst data. With the deepening of ... 详细信息
来源: 评论
LSB replacement steganography software detection based on model checking
LSB replacement steganography software detection based on mo...
收藏 引用
11th International Workshop on Digital Forensics and Watermaking, IWDW 2012
作者: Zhao, Zheng Liu, Fenlin Luo, Xiangyang Xie, Xin Yu, Lu Department of Network Engeering Zhengzhou Information Science and Technology Institute Zhengzhou 450002 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Science Beijing 100093 China Department One Academy of National Defense Information 430000 Wuhan China
Steganography software detection is one of effective approaches for steganography forensics using software analysis. In this paper a method of LSB replacement steganography software detection is proposed. Firstly thre... 详细信息
来源: 评论
A game theoretic method to model and evaluate attack-defense strategy in cloud computing
A game theoretic method to model and evaluate attack-defense...
收藏 引用
2013 IEEE 10th International Conference on Services Computing, SCC 2013
作者: Fan, Guisheng Yu, Huiqun Chen, Liqiong Liu, Dongmei Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China State Key Laboratory for Novel Software Technology Nanjing University 210093 China Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai 200235 China
Cloud computing has attracted much interest recently from both industry and academic. However, it is difficult to construct perfectly secure mechanisms, in face of complex and various attack behaviors in cloud computi... 详细信息
来源: 评论