咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是3011-3020 订阅
排序:
Mountain landslide monitoring based on wireless sensor network
收藏 引用
information technology Journal 2013年 第15期12卷 3357-3362页
作者: Li, Xiaoling Yuan, Jimin School of Computer Science and Technology Chengdu University 610106 Chengdu China University Key Laboratory of Pattern Recognition Intelligent Information Processing 610106 Chengdu China Department Computer Engineering Chengdu Aeronautic Vocational and Technical College Chengdu 610000 China
The study provides a design scheme for the mountain landslide monitoring system based on wireless sensor networks. Different sensors are mainly used to collect data about the water depth in the soil and the sloping an... 详细信息
来源: 评论
Index modulated OFDM with ICI self-cancellation in underwater acoustic communications
Index modulated OFDM with ICI self-cancellation in underwate...
收藏 引用
Asilomar Conference on Signals, systems & computers
作者: Miaowen Wen Yuke Li Xiang Cheng Liuqing Yang School of Electronic and Information Engineering South China University of Technology Guangzhou China State Key Laboratory of Management and Control for Complex Systems Institute of Automation Chinese Academy of Sciences Beijing China School of Electronics Engineering and Computer Science Peking University Beijing China Department of Electrical and Computer Engineering Colorado State University Fort Collins CO USA
OFDM is promising for underwater acoustic (UWA) communications due to its potential to combat the large delay spread. However, the performance of the OFDM system is seriously deteriorated by the inter-carrier interfer... 详细信息
来源: 评论
Research on the degeneration problem of key sequence based on chaos
Research on the degeneration problem of key sequence based o...
收藏 引用
5th IEEE International Conference on Intelligent Networking and Collaborative systems, INCoS 2013
作者: Wang, Jing-Jing Wei, Ping Chen, Jia-Yong Key Laboratory of Network and Information Security of APF Department of Electronic Technology Engineering University of APF Xi'an 710086 China Laboratory-Center of Computer Department of Information Engineering Engineering University of APF Xi'an 710086 China Laboratory of Information and Network of APF Department of Information Engineering Engineering University of APF Xi'an 710086 China
In view of the degeneration problem of chaos characteristics of the secret-key sequences, a new key sequence generation system was designed, combining chaos and cryptography. The simulation results shows that, not onl... 详细信息
来源: 评论
A big data based data storage systems for rock burst experiment
收藏 引用
International Journal of Wireless and Mobile Computing 2013年 第5期6卷 463-472页
作者: Zhang, Yu Bai, Yan-Ping Zhu, Dong-Feng Lv, Zhao-Yong Department of Computer Science Beijing University of Civil Engineering and Architecture Beijing China State Key Laboratory for GeoMechanics and Deep Underground Engineering China University of Mining and Technology Beijing China School of Management Capital Normal University Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China Department of Computer Teaching and Network Information Beijing University of Civil Engineering and Architecture Beijing China
State key laboratory for GeoMechanics and Deep Underground Engineering, Deep-Lab for short, has been committed to the study of rock burst. Deep-Lab accumulated a large number of rock-burst data. With the deepening of ... 详细信息
来源: 评论
LSB replacement steganography software detection based on model checking
LSB replacement steganography software detection based on mo...
收藏 引用
11th International Workshop on Digital Forensics and Watermaking, IWDW 2012
作者: Zhao, Zheng Liu, Fenlin Luo, Xiangyang Xie, Xin Yu, Lu Department of Network Engeering Zhengzhou Information Science and Technology Institute Zhengzhou 450002 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Science Beijing 100093 China Department One Academy of National Defense Information 430000 Wuhan China
Steganography software detection is one of effective approaches for steganography forensics using software analysis. In this paper a method of LSB replacement steganography software detection is proposed. Firstly thre... 详细信息
来源: 评论
A game theoretic method to model and evaluate attack-defense strategy in cloud computing
A game theoretic method to model and evaluate attack-defense...
收藏 引用
2013 IEEE 10th International Conference on Services Computing, SCC 2013
作者: Fan, Guisheng Yu, Huiqun Chen, Liqiong Liu, Dongmei Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China State Key Laboratory for Novel Software Technology Nanjing University 210093 China Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai 200235 China
Cloud computing has attracted much interest recently from both industry and academic. However, it is difficult to construct perfectly secure mechanisms, in face of complex and various attack behaviors in cloud computi... 详细信息
来源: 评论
Modeling and analyzing attack-defense strategy of resource service in cloud computing  25
Modeling and analyzing attack-defense strategy of resource s...
收藏 引用
25th International Conference on Software Engineering and Knowledge Engineering, SEKE 2013
作者: Yu, Huiqun Fan, Guisheng Chen, Liqiong Liu, Dongmei Department of Computer Science and Engineering East China University of Science and Technology Shanghai200237 China State Key Laboratory for Novel Software Technology Nanjing University 210093 China Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai200235 China
In this paper, we propose a stochastic game theoretic method to model and analyze the attack-defense process in cloud computing. A stochastic game model (SGM) is proposed based on combining Stochastic Petri nets with ... 详细信息
来源: 评论
Output feedback tracking control for spacecraft relative translation subject to input constraints and partial loss of control effectiveness
Output feedback tracking control for spacecraft relative tra...
收藏 引用
American Control Conference
作者: Lin Zhao Yingmin Jia Junping Du Jun Zhang Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electronic and Information Engineering Beihang University (BUAA) Beijing 100191 China
In this paper, an adaptive output feedback tracking control scheme is proposed for spacecraft formation flying (SFF) in the presence of external disturbances, uncertain system parameters, input constraints and partial... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论
Abstracts from the 3rd International Genomic Medicine Conference (3rd IGMC 2015) : Jeddah, Kingdom of Saudi Arabia. 30 November - 3 December 2015
收藏 引用
BMC genomics 2016年 第6期17 Suppl 6卷 487页
作者: Jerry W. Shay Noriko Homma Ruyun Zhou Muhammad Imran Naseer Adeel G. Chaudhary Mohammed Al-Qahtani Nobutaka Hirokawa Maryam Goudarzi Albert J. Fornace Saleh Baeesa Deema Hussain Mohammed Bangash Fahad Alghamdi Hans-Juergen Schulten Angel Carracedo Ishaq Khan Hanadi Qashqari Nawal Madkhali Mohamad Saka Kulvinder S. Saini Awatif Jamal Jaudah Al-Maghrabi Adel Abuzenadah Adeel Chaudhary Mohammed Al Qahtani Ghazi Damanhouri Heba Alkhatabi Anne Goodeve Laura Crookes Nikolas Niksic Nicholas Beauchamp Adel M. Abuzenadah Jim Vaught Bruce Budowle Mourad Assidi Abdelbaset Buhmeida Leena Merdad Sudhir Kumar Sayaka Miura Karen Gomez Mahmood Rasool Ahmed Rebai Sajjad Karim Hend F. Nour Eldin Heba Abusamra Elham M. Alhathli Nada Salem Mohammed H. Al-Qahtani Hossam Faheem Ashok Agarwa Eberhard Nieschlag Joachim Wistuba Oliver S. Damm Mohd A. Beg Taha A. Abdel-Meguid Hisham A. Mosli Osama S. Bajouh Serdar Coskun Muhammad Abu-Elmagd Ashraf Dallol Sahar Hakamy Wejdan Al-Qahtani Asia Al-Harbi Shireen Hussain Burak Ozkosem Rick DuBois Safia S. Messaoudi Maryam T. Dandana Touhami Mahjoub Wassim Y. Almawi S. Abdalla M. Nabil Al-Aama Asmaa Elzawahry Tsuyoshi Takahashi Sachiyo Mimaki Eisaku Furukawa Rie Nakatsuka Isao Kurosaka Takahiko Nishigaki Hiromi Nakamura Satoshi Serada Tetsuji Naka Seiichi Hirota Tatsuhiro Shibata Katsuya Tsuchihara Toshirou Nishida Mamoru Kato Sajid Mehmood Naeem Mahmood Ashraf Awais Asif Muhammad Bilal Malik Siddique Mehmood Aadil Hussain Qazi Mohammad Sajid Jamal Mughees Uddin Siddiqui Mohammad A. Alzohairy Mohammad A. Al Karaawi Taoufik Nedjadi Heba Al-Khattabi Adel Al-Ammari Ahmed Al-Sayyad Hédia Zitouni Nozha Raguema Marwa Ben Ali Wided Malah Raja Lfalah Wassim Almawi Mohammed Elanbari Andrey Ptitsyn Sana Mahjoub Rabeb El Ghali Bechir Achour Nidhal Ben Amor Brahim N’siri Hamid Morjani Esam Azhar Vera Chayeb Maryam Dendena Hedia Zitouni Khedija Zouari-Limayem Bassem Refaat Ahmed M. Ashshi Sarah A. Batwa Hazem Ramadan Amal Awad Ahmed Ateya Adel Galal Ahmed El-Shemi Ahmad Ashshi Mohammed Basalamah Youjin Na Cha University of Texas Southwestern Medical Center Dallas USA Department of Cell Biology and Anatomy Graduate School of Medicine the University of Tokyo Tokyo Japan Center of Excellence in Genomic Medicine Research King Abdulaziz University Jeddah Saudi Arabia Department of Biochemistry and Molecular & Cellular Biology Lombardi Comprehensive Cancer Center Georgetown University Washington USA Department of Oncology Lombardi Comprehensive Cancer Center Georgetown University Washington USA Department of Radiation Medicine Lombardi Comprehensive Cancer Center Georgetown University Washington USA Center of Excellence in Genomic Medicine Research (CEGMR) King Abdulaziz University Jeddah Kingdom of Saudi Arabia King Fahd Medical Research Centre King Abdulaziz University Jeddah Saudi Arabia Centre of Excellence in Genomic Medicine Research King Abdulaziz University Jeddah Saudi Arabia Sheffield Diagnostic Genetic Service Sheffield Children’s NHS Foundation Trust Western Bank Sheffield UK Center of Innovations in Personalized Medicine King Abdulaziz University Jeddah Saudi Arabia President ISBER Editor-in-Chief Biopreservation & Biobanking ᅟ USA Institute of Applied Genetics Department of Molecular and Medical Genetics University of North Texas Health Science Center Fort Worth USA Department of Dental Public Health Faculty of Dentistry King Abdulaziz University Jeddah Saudi Arabia Institute for Genomics and Evolutionary Medicine Temple University Philadelphia USA Center of Excellence in Genomic Medicine King Abdulaziz University Jeddah Kingdom of Saudi Arabia Laboratory of Molecular and Cellular Screening Processes (Bioinformatics Group) Centre of Biotechnology of Sfax Sfax Tunisia Fujitsu Technology Solutions International ᅟ ᅟ Case Western Reserve University School of Medicine and Lerner College of Medicine Cleveland Clinic Foundation Cleveland USA American Center for Reproductive Medicine Andrology Center Cleveland USA Center for Reproductive Medicine and
O1 Regulation of genes by telomere length over long distances Jerry W. Shay O2 The microtubule destabilizer KIF2A regulates the postnatal establishment of neuronal circuits in addition to prenatal cell survival, cell ...
来源: 评论