咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是3021-3030 订阅
排序:
Boomerang and slide-rotational analysis of the SM3 hash function
Boomerang and slide-rotational analysis of the SM3 hash func...
收藏 引用
19th International Conference on Selected Areas in Cryptography, SAC 2012
作者: Kircanski, Aleksandar Shen, Yanzhao Wang, Gaoli Youssef, Amr M. Concordia Institute for Information Systems Engineering Concordia University Montreal QC Canada School of Computer Science and Technology Donghua University Shanghai China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China
SM3 is a hash function, designed by Xiaoyun Wang et al. and published by the Chinese Commercial Cryptography Administration Office for the use of electronic authentication service system. The design of SM3 builds upon... 详细信息
来源: 评论
Threshold secret image sharing
Threshold secret image sharing
收藏 引用
15th International Conference on information and Communications security, ICICS 2013
作者: Guo, Teng Liu, Feng Wu, ChuanKun Yang, ChingNung Wang, Wen Ren, YaWei State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China University of Chinese Academy of Sciences Beijing 100190 China Department of Computer Science and Information Engineering National Dong Hwa University Hualien 974 Taiwan School of Information Management Beijing Information Science and Technology University Beijing 100192 China
A (k, n) threshold secret image sharing scheme, abbreviated as (k, n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In 20... 详细信息
来源: 评论
Automated classification of protein subcellular location patterns on images of human reproductive tissues
Automated classification of protein subcellular location pat...
收藏 引用
3rd Sino-Foreign-Interchange Workshop on Intelligent science and Intelligent Data Engineering, IScIDE 2012
作者: Yang, Fan Xu, Ying-Ying Shen, Hong-Bin Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Shanghai China Key Laboratory of Optic-Electronic and Communication Jiangxi Science and Technology Normal University Nanchang China
As one of the most significant characteristics of human cell, subcellular localization plays a critical role for understanding specific functions of mammalian proteins. In this study, we developed a novel computationa... 详细信息
来源: 评论
A color digital watermarking in nonsampled contourlet domain using generic algorithm
A color digital watermarking in nonsampled contourlet domain...
收藏 引用
5th IEEE International Conference on Intelligent Networking and Collaborative systems, INCoS 2013
作者: Luo, Peng Wei, Ping Liu, Yi-Qun Key Laboratory of Network and Information Security of APF Department of Electronic Technology Engineering University of APF Xi'an 710086 China Laboratory-Center of Computer Department of Information Engineering Engineering University of APF China Xi'an 710086 China Department of Electronic Technology Engineering University of Armed Police Force Xi'an 710086 China
A novel watermarking approach for copyright protection of color images based on the nonsubsampled contour let transform (NSCT). We employ the genetic algorithm optimization principles and HVS masking technique to obta... 详细信息
来源: 评论
Camera calibration and improved computation of fundamental matrix in epipolar geometry
Camera calibration and improved computation of fundamental m...
收藏 引用
2013 International Conference on Precision Mechanical Instruments and Measurement technology, ICPMIMT 2013
作者: Duan, Jia Tang, Yuan Yan Zhang, Zhen Chao Guo, Chu Yu Fang, Chi Department of Computer and Information Science University of Macau Macau China Department of Electronic Engineering Tsinghua University State Key Laboratory of Intelligent Technology and Systems Beijing 10084 China
In this paper, firstly we try to look for ways to avoid the camera parameters in order to reconstruct 3D model. We attempt to use the parallel stereo visual system and carry out the mathematical derivation of argument... 详细信息
来源: 评论
Multi-class character classification with semi-supervised learning based on information entropy
Multi-class character classification with semi-supervised le...
收藏 引用
2013 International Conference on Precision Mechanical Instruments and Measurement technology, ICPMIMT 2013
作者: Wang, Xue Wei Tang, Yuan Yan Duan, Jia Peng, Liang Rui Zhang, Zhen Chao Department of Computer and Information Science University of Macau Macau China Department of Electronic Engineering Tsinghua University State Key Laboratory of Intelligent Technology and Systems Beijing 10084 China
Character Classification technology is the key link in OCR system. Most classification methods require abundant marked samples training to get classifier. In the real OCR application, there are so many classes, to lab... 详细信息
来源: 评论
The boomerang attacks on the round-reduced skein-512
The boomerang attacks on the round-reduced skein-512
收藏 引用
19th International Conference on Selected Areas in Cryptography, SAC 2012
作者: Yu, Hongbo Chen, Jiazhe Wang, Xiaoyun Department of Computer Science and Technology Tsinghua University Beijing 100084 China Institute for Advanced Study Tsinghua University Beijing 100084 China Key Laboratory of Cryptologic Technology and Information Security Shandong University Ministry of Education China KU Leuven ESAT COSIC and IBBT Belgium
The hash function Skein is one of the five finalists of the NIST SHA-3 competition. It is based on the block cipher Threefish which only uses three primitive operations: modular addition, rotation and bitwise XOR (ARX... 详细信息
来源: 评论
Parallel construction of independent spanning trees and an application in diagnosis on Möbius cubes
Parallel construction of independent spanning trees and an a...
收藏 引用
作者: Cheng, Baolei Fan, Jianxi Jia, Xiaohua Jia, Juncheng School of Computer Science and Technology Soochow University Suzhou 215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China Department of Computer Science City University of Hong Kong Tat Chee Avenue Kowloon Hong Kong
Independent spanning trees (ISTs) on networks have applications to increase fault-tolerance, bandwidth, and security. Möbius cubes are a class of the important variants of hypercubes. A recursive algorithm to con... 详细信息
来源: 评论
Design and implementation of regional LS factor computing tool based on GIS and array operation
Design and implementation of regional LS factor computing to...
收藏 引用
2013 International Conference on Mechatronics, Applied Mechanics and Energy Engineering, MAMEE 2013
作者: Zhang, Hong Ming Yang, Qin Ke Li, Shu Qin Wang, Mei Li Ying, Ming Lang, Huan Dong, Xue Wen College of Information Engineering Northwest A and F University ShaanXi 712100 China Department of Urbanology and Resource Science Northwest University Shaanxi 710069 China Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China
For over 40 years, the universal soil loss equation (USLE) and its' revised version the revised universal soil loss equation (RUSLE) have been used all over the world for soil mean annual loss per area unit. Becau... 详细信息
来源: 评论
TriggerCas: Enabling wireless consrucive collisions
TriggerCas: Enabling wireless consrucive collisions
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Yin Wang Yuan He Dapeng Cheng Yunhao Liu Xiang-yang Li MOE Key Laboratory for Information System Security School of Software TNLIST Tsinghua University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China Key Laboratory of Intelligent Information Processing Universities of Shandong China Department of Computer Science Illinois Institute of Technology USA
Constructive Interference (CI) proposed in the existing work (e.g., A-MAC [1], Glossy [2]) may degrade the packet reception performance in terms of Packet Reception Ratio (PRR) and Received Signal Strength Indication ... 详细信息
来源: 评论