咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是3031-3040 订阅
排序:
Improved boomerang attacks on SM3
Improved boomerang attacks on SM3
收藏 引用
18th Australasian Conference on information security and Privacy, ACISP 2013
作者: Bai, Dongxia Yu, Hongbo Wang, Gaoli Wang, Xiaoyun Department of Computer Science and Technology Tsinghua University Beijing 100084 China School of Computer Science and Technology Donghua University Shanghai 201620 China Institute for Advanced Study Tsinghua University Beijing 100084 China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan 250100 China School of Mathematics Shandong University Jinan 250100 China
The cryptographic hash function SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. It is based on ... 详细信息
来源: 评论
Evolutionary innovations of formalization and digitalization
Evolutionary innovations of formalization and digitalization
收藏 引用
International Symposium on Extenics and Innovation Methods
作者: Chen, W.W. Huang, J.C. Zhao, X. Third Department of Navy Command College of Arms Guangzhou China Information System Engineering Key Laboratory National University of Defense Technology Changsha China School of Science National University of Defense Technology Changsha China
This paper analyzes how to make use of formalization methods and get rapid development in the process of evolution of mathematics and natural science, and how to use digital methods to make rapid development in the ev... 详细信息
来源: 评论
Fuzzy clustering with multi-resolution bilateral filtering for medical image segmentation
收藏 引用
International Journal of Fuzzy system Applications 2013年 第4期3卷 47-59页
作者: Xiao, Kai Li, Jianli Xiao, Shuangjiu Guan, Haibing Fang, Fang Hassanien, Aboul Ella School of Software Shanghai Jiaotong University Shanghai China Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science Shanghai Jiaotong University Shanghai China Shanghai First People's Hospital Shanghai China Department of Information Technology Cairo University Giza Cairo Egypt
Although fuzzy c-means (FCM) algorithm and some of its variants have been extensively widely used in unsupervised medical image segmentation applications in recent years, they more or less suffer from either noise sen... 详细信息
来源: 评论
Improved impossible differential attacks on large-block Rijndael
Improved impossible differential attacks on large-block Rijn...
收藏 引用
15th International Conference on information security and Cryptology, ICISC 2012
作者: Wang, Qingju Gu, Dawu Rijmen, Vincent Liu, Ya Chen, Jiazhe Bogdanov, Andrey Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China KU Leuven ESAT/COSIC iMinds Belgium Key Laboratory of Cryptologic Technology and Information Security School of Mathematics Shandong University Jinan 250100 China Technical University of Denmark Department of Mathematics Denmark
In this paper, we present more powerful 6-round impossible differentials for large-block Rijndael-224 and Rijndael-256 than the ones used by Zhang et al. in ISC 2008. Using those, we can improve the previous impossibl... 详细信息
来源: 评论
Distinguishing computer graphics from photographic images using local binary patterns
Distinguishing computer graphics from photographic images us...
收藏 引用
11th International Workshop on Digital Forensics and Watermaking, IWDW 2012
作者: Li, Zhaohong Ye, Jingyu Shi, Yun Qing Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07102 United States School of Electronic and Information Engineering Beijing Jiaotong University Beijing 100044 China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai 200240 China
With the ongoing development of rendering technology, computer graphics (CG) are sometimes so photorealistic that to distinguish them from photographic images (PG) by human eyes has become difficult. To this end, many... 详细信息
来源: 评论
ENERGY EFFICIENT DISTRIBUTED STEGANOGRAPHY FOR SECURE COMMUNICATION IN WIRELESS MULTIMEDIA SENSOR NETWORKS
收藏 引用
Journal of Electronics(China) 2013年 第1期30卷 9-16页
作者: Lin Qiaomin Wang Ruchuan Ye Ning Wang Zhongqin College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Ministry of Education Department of Information Science Nanjing College for Population Management
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give... 详细信息
来源: 评论
Direct construction of signcryption tag-KEM from standard assumptions in the standard model
Direct construction of signcryption tag-KEM from standard as...
收藏 引用
15th International Conference on information and Communications security, ICICS 2013
作者: Li, Xiangxue Qian, Haifeng Yu, Yu Weng, Jian Zhou, Yuan Department of Computer Science and Technology East China Normal University China National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications China Institute for Interdisciplinary Information Sciences Tsinghua University China Department of Computer Science Jinan University China Network Emergency Response Technical Team/Coordination Center China
The paper presents a direct construction of signcryption tag- KEM under the standard DBDH and CDH assumptions in the standard model, without using strongly unforgeable signature schemes as building blocks. We prove it... 详细信息
来源: 评论
Fine-grained access control system based on outsourced attribute-based encryption  1
收藏 引用
18th European Symposium on Research in computer security, ESORICS 2013
作者: Li, Jin Chen, Xiaofeng Li, Jingwei Jia, Chunfu Ma, Jianfeng Lou, Wenjing School of Computer Science and Educational Software Guangzhou University China State Key Laboratory of Integrated Service Networks Xidian University China College of Information Technical Science Nankai University China School of Computer Science and Technology Xidian University China Department of Computer Science Virginia Polytechnic Institute and State University United States
As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for outsourced data security and privacy. Attribute-based encryptio... 详细信息
来源: 评论
Decoding with large-scale neural language models improves translation
Decoding with large-scale neural language models improves tr...
收藏 引用
2013 Conference on Empirical Methods in Natural Language Processing, EMNLP 2013
作者: Vaswani, Ashish Zhao, Yinggong Fossum, Victoria Chiang, David University of Southern California Department of Computer Science United States Nanjing University State Key Laboratory for Novel Software Technology China University of Southern California Information Sciences Institute United States
We explore the application of neural language models to machine translation. We develop a new model that combines the neural probabilistic language model of Bengio et al., rectified linear units, and noise-contrastive... 详细信息
来源: 评论
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks
收藏 引用
Wireless Personal Communications 2013年 第3期75卷 1611-1633页
作者: Hui Lin Jia Hu Jianfeng Ma Li Xu Atulya Nagar Shaanxi Key Laboratory of Network and System Security Xidian University Xi’an China Key Lab of Network Security and Cryptology Fujian Normal University Fuzhou China Department of Mathematics and Computer Science Liverpool Hope University Liverpool UK
Wireless Mesh Networks (WMNs) have drawn much attention for emerging as a promising technology to meet the challenges in next generation networks. security and privacy protection have been the primary concerns in push...
来源: 评论