咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是3051-3060 订阅
排序:
Decentralized Cooperation Strategies in Two-Dimensional Traffic of Cellular Automata
收藏 引用
Communications in Theoretical Physics 2012年 第12期58卷 883-890页
作者: 方峻 覃征 陈喜群 冷彪 徐朝晖 江子能 Department of Computer Science and Technology Tsinghua University Key Laboratory for Information System Security Ministry of Education Department of Civil Engineering Tsinghua University School of Computer Science & Engineering Beihang University School of Software Tsinghua University
We study the two-dimensional traffic of cellular automata using computer simulation. We propose two type of decentralized cooperation strategies, which are called stepping aside (CS-SA) and choosing alternative routes... 详细信息
来源: 评论
Outsourcing large matrix inversion computation to a public Cloud
收藏 引用
IEEE Transactions on Cloud Computing 2013年 第1期1卷 78-87页
作者: Lei, Xinyu Liao, Xiaofeng Huang, Tingwen Li, Huaqing Hu, Chunqiang State Key Laboratory of Power Transmission Equipment and System Security and New Technology College of Computer Science Chongqing University Chongqing400044 China Texas A and M University at Qatar PO Box 23874 Doha Qatar Department of Computer Science George Washington University WashingtonDC20052 United States
Cloud computing enables resource-constrained clients to economically outsource their huge computation workloads to a cloud server with massive computational power. This promising computing paradigm inevitably brings i... 详细信息
来源: 评论
A Game Theoretic Method to Model and Evaluate Attack-Defense Strategy in Cloud Computing
A Game Theoretic Method to Model and Evaluate Attack-Defense...
收藏 引用
IEEE International Conference on Services Computing (SCC)
作者: Guisheng Fan Huiqun Yu Liqiong Chen Dongmei Liu State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Engineering East China University of Science and Technology Shanghai China Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai China
Cloud computing has attracted much interest recently from both industry and academic. However, it is difficult to construct perfectly secure mechanisms, in face of complex and various attack behaviors in cloud computi... 详细信息
来源: 评论
An in-depth measurement and analysis of popular private tracker systems in China
An in-depth measurement and analysis of popular private trac...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Qiang Li Tao Qin Xiaohong Guan Qinghua Zheng Qiuzhen Huang Department of Automation Tsinghua National Laboratory for Information Science and Technology Beijing China Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China
In recent years, a novel BitTorrent (BT) technology, Private Tracker (PT), has received extensive attentions in academia. Due to its huge amount of traffic volumes and population, it is essential to understand the cha... 详细信息
来源: 评论
Mining User Interests in Web Logs of an Online News Service Based on Memory Model
Mining User Interests in Web Logs of an Online News Service ...
收藏 引用
International Conference on Networking, Architecture, and Storage (NAS)
作者: Wei Wang Dongyan Zhao Haining Luo Xin Wang Key Laboratory on Information Security Engineering University of CAPF Xi'an China Institute of Computer Science & Technology Peking University Beijing China Computer Management Center of the Armed Police General Hospital Beijing China
User profiling plays an important role in online news recommendation systems. In this paper, we analyze the relationship between users' clicking behaviors and the category of the news story to model user's int... 详细信息
来源: 评论
Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack
收藏 引用
Physical Review A 2013年 第6期87卷 062329-062329页
作者: Jing-Zheng Huang Christian Weedbrook Zhen-Qiang Yin Shuang Wang Hong-Wei Li Wei Chen Guang-Can Guo Zheng-Fu Han Key Laboratory of Quantum Information University of Science and Technology of China Hefei 230026 China Center for Quantum Information and Quantum Control Department of Electrical and Computer Engineering and Department of Physics University of Toronto Toronto Ontario M5S 3G4 Canada
The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may... 详细信息
来源: 评论
Network survivability evaluation model based on immune evolution and multiple criteria decision making
Network survivability evaluation model based on immune evolu...
收藏 引用
4th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2012
作者: Wang, Chunlei Fang, Lan Dai, Yiqi Ming, Liang Miao, Qing Wang, Dongxia Department of Computer Science and Technology Tsinghua University Beijing China Nation Key Laboratory of Science and Technology on Information System Security Beijing China
Network survivability has the characteristics of complexity, dynamic evolution and uncertainty, which has become one of the most important indicators of evaluating network performance. Network survivability evaluation... 详细信息
来源: 评论
TAR~*:an improved process similarity measure based on unfolding of Petri nets
收藏 引用
计算机集成制造系统 2012年 第8期18卷 1774-1784页
作者: WANG Wen-xing WANG Jian-min School of Software Tsinghua University Beijing 100084 China Ministry of Education Key Laboratory for Information System Security Tsinghua UniversityBeijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
Determining the similarity degree between process models was very important for their management,reuse,and *** approaches either focused on process model's structural aspect,or had inefficiency or imprecision in b... 详细信息
来源: 评论
Suppress of Substrate-assisted Depletion Effects in Super Junction LDMOS on Thin Film SOI
Suppress of Substrate-assisted Depletion Effects in Super Ju...
收藏 引用
The 2nd International Conference on Materials science and Manufacturing(ICMSM2013)
作者: Chao Xia Xinhong Cheng Zhongjian Wang Dawei He Duo Cao Tingting Jia Yuehui Yu Dashen Shen National State Key Laboratory of Functional Materials for Informatics Shanghai Institute of Micro-system & Information TechnologyChinese Academy of Sciences Electrical Department of Electrical and Computer Engineering University of Alabama in Huntsville
Conventional super-junction lateral double diffused MOSFET (SJ-LDMOS) fabricated on Silicon on Insulator (SOI) substrate suffers from low breakdown voltage under the same on-resistance due to substrate-assisted de... 详细信息
来源: 评论
A Generic Construction of Proxy Signatures from Certificateless Signatures
A Generic Construction of Proxy Signatures from Certificatel...
收藏 引用
International Conference on Advanced information Networking and Applications (AINA)
作者: Lei Zhang Qianhong Wu Bo Qin Josep Domingo-Ferrer Peng Zeng Jianwei Liu Ruiying Du Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Tarragona Spain Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University China Department of Maths School of Science Xi'an University of Technology China School of Electronic and Information Engineering Beijing University of Aeronautics and Astronautics China
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where ... 详细信息
来源: 评论