咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是3061-3070 订阅
排序:
Neighborhood Rough Sets based Multi-Label classification
Neighborhood Rough Sets based Multi-Label classification
收藏 引用
Conference of the North American Fuzzy information Processing Society - NAFIPS
作者: Ying Yu Witold Pedrycz Duoqian Miao Hongyun Zhang Tongji University Shanghai Shanghai CN University of Alberta Edmonton AB CA Department of Computer Science and Technology Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China
Nowadays, multi-label classification methods are of growing interest. Due to the relationships among the labels, traditional single-label classification methods are not directly applicable to the multi-label classific... 详细信息
来源: 评论
Verification of workflow nets with transition conditions
收藏 引用
Journal of Zhejiang University-science C(computers and Electronics) 2012年 第7期13卷 483-509页
作者: Zhao-xia WANG Jian-min WANG Xiao-chen ZHU Li-jie WEN School of Software Tsinghua UniversityBeijing 100084China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China MOE Key Laboratory for Information System Security Tsinghua UniversityBeijing 100084China National Laboratory for Information Science and Technology Tsinghua UniversityBeijing 100084China SDepartment of Logistical Information&Engineering Logistical Engineering UniversityChongqing 400016China
Workflow management is concerned with automated support for business *** management systems are driven by process models specifying the tasks that need to be executed,the order in which they can be executed,which reso... 详细信息
来源: 评论
Topic correlation analysis for cross-domain text classification
Topic correlation analysis for cross-domain text classificat...
收藏 引用
26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference, AAAI-12 / IAAI-12
作者: Li, Anghao Jin, Xiaoming Long, Mingsheng Key Laboratory for Information System Security School of Software Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Cross-domain text classification aims to automatically train a precise text classifier for a target domain by using labeled text data from a related source domain. To this end, the distribution gap between different d... 详细信息
来源: 评论
Topic Correlation Analysis for Cross-Domain Text Classification  26
Topic Correlation Analysis for Cross-Domain Text Classificat...
收藏 引用
26th AAAI Conference on Artificial Intelligence, AAAI 2012
作者: Li, Lianghao Jin, Xiaoming Long, Mingsheng Key Laboratory for Information System Security Ministry of Education Tsinghua National Laboratory for Information Science and Technology School of Software Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Cross-domain text classification aims to automatically train a precise text classifier for a target domain by using labeled text data from a related source domain. To this end, the distribution gap between different d... 详细信息
来源: 评论
Video Copy Detection Based on Spatiotemporal Fusion Model
收藏 引用
Tsinghua science and technology 2012年 第1期17卷 51-59页
作者: Jianmin Li Yingyu Liang Bo Zhang State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology(TNList)Department of Computer Science and TechnologyTsinghua UniversityBeijing 100084China
Content-based video copy detection is an active research field due to the need for copyright pro- tection and business intellectual property protection. This paper gives a probabilistic spatiotemporal fusion approach ... 详细信息
来源: 评论
Analysis on the effect of prefix hijacking attack and Internet hierarchy
Analysis on the effect of prefix hijacking attack and Intern...
收藏 引用
2012 IEEE 12th International Conference on computer and information technology, CIT 2012
作者: Zhao, Jinjing Wen, Yan Beijing Institute of System Engineering Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
The AS that hijacks a prefix can black hole and intercept all the hijacked traffic and thus, cause a denial-of-service attack or a man-in-the-middle attack against the prefix owner. There have been many incidents of I... 详细信息
来源: 评论
A software watermark based architecture for cloud security
收藏 引用
14th Asia Pacific Web technology Conference, APWeb 2012
作者: Dai, Pengfei Wang, Chaokun Yu, Zhiwei Yue, Yongsheng Wang, Jianmin School of Software Tsinghua University Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security Ministry of Education China Department of Computer Science and Technology Tsinghua University China
Cloud Computing has emerged as a resource sharing platform, which allows different service providers to deliver software as services. However, for many security sensitive applications such as critical data processing ... 详细信息
来源: 评论
A survey of virtualization technologies focusing on untrusted code execution
A survey of virtualization technologies focusing on untruste...
收藏 引用
6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
作者: Wen, Yan Zhao, Jinjing Zhao, Gang Chen, Hua Wang, Dongxia Beijing Institute of System Engineering Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
In response to a continually advancing threat incurred by untrusted codes from Internet, various virtualization-based technologies have been proposed. Such technologies utilize a software layer, a virtual machine moni... 详细信息
来源: 评论
A cloud-based watermarking method for health data security
A cloud-based watermarking method for health data security
收藏 引用
2012 10th Annual International Conference on High Performance Computing and Simulation, HPCS 2012
作者: Yu, Zhiwei Thomborson, Clark Wang, Chaokun Wang, Jianmin Li, Rui Department of Computer Science and Technology Tsinghua University Beijing China Department of Computer Science University of Auckland New Zealand School of Software Tsinghua University Key Laboratory for Information System Security Beijing China
Private health information once confined to local medical institutions is migrating onto the Internet as an Electronic Health Record (EHR) that is accessed by cloud computing. No matter where it is hosted, health data... 详细信息
来源: 评论
security Analysis of an Electronic Commerce Protocol Using Casper/FDR2
收藏 引用
Wuhan University Journal of Natural sciences 2012年 第6期17卷 499-503页
作者: CHANG Yinlong HU Huaping Department of Mathematics and Computer Science/Key Laboratory of Information Security of Network System Fuzhou UniversityFuzhou 350108FujianChina School of Computer Science National University of Defense TechnologyChangsha 410073HunanChina
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model an... 详细信息
来源: 评论