咨询与建议

限定检索结果

文献类型

  • 1,952 篇 期刊文献
  • 1,814 篇 会议
  • 1 册 图书

馆藏范围

  • 3,767 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,641 篇 工学
    • 1,809 篇 计算机科学与技术...
    • 1,409 篇 软件工程
    • 633 篇 信息与通信工程
    • 410 篇 电气工程
    • 361 篇 控制科学与工程
    • 318 篇 电子科学与技术(可...
    • 226 篇 生物工程
    • 199 篇 机械工程
    • 160 篇 网络空间安全
    • 149 篇 光学工程
    • 136 篇 生物医学工程(可授...
    • 129 篇 仪器科学与技术
    • 110 篇 动力工程及工程热...
    • 108 篇 安全科学与工程
    • 105 篇 交通运输工程
    • 71 篇 建筑学
    • 66 篇 化学工程与技术
    • 65 篇 土木工程
  • 1,282 篇 理学
    • 688 篇 数学
    • 349 篇 物理学
    • 250 篇 生物学
    • 220 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 67 篇 化学
  • 660 篇 管理学
    • 426 篇 管理科学与工程(可...
    • 259 篇 图书情报与档案管...
    • 158 篇 工商管理
  • 145 篇 法学
    • 92 篇 社会学
  • 136 篇 医学
    • 119 篇 临床医学
    • 100 篇 基础医学(可授医学...
  • 58 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 92 篇 feature extracti...
  • 72 篇 federated learni...
  • 68 篇 semantics
  • 68 篇 security
  • 63 篇 deep learning
  • 63 篇 optimization
  • 63 篇 computational mo...
  • 62 篇 training
  • 61 篇 accuracy
  • 61 篇 cryptography
  • 56 篇 blockchain
  • 54 篇 computer science
  • 53 篇 laboratories
  • 51 篇 privacy
  • 48 篇 authentication
  • 39 篇 servers
  • 39 篇 data models
  • 39 篇 robustness
  • 38 篇 data mining
  • 37 篇 protocols

机构

  • 149 篇 department of co...
  • 77 篇 key laboratory o...
  • 75 篇 national key lab...
  • 66 篇 school of softwa...
  • 62 篇 shandong provinc...
  • 57 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 48 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 37 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 31 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 hai jin
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 14 篇 xin wang
  • 13 篇 wu yuan
  • 13 篇 ming gu

语言

  • 3,124 篇 英文
  • 550 篇 其他
  • 104 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3767 条 记 录,以下是3071-3080 订阅
排序:
Abstracts from the 3rd International Genomic Medicine Conference (3rd IGMC 2015) : Jeddah, Kingdom of Saudi Arabia. 30 November - 3 December 2015
收藏 引用
BMC genomics 2016年 第6期17 Suppl 6卷 487页
作者: Jerry W. Shay Noriko Homma Ruyun Zhou Muhammad Imran Naseer Adeel G. Chaudhary Mohammed Al-Qahtani Nobutaka Hirokawa Maryam Goudarzi Albert J. Fornace Saleh Baeesa Deema Hussain Mohammed Bangash Fahad Alghamdi Hans-Juergen Schulten Angel Carracedo Ishaq Khan Hanadi Qashqari Nawal Madkhali Mohamad Saka Kulvinder S. Saini Awatif Jamal Jaudah Al-Maghrabi Adel Abuzenadah Adeel Chaudhary Mohammed Al Qahtani Ghazi Damanhouri Heba Alkhatabi Anne Goodeve Laura Crookes Nikolas Niksic Nicholas Beauchamp Adel M. Abuzenadah Jim Vaught Bruce Budowle Mourad Assidi Abdelbaset Buhmeida Leena Merdad Sudhir Kumar Sayaka Miura Karen Gomez Mahmood Rasool Ahmed Rebai Sajjad Karim Hend F. Nour Eldin Heba Abusamra Elham M. Alhathli Nada Salem Mohammed H. Al-Qahtani Hossam Faheem Ashok Agarwa Eberhard Nieschlag Joachim Wistuba Oliver S. Damm Mohd A. Beg Taha A. Abdel-Meguid Hisham A. Mosli Osama S. Bajouh Serdar Coskun Muhammad Abu-Elmagd Ashraf Dallol Sahar Hakamy Wejdan Al-Qahtani Asia Al-Harbi Shireen Hussain Burak Ozkosem Rick DuBois Safia S. Messaoudi Maryam T. Dandana Touhami Mahjoub Wassim Y. Almawi S. Abdalla M. Nabil Al-Aama Asmaa Elzawahry Tsuyoshi Takahashi Sachiyo Mimaki Eisaku Furukawa Rie Nakatsuka Isao Kurosaka Takahiko Nishigaki Hiromi Nakamura Satoshi Serada Tetsuji Naka Seiichi Hirota Tatsuhiro Shibata Katsuya Tsuchihara Toshirou Nishida Mamoru Kato Sajid Mehmood Naeem Mahmood Ashraf Awais Asif Muhammad Bilal Malik Siddique Mehmood Aadil Hussain Qazi Mohammad Sajid Jamal Mughees Uddin Siddiqui Mohammad A. Alzohairy Mohammad A. Al Karaawi Taoufik Nedjadi Heba Al-Khattabi Adel Al-Ammari Ahmed Al-Sayyad Hédia Zitouni Nozha Raguema Marwa Ben Ali Wided Malah Raja Lfalah Wassim Almawi Mohammed Elanbari Andrey Ptitsyn Sana Mahjoub Rabeb El Ghali Bechir Achour Nidhal Ben Amor Brahim N’siri Hamid Morjani Esam Azhar Vera Chayeb Maryam Dendena Hedia Zitouni Khedija Zouari-Limayem Bassem Refaat Ahmed M. Ashshi Sarah A. Batwa Hazem Ramadan Amal Awad Ahmed Ateya Adel Galal Ahmed El-Shemi Ahmad Ashshi Mohammed Basalamah Youjin Na Cha University of Texas Southwestern Medical Center Dallas USA Department of Cell Biology and Anatomy Graduate School of Medicine the University of Tokyo Tokyo Japan Center of Excellence in Genomic Medicine Research King Abdulaziz University Jeddah Saudi Arabia Department of Biochemistry and Molecular & Cellular Biology Lombardi Comprehensive Cancer Center Georgetown University Washington USA Department of Oncology Lombardi Comprehensive Cancer Center Georgetown University Washington USA Department of Radiation Medicine Lombardi Comprehensive Cancer Center Georgetown University Washington USA Center of Excellence in Genomic Medicine Research (CEGMR) King Abdulaziz University Jeddah Kingdom of Saudi Arabia King Fahd Medical Research Centre King Abdulaziz University Jeddah Saudi Arabia Centre of Excellence in Genomic Medicine Research King Abdulaziz University Jeddah Saudi Arabia Sheffield Diagnostic Genetic Service Sheffield Children’s NHS Foundation Trust Western Bank Sheffield UK Center of Innovations in Personalized Medicine King Abdulaziz University Jeddah Saudi Arabia President ISBER Editor-in-Chief Biopreservation & Biobanking ᅟ USA Institute of Applied Genetics Department of Molecular and Medical Genetics University of North Texas Health Science Center Fort Worth USA Department of Dental Public Health Faculty of Dentistry King Abdulaziz University Jeddah Saudi Arabia Institute for Genomics and Evolutionary Medicine Temple University Philadelphia USA Center of Excellence in Genomic Medicine King Abdulaziz University Jeddah Kingdom of Saudi Arabia Laboratory of Molecular and Cellular Screening Processes (Bioinformatics Group) Centre of Biotechnology of Sfax Sfax Tunisia Fujitsu Technology Solutions International ᅟ ᅟ Case Western Reserve University School of Medicine and Lerner College of Medicine Cleveland Clinic Foundation Cleveland USA American Center for Reproductive Medicine Andrology Center Cleveland USA Center for Reproductive Medicine and
O1 Regulation of genes by telomere length over long distances Jerry W. Shay O2 The microtubule destabilizer KIF2A regulates the postnatal establishment of neuronal circuits in addition to prenatal cell survival, cell ...
来源: 评论
Threshold secret image sharing
Threshold secret image sharing
收藏 引用
15th International Conference on information and Communications security, ICICS 2013
作者: Guo, Teng Liu, Feng Wu, ChuanKun Yang, ChingNung Wang, Wen Ren, YaWei State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China University of Chinese Academy of Sciences Beijing 100190 China Department of Computer Science and Information Engineering National Dong Hwa University Hualien 974 Taiwan School of Information Management Beijing Information Science and Technology University Beijing 100192 China
A (k, n) threshold secret image sharing scheme, abbreviated as (k, n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In 20... 详细信息
来源: 评论
Boomerang and slide-rotational analysis of the SM3 hash function
Boomerang and slide-rotational analysis of the SM3 hash func...
收藏 引用
19th International Conference on Selected Areas in Cryptography, SAC 2012
作者: Kircanski, Aleksandar Shen, Yanzhao Wang, Gaoli Youssef, Amr M. Concordia Institute for Information Systems Engineering Concordia University Montreal QC Canada School of Computer Science and Technology Donghua University Shanghai China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China
SM3 is a hash function, designed by Xiaoyun Wang et al. and published by the Chinese Commercial Cryptography Administration Office for the use of electronic authentication service system. The design of SM3 builds upon... 详细信息
来源: 评论
Automated classification of protein subcellular location patterns on images of human reproductive tissues
Automated classification of protein subcellular location pat...
收藏 引用
3rd Sino-Foreign-Interchange Workshop on Intelligent science and Intelligent Data Engineering, IScIDE 2012
作者: Yang, Fan Xu, Ying-Ying Shen, Hong-Bin Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Shanghai China Key Laboratory of Optic-Electronic and Communication Jiangxi Science and Technology Normal University Nanchang China
As one of the most significant characteristics of human cell, subcellular localization plays a critical role for understanding specific functions of mammalian proteins. In this study, we developed a novel computationa... 详细信息
来源: 评论
A color digital watermarking in nonsampled contourlet domain using generic algorithm
A color digital watermarking in nonsampled contourlet domain...
收藏 引用
5th IEEE International Conference on Intelligent Networking and Collaborative systems, INCoS 2013
作者: Luo, Peng Wei, Ping Liu, Yi-Qun Key Laboratory of Network and Information Security of APF Department of Electronic Technology Engineering University of APF Xi'an 710086 China Laboratory-Center of Computer Department of Information Engineering Engineering University of APF China Xi'an 710086 China Department of Electronic Technology Engineering University of Armed Police Force Xi'an 710086 China
A novel watermarking approach for copyright protection of color images based on the nonsubsampled contour let transform (NSCT). We employ the genetic algorithm optimization principles and HVS masking technique to obta... 详细信息
来源: 评论
Camera calibration and improved computation of fundamental matrix in epipolar geometry
Camera calibration and improved computation of fundamental m...
收藏 引用
2013 International Conference on Precision Mechanical Instruments and Measurement technology, ICPMIMT 2013
作者: Duan, Jia Tang, Yuan Yan Zhang, Zhen Chao Guo, Chu Yu Fang, Chi Department of Computer and Information Science University of Macau Macau China Department of Electronic Engineering Tsinghua University State Key Laboratory of Intelligent Technology and Systems Beijing 10084 China
In this paper, firstly we try to look for ways to avoid the camera parameters in order to reconstruct 3D model. We attempt to use the parallel stereo visual system and carry out the mathematical derivation of argument... 详细信息
来源: 评论
Multi-class character classification with semi-supervised learning based on information entropy
Multi-class character classification with semi-supervised le...
收藏 引用
2013 International Conference on Precision Mechanical Instruments and Measurement technology, ICPMIMT 2013
作者: Wang, Xue Wei Tang, Yuan Yan Duan, Jia Peng, Liang Rui Zhang, Zhen Chao Department of Computer and Information Science University of Macau Macau China Department of Electronic Engineering Tsinghua University State Key Laboratory of Intelligent Technology and Systems Beijing 10084 China
Character Classification technology is the key link in OCR system. Most classification methods require abundant marked samples training to get classifier. In the real OCR application, there are so many classes, to lab... 详细信息
来源: 评论
The boomerang attacks on the round-reduced skein-512
The boomerang attacks on the round-reduced skein-512
收藏 引用
19th International Conference on Selected Areas in Cryptography, SAC 2012
作者: Yu, Hongbo Chen, Jiazhe Wang, Xiaoyun Department of Computer Science and Technology Tsinghua University Beijing 100084 China Institute for Advanced Study Tsinghua University Beijing 100084 China Key Laboratory of Cryptologic Technology and Information Security Shandong University Ministry of Education China KU Leuven ESAT COSIC and IBBT Belgium
The hash function Skein is one of the five finalists of the NIST SHA-3 competition. It is based on the block cipher Threefish which only uses three primitive operations: modular addition, rotation and bitwise XOR (ARX... 详细信息
来源: 评论
Parallel construction of independent spanning trees and an application in diagnosis on Möbius cubes
Parallel construction of independent spanning trees and an a...
收藏 引用
作者: Cheng, Baolei Fan, Jianxi Jia, Xiaohua Jia, Juncheng School of Computer Science and Technology Soochow University Suzhou 215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China Department of Computer Science City University of Hong Kong Tat Chee Avenue Kowloon Hong Kong
Independent spanning trees (ISTs) on networks have applications to increase fault-tolerance, bandwidth, and security. Möbius cubes are a class of the important variants of hypercubes. A recursive algorithm to con... 详细信息
来源: 评论
Design and implementation of regional LS factor computing tool based on GIS and array operation
Design and implementation of regional LS factor computing to...
收藏 引用
2013 International Conference on Mechatronics, Applied Mechanics and Energy Engineering, MAMEE 2013
作者: Zhang, Hong Ming Yang, Qin Ke Li, Shu Qin Wang, Mei Li Ying, Ming Lang, Huan Dong, Xue Wen College of Information Engineering Northwest A and F University ShaanXi 712100 China Department of Urbanology and Resource Science Northwest University Shaanxi 710069 China Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China
For over 40 years, the universal soil loss equation (USLE) and its' revised version the revised universal soil loss equation (RUSLE) have been used all over the world for soil mean annual loss per area unit. Becau... 详细信息
来源: 评论