咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是3081-3090 订阅
排序:
Poster abstracts
收藏 引用
Sleep and Biological Rhythms 2016年 第1期5卷 A1-A189页
作者: J. Ferrie M. Shipley F. Cappuccio E. Brunner M. Miller M. Kumari M. Marmot A. Coenen J. L. Castillo F. Araya G. Bustamante L. Montecino C. Torres S. Oporto J. Gronli E. Fiske R. Murison B. Bjorvatn E. Sorensen R. Ursin C. M. Portas S. Rajaraman A. Gribok N. Wesensten T. Balkin J. Reifman N. Dursunoglu S. Ozkurt S. Baser O. Delen S. Sarikaya P. Sadler P. Mitchell D. Françon M. Decobert B. Herve A. Richard G. Griebel P. Avenet B. Scatton G. L. Fur D. Eckert A. Jordan A. Wellman S. Smith A. Malhotra D. White D. Bruck I. Thomas A. Kritikos W. Oertel K. Stiasny-Kolster D. Garcia-Borreguero W. Poewe B. Hoegl R. Kohnen E. Schollmayer J. Keffel C. Trenkwalder A. Valle S. Roizenblatt F. Fregni P. Boggio S. Tufik K. Ward L. Robertson L. Palmer P. Eastwood D. Hillman J. Lee S. Mukherjee V. de Padova G. Barbato G. Ficca I. Zilli P. Salzarulo M. Veldi T. Hion V. Vasar M. Kull L. Nowak J. Davis Y. Latzer O. Tzischinsky S. Crowley M. Carskadon M. Anca-Herschkovitsch D. Frey J. Ortega C. Wiseman C. Farley K. Wright A. Campbell A. Neill K. Spiegel R. Leproult E. Tasali N. Scherberg E. van Cauter A. T. Noradina N. A. Karim I. Norlinah A. A. Raymond R. Sahathevan B. Hamidon E. Werth R. Poryazova R. Khatami C. Bassetti R. G. Beran L. Ainley G. Holand J. Duncan H. Kinney B. Davis B. Hood S. Frey C. Schmidt M. Hofstetter P. Peigneux C. Cajochen W.-P. Hu J.-D. Li C. Zhang L. Boehmer J. Siegel Q.-Y. Zhou Y. Sagawa H. Kondo T. Takemura H. Kanayama Y. Kaneko M. Sato T. Kanbayashi Y. Hishikawa T. Shimizu A. Viola L. James L. Schlangen D.-J. Dijk R. Andretic Y.-C. Kim K.-A. Han F. Jones R. Greenspan L. Sanford L. Yang X. Tang K. Dieter E. Uta H. Sven M. Richard N. Oyane S. Pallesen F. Holsten Y. Inoue M. Fujita N. Emura K. Kuroda N. Uchimura A. Johnston J. Astbury G. Kennedy K. Hoedlmoser M. Schabus T. Pecherstorfer S. Moser G. Gruber P. Anderer W. Klimesch N. Naidoo M. Ferber A. Pack D. Neu O. Mairesse G. Hoffmann A. Dris L. Lambrecht P. Linkowski P. Verbanck O. Le Bon N. Matsuura M. Yamao N. Adachi R. Aritomi Y. Komada H. Tanaka S. Shirak University College London London UK University College London London USA Warwick Medical School London UK Warwick Medical School Coventry USA Radboud University Nijmegen Nijmegen Netherlands Department of Neurology University of Chile Santiago Chile Neurology Service Hospital del Salvador Santiago Chile Family Health Center Juan Pablo II Santiago Chile Department of Biomedicine Section on Physiology Univeristy of Bergen Bergen Norway Department of Public Health and Primary Health Care Univeristy of Bergen Bergen Norway Department of Public Health and Primary Health Care University of Bergen Bergen Norway Norwegian Competence Center for Sleep Disorders Haukeland University Hospital Bergen Norway Department of Child and Adolescent Psychiatry Haukeland University Hospital Univeristy of Bergen Bergen Norway Department of Biomedicine University of Bergen Bergen Norway US Army Medical Research and Materiel Command Fort Detrick Frederick USA Walter Reed Army Institute of Research Silver Spring USA Department of Behavioral Biology Walter Reed Army Institute of Research Silver Spring USA Faculty Department of Pulmonology Pamukkale University Medical Denizli Turkey University of Ballarat Ballarat Australia Sanofi-Aventis Recherche et Developpement Paris France Brigham and Women’s Hospital Harvard Medical School Boston USA The University of Queensland Adelaide Australia School of Psychology University of Queensland Brisbane Australia The University of Queensland Brisbane Australia Victoria University Melbourne Australia Department of Psychology Victoria University Melbourne Australia School of Psychology Victoria University Melbourne Australia Philips-Universität Marburg Germany Philips-Universitaet-Marburg Marburg Germany Instituto de Investigaciones del Sueno Madrid Spain Universitätsklinik für Neurologie Innsbruck Austria Universitaetsklinik fuer Neurologie Innsbruck Austria IMEREM GmbH Nuernberg Germany Schwarz Pharma AG Monheim Germany
来源: 评论
High capacity steganographic method based upon quantization error of JPEG
High capacity steganographic method based upon quantization ...
收藏 引用
2012 2nd International Conference on computer Application and system Modeling, ICCASM 2012
作者: Dong, Xiuze Liu, Shu Zhang, Ru Niu, Xinxin Wang, Lifeng Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China Electronic and Information Engineering Department Beijing Electronic Science and Technology Institute Beijing 100070 China Key Laboratory of Information Network Security Ministry of Public Security Shanghai 201204 China Computer Science and Technology Department Beijing Electronic Science and Technology Institute Beijing 100070 China
Quantizing Error during the process of JPEG compression is analyzed, and a new information hiding algorithm is proposed based on Quantizing Error of JPEG image. Experimental results show that the proposed algorithm ca... 详细信息
来源: 评论
The relation on prefix hijacking and the internet hierarchy
The relation on prefix hijacking and the internet hierarchy
收藏 引用
6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
作者: Zhao, Jinjing Wen, Yan Li, Xiang Peng, Wei Zhao, Feng Beijing Institute of System Engineering Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China Beijing Aerospace Control Center Beijing China National University of Defense Technology Computer School Changsha China
Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol. There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim's address space to disr... 详细信息
来源: 评论
An empirical evaluation of process mining algorithms based on structural and behavioral similarities  12
An empirical evaluation of process mining algorithms based o...
收藏 引用
27th Annual ACM Symposium on Applied Computing, SAC 2012
作者: Wang, Jianmin Tan, Shijie Wen, Lijie Wong, Raymond K. Guo, Qinlong School of Software Tsinghua University Beijing 100084 China School of Computer Science and Engineering University of New South Wales NSW 2052 Australia Key Laboratory for Information System Security Ministry of Education China Tsinghua National Laboratory for Information Science and Technology China
While many process mining algorithms have been proposed recently, there exists no widely-accepted benchmark to evaluate these process mining algorithms. As a result, it can be difficult to compare different process mi... 详细信息
来源: 评论
A measurement study on potential inter-domain routing diversity
收藏 引用
IEEE Transactions on Network and Service Management 2012年 第3期9卷 268-278页
作者: Hu, Chengchen Chen, Kai Chen, Yan Liu, Bin Vasilakos, Athanasios V. MoE Key Laboratory of Intelligent Networks and Network Security Department of Computer Science and Techonolgy Xi'An Jiaotong University Xi'an Shaanxi China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Department of Electrical Engineering and Computer Science Northwestern University Evanston IL United States Department of Computer Science and Technology Tsinghua University Beijing China Department of Computer and Telecommunications Engineering University of Western Macedonia GR 50100 Kozani Greece
In response to Internet emergencies, Internet resiliency is investigated directly through an autonomous system (AS) level graph inferred from policy-compliant BGP paths or/and traceroute paths. Due to policy-driven in... 详细信息
来源: 评论
Extending interface automata with Z notation
Extending interface automata with Z notation
收藏 引用
4th IPM International Conference on Fundamentals of Software Engineering, FSEN 2011
作者: Cao, Zining Wang, Hui National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
In this paper, we propose a specification approach combining interface automata and Z language. This approach can be used to describe behavioural properties and data properties of software components. We also study th... 详细信息
来源: 评论
Towards energy-fairness in asynchronous duty-cycling sensor networks
Towards energy-fairness in asynchronous duty-cycling sensor ...
收藏 引用
IEEE Conference on computer Communications, INFOCOM 2012
作者: Li, Zhenjiang Mo, Li Liu, Yunhao School of Computer Engineering Nanyang Technological University Singapore Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong MOE Key Lab. for Information System Security School of Software Tsinghua University China
In this paper, we investigate the problem of controlling node sleep intervals so as to achieve the min-max energy fairness in asynchronous duty-cycling sensor networks. We propose a mathematical model to describe the ... 详细信息
来源: 评论
A 680 V LDMOS on a thin SOI with an improved field oxide structure and dual field plate
收藏 引用
Journal of Semiconductors 2012年 第5期33卷 44-47页
作者: 王中健 程新红 夏超 徐大伟 曹铎 宋朝瑞 俞跃辉 沈达身 State Key Laboratory of Functional Materials for Informatics Shanghai Institute of Micro-System&Information TechnologyChinese Academy of Sciences Graduate University of the Chinese Academy of Sciences Department of Electrical and Computer Engineering University of Alabama in Huntsville
A 680 V LDMOS on a thin SOI with an improved field oxide(FOX) and dual field plate was studied *** FOX structure was formed by an "oxidation-etch-oxidation" process,which took much less time to form,and had a low ... 详细信息
来源: 评论
Secure data retrieval of outsourced data with complex query support
Secure data retrieval of outsourced data with complex query ...
收藏 引用
32nd IEEE International Conference on Distributed Computing systems Workshops, ICDCSW 2012
作者: Zhu, Yan Ma, Di Wang, Shanbiao Beijing Key Laboratory of Internet Security Technology Peking University Beijing 100871 China Department of Computer and Information Science University of Michigan Dearborn MI 48128 United States Institute of Computer Science and Technology Peking University Beijing 100871 China
The ability to efficiently retrieve data in their encrypted form is important for the cloud to become a truly secure and practical data sharing platform. Although this field has attracted tremendous research attention... 详细信息
来源: 评论
Detecting infeasible traces in process models
Detecting infeasible traces in process models
收藏 引用
14th International Conference on Enterprise information systems, ICEIS 2012
作者: Wang, Zhaoxia Wen, Lijie Zhu, Xiaochen Liu, Yingbo Wang, Jianmin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Lab. for Information System Security Ministry of Education Beijing 100084 China National Laboratory for Information Science and Technology Beijing 100084 China Logistical Engineering University Chongqing 400016 China
Workflow testing is an important method of workflow analysis in design time. A challenging problem with trace-oriented test data generation in particular and trace-based workflow analysis in general is the existence o... 详细信息
来源: 评论