咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是3101-3110 订阅
排序:
State estimation for jump Markov linear systems with uncompensated biases
State estimation for jump Markov linear systems with uncompe...
收藏 引用
American Control Conference
作者: Wenling Li Yingmin Jia Junping Du Jun Zhang Deyuan Meng Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China. Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electronic and Information Engineering Beihang University (BUAA) Beijing 100191 China
This paper studies the problem of state estimation for jump Markov linear systems with uncompensated biases. By describing the state and the measurement biases as additive random variables, a suboptimal filter has bee... 详细信息
来源: 评论
Finite-time consensus control for multiple manipulators with unmodeled dynamics
Finite-time consensus control for multiple manipulators with...
收藏 引用
American Control Conference
作者: Bin Zhang Yingmin Jia Junping Du Jun Zhang Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electronic and Information Engineering Beihang University (BUAA) Beijing 100191 China
This paper is devoted to the finite-time control problem for multiple manipulators, where unmodeled dynamics is taken into consideration. An effective coordinated control strategy is introduced, under which distribute... 详细信息
来源: 评论
New improved impossible differential attack on reduced-round AES-128
New improved impossible differential attack on reduced-round...
收藏 引用
3rd International Conference on computer science and Its Applications, CSA 2011 and 2011 FTRA World Convergence Conference, WCC 2011
作者: Liu, Ya Gu, Dawu Liu, Zhiqiang Li, Wei Kong, Weihao Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China School of Computer Science and Technology Donghua University Shanghai 201620 China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai 200240 China
In this paper, we propose a novel impossible differential attack on 7-round AES-128. Firstly, we construct some new 2-round impossible differentials of AES, which allow us to distinguish the wrong keys from the correc... 详细信息
来源: 评论
Fault detection of the macguffin cipher against differential fault attack
Fault detection of the macguffin cipher against differential...
收藏 引用
3rd International Conference on Trusted systems, INTRUST 2011
作者: Li, Wei Gu, Dawu Liu, Zhiqiang Liu, Ya Huang, Xiaohu School of Computer Science and Technology Donghua University Shanghai 201620 China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai 200240 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China
Since the early work of Biham and Shamir on differential fault attack against block ciphers at CRYPTO 1997, much work has been devoted to reducing the number of faults and to improving the time complexity of this atta... 详细信息
来源: 评论
Impossible differential attacks on reduced-round LBlock  1
收藏 引用
8th International Conference on information security Practice and Experience, ISPEC 2012
作者: Liu, Ya Gu, Dawu Liu, Zhiqiang Li, Wei Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China School of Computer Science and Technology Donghua University Shanghai 201620 China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai 200240 China
LBlock is a lightweight block cipher with 32 rounds, which can be implemented efficiently not only in hardware environment but also in software platforms. In this paper, by exploiting the structure of LBlock and the r... 详细信息
来源: 评论
Dual transfer learning
Dual transfer learning
收藏 引用
12th SIAM International Conference on Data Mining, SDM 2012
作者: Long, Mingsheng Wang, Jianmin Ding, Guiguang Cheng, Wei Zhang, Xiang Wang, Wei Department of Computer Science and Technology Tsinghua University Beijing 100084 China School of Software Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education United States Department of Computer Science University of North Carolina Chapel Hill NC United States Dept of Electrical Engineering and Computer Science Case Western Reserve University OH United States
Transfer learning aims to leverage the knowledge in the source domain to facilitate the learning tasks in the tar- get domain. It has attracted extensive research interests recently due to its effectiveness in a wide ... 详细信息
来源: 评论
New impossible differential attacks on Camellia  1
收藏 引用
8th International Conference on information security Practice and Experience, ISPEC 2012
作者: Bai, Dongxia Li, Leibo Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan 250100 China School of Mathematics Shandong University Jinan 250100 China
Camellia is one of the most worldwide used block ciphers, which has been selected as a standard by ISO/IEC. In this paper, we propose several new 7-round impossible differentials of Camellia with 2 FL/FL-1 layers, whi... 详细信息
来源: 评论
Overcoming significant noise: Correlation-template-induction attack  1
收藏 引用
8th International Conference on information security Practice and Experience, ISPEC 2012
作者: Wang, An Chen, Man Wang, Zongyue Ding, Yaoling Institute for Advanced Study Tsinghua University Beijing 100084 China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan 250100 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
Due to low Signal to Noise Ratio (SNR) in general experimental environments, previous attack methods such as correlation power analysis (CPA) do not always screen out the correct key value. Sometimes the success rate ... 详细信息
来源: 评论
Data integrity check and repair in design and manufacture of distributed storage network
Data integrity check and repair in design and manufacture of...
收藏 引用
3rd International Conference on Material and Manufacturing technology, ICMMT 2012
作者: Liu, Gang Lou, Yanxiang Liu, Shengli Department of Computer Science and Engineering Shanghai JiaoTong University Shanghai 200240 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
When clients store large files on a remote network of unreliable distributed servers, they want to verify that their files are properly stored in the servers without any modification. This can be achieved by the techn... 详细信息
来源: 评论
Ciphertext policy attribute-based encryption from lattices: Extended abstract
Ciphertext policy attribute-based encryption from lattices: ...
收藏 引用
7th ACM Symposium on information, computer and Communications security, ASIACCS 2012
作者: Zhang, Jiang Zhang, Zhenfeng Ge, Aijun State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China Department of Applied Mathematics Zhengzhou Information Science and Technology Institute Zhengzhou Henan 450002 China
Sahai and Waters [6] proposed Attribute-Based Encryption (ABE) as a new paradigm of encryption algorithms that allow the sender to set a policy describing who can decrypt a particular ciphertext. In this paper, we fir... 详细信息
来源: 评论