咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是3121-3130 订阅
排序:
Mechanism design for finding experts using locally constructed social referral web
Mechanism design for finding experts using locally construct...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Lan Zhang Xiang-Yang Li Yunhao Liu QiuYuan Huang Shaojie Tang MOE Key Laboratory for Information System Security School of Software Tsinghua National Laboratory for Information Science and Technology Tsinghua University China Department of Computer Science Illinois Institute of Technology USA Department of Computer Science and Engineering HKUST Hong Kong China Department of Electrical Engineering University of Florida USA
In this work, we address the problem of finding experts using chains of social referrals and profile matching with only local information in online social networks. By assuming that users are selfish, rational, and ha... 详细信息
来源: 评论
Semi-supervised vehicle recognition: An approximate region constrained approach
Semi-supervised vehicle recognition: An approximate region c...
收藏 引用
7th International Conference on Rough Sets and Knowledge technology, RSKT 2012
作者: Zhao, Rui Wei, Zhihua Miao, Duoqian Wu, Yan Mei, Lin Department of Computer Science and Technology Tongji University 201804 Shanghai China Third Research Institute Ministry of Public Security 201204 Shanghai China State Key Laboratory for Novel Software Technology Nanjing University 210093 Nanjing China
Semi-supervised learning attracts much concern because it can improve classification performance by using unlabeled examples. A novel semi-supervised classification algorithm SsL-ARC is proposed for real-time vehicle ... 详细信息
来源: 评论
WILL: Wireless indoor localization without site survey
WILL: Wireless indoor localization without site survey
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Chenshu Wu Zheng Yang Yunhao Liu Wei Xi MOE Key Laboratory for Information System Security School of Software Tsinghua National Laboratory for Information Science and Technology Tsinghua University China Department of Computer Science and Engineering HKUST Hong Kong China Xian Jiaotong University China
Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past two decades. Most radio-based solutions require a process of site survey, in which radio s... 详细信息
来源: 评论
Towards energy-fairness in asynchronous duty-cycling sensor networks
Towards energy-fairness in asynchronous duty-cycling sensor ...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Zhenjiang Li Mo Li Yunhao Liu Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China School of Computer Engineering Nanyang Technological University Singapore MOE Key Laboratory for Information System Security School of Software Tsinghua National Laboratory for Information Science and Technology Tsinghua University China
In this paper, we investigate the problem of controlling node sleep intervals so as to achieve the min-max energy fairness in asynchronous duty-cycling sensor networks. We propose a mathematical model to describe the ... 详细信息
来源: 评论
SelectCast: Scalable Data Aggregation Scheme in Wireless Sensor Networks
收藏 引用
IEEE Transactions on Parallel and Distributed systems 2012年 第10期23卷 1958-1969页
作者: Cheng Wang Changjun Jiang Shaojie Tang Xiang-Yang Li Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science and Engineering University of Tongji China Department of Computer Science Illinois Institute of Technology Chicago IL USA Department of Computer Science and Engineering Tsinghua National Laboratory for Information Science and Technology (TNLIST) University of Tongji China
In this work, for a wireless sensor network (WSN) of n randomly placed sensors with node density \lambda \in [1,n], we study the tradeoffs between the aggregation throughput and gathering efficiency. The gathering eff... 详细信息
来源: 评论
To better stand on the shoulder of giants  12
To better stand on the shoulder of giants
收藏 引用
12th ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL '12
作者: Yan, Rui Huang, Congrui Tang, Jie Zhang, Yan Li, Xiaoming School of Electronics Engineering and Computer Science Peking University Beijing 100871 China State Key Laboratory of Virtual Reality Technology and Systems Beihang University Beijing 100083 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Department of Computer Science and Information Engineering National Taiwan University Taipei 10617 Taiwan
Usually scientists breed research ideas inspired by previous publications, but they are unlikely to follow all publications in the unbounded literature collection. The volume of literature keeps on expanding extremely... 详细信息
来源: 评论
Direct CCA secure identity-based broadcast encryption
Direct CCA secure identity-based broadcast encryption
收藏 引用
6th International Conference on Network and system security, NSS 2012
作者: Zhang, Leyou Wu, Qing Hu, Yupu Department of Mathematics School of Science Xidian University Xi'an 710071 China School of Automation Xi'an University of Posts and Telecommunications Xi'an 710121 China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China
In the previous works, the general transformation methods from a CPA(chosen-plaintext attacks) secure scheme to a CCA(chosen-ciphertext attacks) secure scheme are the hierarchical identity-based encryption, one-time s... 详细信息
来源: 评论
Fault detection on the software implementation of CLEFIA lightweight cipher
收藏 引用
Journal of Networks 2012年 第8期7卷 1288-1294页
作者: Li, Wei Gu, Dawu Xia, Xiaoling Liu, Ya Liu, Zhiqiang School of Computer Science and Technology Donghua University Shanghai China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China
CLEFIA is an efficient lightweight cipher that delivers advanced copyright protection and authentication in computer networks. It is also applied in the secure protocol for transmission including SSL and TLS. Since it... 详细信息
来源: 评论
PatternTrack: A Visual Pattern Detection Technique for Multidimensional Data
PatternTrack: A Visual Pattern Detection Technique for Multi...
收藏 引用
International Conference on computer science and Service system (CSSS)
作者: Quan Li Li Chen Hongsen Liao Junhai Yong School of Software Key Laboratory for Information System Security Ministry of Education of China Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China
In multidimensional data analysis, one important task is to investigate the inner relations and patterns. Numerous visual representations have been proposed, such as parallel coordinates and scatter plots. However, pa... 详细信息
来源: 评论
Secure Data Retrieval of Outsourced Data with Complex Query Support
Secure Data Retrieval of Outsourced Data with Complex Query ...
收藏 引用
International Conference on Distributed Computing systems Workshop
作者: Yan Zhu Di Ma Shanbiao Wang Beijing Key Laboratory of Internet Security Technology Institute of Computer Science and Technology Peking University Beijing China Department of Computer and Information Science University of Michigan Dearborn MI USA
The ability to efficiently retrieve data in their encrypted form is important for the cloud to become a truly secure and practical data sharing platform. Although this field has attracted tremendous research attention... 详细信息
来源: 评论