咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3131-3140 订阅
排序:
Pitfalls in Identity Based Encryption Using Extended Chebyshev Polynomial
收藏 引用
China Communications 2012年 第1期9卷 58-63页
作者: Qian Haifeng Li Xiangxue Yu Yu Department of Computer Science and Technology East China Normal University Shanghai 200241 P. R. China Hangzhou Key Lab of E-business and Information Security Hangzhou Normal University Hangzhou 310036 P. R. China State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710071 P. R. China
Chebyshev polynomials are used as a reservoir for generating intricate classes of symmetrical and chaotic pattems, and have been used in a vast anaount of applications. Using extended Chebyshev polynomial over finite ... 详细信息
来源: 评论
Cross-layer detection for black hole attack in wireless network
收藏 引用
Journal of Computational information systems 2012年 第10期8卷 4101-4109页
作者: Yi, Ping Zhu, Ting Liu, Ning Wu, Yue Li, Jianhua State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing 400044 China School of Information Security Engineering Shanghai Jiao Tong University Shanghai 200240 China School of Mechanical Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Binghamton University Binghamton NY 13905 United States
Mobile ad hoc networks (MANETs) are especially vulnerable to attacks for lacking infrastructure and data transfer using wireless communication, especial for denial of service (DoS) attacks. Black hole and gray hole at... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed Computing systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
Extending CSP to detect motor imagery in a four-class BCI
收藏 引用
Journal of information and Computational science 2012年 第1期9卷 143-151页
作者: Fang, Yonghui Chen, Minyou Zheng, Xufei Harrison, R.F. State Key Laboratory of Power Transmission Equipment and System Security New Technology Chongqing University Chongqing 400044 China School of Electronic and Information Engineering Southwest University Chongqing 400715 China College of Computer Science Sichuan University Chengdu 610065 China Department of Automatic Control and Systems Engineering University of Sheffield United Kingdom
Brain computer Interface (BCI) provides a direct communication channel from brain to peripheral equipment. Common Spatial Patterns (CSP) is wildly used to extract features for electroencephalogram (EEG). However, basi... 详细信息
来源: 评论
Editorial
收藏 引用
International Journal on Artificial Intelligence Tools 2012年 第3期21卷
作者: Cui, Zhihua Shi, Zhongzhi Alex, Rajan Complex System and Computational Intelligence Laboratory School of Computer Science and Technology Taiyuan University of Science and Technology Shanxi 030024 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences No. 6 Kexueyuan South Road Zhongguancun Haidian District Beijing 100190 China Department of Engineering and Computer Science West Texas AandM University Canyon TX 79015 United States
Swarm intelligence is an umbrella for amount optimization algorithms. This discipline deals with natural and artificial systems composed of many individuals that coordinate their activities using decentralized control... 详细信息
来源: 评论
security analysis of two recently proposed RFID authentication protocols
收藏 引用
中国计算机科学前沿 2011年 第3期5卷 335-340页
作者: Chao LV Hui LI Jianfeng MA Meng ZHAO Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Department of Computer Science and Technology Yanshan University Qinhuangdao 066004 China
Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and *** this paper,we analyze two recently proposed RFID authentication ... 详细信息
来源: 评论
Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
Identity-based proxy cryptosystems with revocability and hie...
收藏 引用
作者: Wang, Lihua Wang, Licheng Mambo, Masahiro Okamoto, Eiji Network Security Research Institute Koganei-shi 184-8795 Japan State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Faculty of Electrical and Computer Engineering Institute of Science and Engineering Kanazawa University Kanazawa-shi 920-1192 Japan School of Systems and Information Engineering University of Tsukuba Tsukuba-shi 305-8573 Japan
Proxy cryptosystems are classified into proxy decryption systems and proxy re-encryption systems on the basis of a proxy's role. In this paper, we propose an ID-based proxy cryptosystem with revocability and hiera... 详细信息
来源: 评论
Feature extraction of motor imagery in BCI with approximate entropy
收藏 引用
Journal of Computational information systems 2012年 第6期8卷 2485-2491页
作者: Fang, Yonghui Chen, Minyou Zheng, Xufei Harrison, Robert F State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing 400044 China School of Electronic and Information Engineering Southwest University Chongqing 400715 China College of Computer Science Sichuan University Chengdu 610065 China Department of Automatic Control and Systems Engineering University of Sheffield Sheffield United Kingdom
Approximate Entropy (ApEn) is a regularity statistic that quantifies the unpredictability of fluctuations in a time series and can classify complex systems. This study, ApEn is used to extract features from motor imag... 详细信息
来源: 评论
SmartMote: Energy and VoI aware solar-powered sensor network design for environment monitoring
SmartMote: Energy and VoI aware solar-powered sensor network...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor systems (MASS)
作者: Shao-Jie Tang Cheng Bo Xiang-Yang Li Yunhao Li Xiaohua Xu Jing Yuan Department of Computer Science Illinois Institute of Technology USA The Key Laboratory of Embedded System and Service Computing Tongji University China Tsinghua University Beijing Beijing CN Department of Computer Science University of Illinois at Chicago USA
Due to advances in low power micro-sensor technology, energy harvesting techniques, we can now build large scale solar-powered sensor networks to support long-running operations. Solar powered sensors often harvest va...
来源: 评论
An arterial elasticity index algorithm based on wavelet transform and curve fitting
收藏 引用
Journal of information and Computational science 2012年 第12期9卷 3379-3389页
作者: He, Wei Li, Songnong Xiao, Hanguang Yu, Chuanxiang Lin, Haitao State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing 400030 China Product Research and Development Department Sichuan Yufeng Science and Technology Development Co. Ltd. Mianyang 621000 China
The Artery Elasticity Index (AEI) is an important marker in the evaluation of the risk level of cardiovascular and cerebrovascular diseases. For calculating AEI, signals of arterial pulse wave should be acquired first... 详细信息
来源: 评论