咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3141-3150 订阅
排序:
A DAG-based algorithm of mining frequent closed itemsets in high dimensional datasets
收藏 引用
International Journal of Advancements in Computing technology 2012年 第19期4卷 213-222页
作者: Dong, Jun Chen, Shuai Chen, Jing Huang, Guoyan Ren, Jiadong College of Information Science and Engineering Yanshan University 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China Production Management Department Shanghai Aircraft Manufacturing Co.Ltd 200436 China
Algorithms based on row enumeration always scan and construct conditional transposed tables, which increases the execution time and space cost. To address this problem, we adopt the DAG (Directed Acyclic Graph) to com... 详细信息
来源: 评论
Analysis on Token-Controlled Public key Encryption
Analysis on Token-Controlled Public Key Encryption
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Changlu Lin Yong Li Sriramkrishnan Srinivasan Li Lu Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China Key Laboratory of Communication & Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University Beijing China Department of Computing University of Surrey Guildford UK School of Computer Science University of Electronic Science and Technology Chengdu China
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example... 详细信息
来源: 评论
A knowledge passing process calculus
收藏 引用
ICIC Express Letters 2012年 第1期6卷 85-90页
作者: Qian, Zhongmin Cao, Zining Gao, Zhifeng Lin, Jinxing Department of Computer Science and Technology Nanjing University of Aeronautics and Astronautics No. 29 Yudao Street Baixia District Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University No. 1 Shizi Street Suzhou 215006 China National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China College of Automation Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Yadongxincheng District Nanjing 210046 China
In MAS (Multi-Agent system), communicating among agents is an important characteristic as it is important in transmitting information among agents, recognizing the status changing, and scheduling and accomplishing coo... 详细信息
来源: 评论
Improvement on masked S-box hardware implementation
Improvement on masked S-box hardware implementation
收藏 引用
International Conference on Innovations in information technology
作者: Juanli Zeng Yi Wang Cheng Xu Renfa Li College of Information Science and Engineering Hunan University Changsha Hunan P. R. China Department of Electrical & Computer Engineering National University of Singapore Singapore Hunan Province Key Laboratory of Network and Information Security
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ... 详细信息
来源: 评论
Time-domain preamble-based SNR estimation for OFDM systems in doubly selective channels
Time-domain preamble-based SNR estimation for OFDM systems i...
收藏 引用
MILCOM, Military Communications Conference
作者: Fan Yang Xi Zhang Zhong-pei Zhang School of Communication and Information Engineering University of Electronic Science and Technology of China Chengdu China Networking and Information Systems Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX USA National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology of China Chengdu China
In wireless orthogonal frequency division multiplexing (OFDM) systems, the knowledge of signal-to-noise ratio (SNR) plays an important role for system optimization. Most of the exiting literatures have studied the SNR... 详细信息
来源: 评论
Overhead Power Line Detection from UAV Video Images
Overhead Power Line Detection from UAV Video Images
收藏 引用
International Conference on Mechatronics and Machine Vision in Practice
作者: Tang Wen YANG Hang YIN Qiu Qi RUAN Jian Da HAN Jun Tong QI Qing YONG Zi Tong WANG Zeng Qi SUN Beijing Key Laboratory of Advanced Information Science and Network Technology Institute of Information Science Beijing Jiaotong University Beijing 100044 China Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044 China State Key Laboratory of Robotics Shenyang Institute of Automation CAS Shenyang 110016 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
Currently, unmanned aerial vehicles (UAVs) are applied to routine inspection tasks of electric distribution networks. As an important information source, machine vision attracts much attention in the area of the UAV&#... 详细信息
来源: 评论
Hyperspectral image classification using band selection and morphological profile
Hyperspectral image classification using band selection and ...
收藏 引用
Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing, WHISPERS
作者: Kun Tan Erzhu Li Qian Du Peijun Du Jiangsu Key laboratory of Resources and Environment Information Engineering China University of Mining and Technology China Department of Electrical and Computer Engineering Mississippi State University USA Department of Geographical Information Science Nanjing University China
In this paper, we propose a new methodology to combine spectral information and spatial features for Support Vector Machine (SVM)-based classification. The novelty of the proposed work is in the combination of band se... 详细信息
来源: 评论
Feasibility of Double-Click Attack on a Passive Detection Quantum key Distribution system
收藏 引用
Chinese Physics Letters 2011年 第7期28卷 27-30页
作者: ZHANG Peng LI Chao Department of Mathematics and System Science Science CollegeNational University of Defense TechnologyChangsha 410073 State Key Laboratory of Information Security Institute of SoftwareChinese Academy of SciencesBeijing 100190
An eavesdropper(Eve)can exploit all the imperfections of a practical quantum key distribution(QKD)system to obtain some information about the secret key,no matter whether these imperfections are from the physical laye... 详细信息
来源: 评论
Optimal Beaconing Control for Epidemic Routing in Delay-Tolerant Networks
收藏 引用
IEEE Transactions on Vehicular technology 2012年 第1期61卷 311-320页
作者: Yong Li Zhaocheng Wang Depeng Jin Li Su Lieguang Zeng Sheng Chen State Key Laboratory on Microwave and Digital Communications Tsinghua National Laboratory for Information Science and Technology Department of Electronic Engineering Tsinghua University Beijing China Department of Electronics and Computer Science Faculty of Physical and Applied Sciences University of Southampton Southampton UK Faculty of Engineering King Abdulaziz University Jeddah Saudi Arabia
Owing to the uncertainty of transmission opportunities between mobile nodes, the routing in delay-tolerant networks (DTNs) exploits the mechanism of opportunistic forwarding. Energy-efficient algorithms and policies f... 详细信息
来源: 评论
Reconstructing 3D human poses from uncalibrated monocular images with strong perspective effects
收藏 引用
Journal of Computational information systems 2012年 第15期8卷 6437-6445页
作者: Chen, Shu Peng, Xiaoning School of Information Engineering Xiangtan Universtiy Xiangtan 411105 China Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Xiangtan 411105 China School of Information Science and Engineering Central South University Changsha 410083 China Department of Computer Science and Technology Huaihua College Huaihua 418008 China
This paper present a geometric method to reconstruct human motion pose from 2D point correspondences obtained from uncalibrated monocular images. The proposed algorithm can handle images with very strong perspective e... 详细信息
来源: 评论