咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3151-3160 订阅
排序:
Tracking and identifying burglar using collaborative sensor-camera networks
Tracking and identifying burglar using collaborative sensor-...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Haitao Zhang Shaojie Tang Xiang-Yang Li Huadong Ma Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University슠of Posts and슠Telecommunications Beijing China Department of Computer Science Illinois Institute of Technology Chicago USA Tsinghua National Laboratory of Information Science and Technology Tsinghua University Beijing China
This work presents BurTrap, a networking system which integrates wireless modules (such as TelosB nodes) with networked surveillance cameras to automatically, accurately, timely track and identify burglar who stole th... 详细信息
来源: 评论
Research on survivability metrics based on survivable process of network system  11
Research on survivability metrics based on survivable proces...
收藏 引用
4th International Conference on security of information and Networks, SIN 2011
作者: Ming, Liang Huang, Minhuan Dongxia, Wang Kuang, Xiaohui Chunlei, Wang Xuewei, Feng National Key Laboratory of Science and Technology on Information System Security Beijing China Department of Computer Science Tsinghua University Beijing China
Survivability is a necessary property of network system in disturbed environment. A survivable network always experience five phases, i.e., normal phase, resistance phase, destroyed phase, recovery phase, and adaptati... 详细信息
来源: 评论
Model checking cooperative multi-agent systems in BDI logic
收藏 引用
Journal of information and Computational science 2012年 第5期9卷 1185-1194页
作者: Chen, Qingliang Su, Kaile Wu, Lijun Xu, Zhaocheng School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Department of Computer Science Jinan University Guangzhou 510632 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Institute for Integrated and Intelligent Systems Griffith University Brisbane Australia School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Traditional temporal logics such as LTL (Linear Temporal Logic) and CTL (Computation Tree Logic) have shown tremendous success in specifying and verifying hardware and software systems. However, this kind of logic can... 详细信息
来源: 评论
Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model
收藏 引用
Journal of Shanghai Jiaotong university(science) 2011年 第6期16卷 672-676页
作者: 孙瑾 胡予濮 张乐友 Key Laboratory of Computer Network and Information Security Xidian University Department of Application Mathematics Xi'an University of Technology
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is *** the chosen ciphertext... 详细信息
来源: 评论
Study on event correlation analysis in evidence chain structure
Study on event correlation analysis in evidence chain struct...
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Dong Liu Yong-qing Wei School of Information Science and Engineering Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University Jinan China Basic Education Department Shandong Police College Jinan China
computer forensics has limitations in representation formalism of the electronic evidence and data missing. A method in construction of electronic evidence chain was proposed on the basis of the study and analysis of ... 详细信息
来源: 评论
Application research of WebSocket technology on Web tree component
Application research of WebSocket technology on Web tree com...
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Feng-yan Jiang Hui-chuan Duan School of Information Science and Engineering Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University Jinan China Basic Education Department Shandong Normal University Jinan China
In the development of information systems, Web tree component is an important way to show information, provide a convenient and intuitive information queries, which has become one of the essential features in the info... 详细信息
来源: 评论
Aquarius: A tiny hypervisor to introspect commodity OSes in a non-bypassable way
Aquarius: A tiny hypervisor to introspect commodity OSes in ...
收藏 引用
2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011
作者: Wen, Yan Zhao, Jinjing Huang, Minhuan Chen, Hua Beijing Institute of System Engineering Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
In this paper, we propose a novel tiny hardware assisted hypervisor, called Aquarius, to introspect the commodity OSes in a non-bypassable way. Compared to previous hypervisor-based approaches, Aquarius offers three d... 详细信息
来源: 评论
Pulse Coupled Neural Network Edge-Based Algorithm for Image Text Locating
收藏 引用
Tsinghua science and technology 2011年 第1期16卷 22-30页
作者: 张昕 孙富春 State Key Lab of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and TechnologyDepartment of Computer Science and TechnologyTsinghua University
This paper presents a method for locating text based on a simplified pulse coupled neural network (PCNN). The PCNN generates a firings map in a similar way to the human visual system with non-linear image processing... 详细信息
来源: 评论
Activity recognition based on semantic spatial relation
Activity recognition based on semantic spatial relation
收藏 引用
International Conference on Pattern Recognition
作者: Lingxun Meng Laiyun Qing Peng Yang Jun Miao Xilin Chen Dimitris N. Metaxas University of the Chinese Academy of Sciences Beijing Beijing CN Computer Science Department Rutgers University Piscataway NJ USA Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China
We propose an approach to recognize group activities which involve several persons based on modeling the interactions between human bodies. Benefitted from the recent progress in pose estimation [1], we model the acti... 详细信息
来源: 评论
Efficiently querying business process models with BeehiveZ
Efficiently querying business process models with BeehiveZ
收藏 引用
19th Conference on Business Process Management 2011, BPM 2011
作者: Jin, Tao Wang, Jianmin Wen, Lijie Department of Computer Science and Technology Tsinghua University China School of Software Tsinghua University China Key Laboratory for Information System Security Ministry of Education China Tsinghua National Laboratory for Information Science and Technology China
The technology of business process management is being more widely used, and there are more and more business process models. In this demonstration, we show how to query a large number of models efficiently with Beehi... 详细信息
来源: 评论