咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3161-3170 订阅
排序:
Index system of network security and survivability
Index system of network security and survivability
收藏 引用
1st International Conference on Instrumentation and Measurement, computer, Communication and Control, IMCCC2011
作者: Ming, Liang Wang, Dongxia Zhang, Lufeng Kuang, Xiaohui Tang, Jian Wang, Chunlei Science and Technology on Information System Security Laboratory Beijing China Beijing Institute of System and Engineering Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
In order to set up universal criteria for measuring and evaluating network security and survivability, this paper presents a novel index system. This index system was built according to the Protection-Detection-Respon... 详细信息
来源: 评论
An overview of bootkit attacking approaches
An overview of bootkit attacking approaches
收藏 引用
2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011
作者: Li, Xiang Wen, Yan Huang, Min Huan Liu, Qiang Beijing Institute of System Engineering Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Boot kit, as an innovative root kit technology, transfer its storage location from the file system to the hardware store, and activates itself while or even before the operating system kernel is loaded. Therefore, boo... 详细信息
来源: 评论
Using random walks for multi-label classification  11
Using random walks for multi-label classification
收藏 引用
20th ACM Conference on information and Knowledge Management, CIKM'11
作者: Wang, Chaokun Zheng, Wei Liu, Zhang Bai, Yiyuan Wang, Jianmin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security Ministry of Education China
The Multi-Label Classification (MLC) problem has aroused wide concern in these years since the multi-labeled data appears in many applications, such as page categorization, tag recommendation, mining of semantic web d... 详细信息
来源: 评论
Linear complexity of sequences produced by single cycle T-function
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第4期18卷 123-128页
作者: WANG Yan HU Yu-pu LI Shun-bo YANG Yang Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China Department of Mathematics Xi'an University of Architecture and Technology Xi'an 710055 China
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on ... 详细信息
来源: 评论
Deterministic Pilot Design for MIMO OFDM system Based on Compressed Sensing
Deterministic Pilot Design for MIMO OFDM System Based on Com...
收藏 引用
2012 IEEE 14th International Conference on Communication technology
作者: Nan Jing Weihong Bi Lin Wang School of Information Science and Engineering Yanshan University The Key Laboratory for Special Fiber and Fiber Sensor of Hebei Province School of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province
We consider the problem of pilot design for sparse multipath channel estimation in multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) system in this *** order to reconstruct MIMO s... 详细信息
来源: 评论
MUSIZ: A generic framework for music resizing with stretching and cropping  11
MUSIZ: A generic framework for music resizing with stretchin...
收藏 引用
19th ACM International Conference on Multimedia ACM Multimedia 2011, MM'11
作者: Zhang, Liu Wang, Chaokun Ba, Yiyuan Wang, Hao Wang, Jianmin Department of Computer Science and Technology Tsinghua University China School of Software Tsinghua University Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security Ministry of Education China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS China
Content-aware music adaption, i.e. music resizing, in temporal constraints starts drawing attention from multimedia communities because of the need of real-world scenarios, e.g. animation production and radio advertis... 详细信息
来源: 评论
Real-time volume caustics with image-based photon tracing
Real-time volume caustics with image-based photon tracing
收藏 引用
12th International Conference on computer-Aided Design and computer Graphics, CAD/Graphics 2011
作者: Wang, Yuxiang Wang, Bin Chen, Li School of Software Tsinghua University China Department of Computer Science and Technology Tsinghua University China Laboratory for Information System Security Ministry of Education of China China Tsinghua National Laboratory for Information Science and Technology China
Rendering of volume caustics in participating media is often expensive, even with different acceleration approaches. Basic volume photon tracing is used to render such effects, but rather slow due to its massive quant... 详细信息
来源: 评论
WiFace:A Secure GeoSocial Networking system Using Wi-Fi Based Multihop MANET
收藏 引用
ZTE Communications 2011年 第1期9卷 27-32页
作者: Lan Zhang Xuan Ding Zhiguo Wan Ming Gu Xiangyang Li Key Laboratory of Information System Security Tsinghua University Department of Computer Science Illinois Institute of Technology
A number of mobile Online Social Networking (OSN) services have appeared in the market in recent times. While most mobile systems benefit greatly from cloud services, centralized servers and communications infrastru... 详细信息
来源: 评论
Block Cipher Design:Generalized Single-Use-Algorithm Based on Chaos
收藏 引用
Tsinghua science and technology 2011年 第2期16卷 194-206页
作者: 赵耿 陈关荣 方锦清 徐刚 Key Laboratory of Information Security and Secrecy Beijing Electronic Science and Technology Institute Department of Electronic Engineering City University of Hong Kong China Institute of Atomic Energy School of Information Engineering University of Science and Technology Beijing
The idea of using a one-time-one-key design has been widely applied in conventional cryptography. With the security theory of conventional cryptology, encryption algorithms are made public while all the secrets are en... 详细信息
来源: 评论
Parallel spatial hashing for collision detection of deformable surfaces
Parallel spatial hashing for collision detection of deformab...
收藏 引用
12th International Conference on computer-Aided Design and computer Graphics, CAD/Graphics 2011
作者: Fan, Wenshan Wang, Bin Zhou, Jianliang Sun, Jiaguang School of Software Tsinghua University China Beijing Aerospace Control Center China Department of Computer Science and Technology Tsinghua University China Key Laboratory for Information System Security Ministry of Education of China China Tsinghua National Laboratory for Information Science and Technology China
We present a fast collision detection method for deformable surfaces with parallel spatial hashing on GPU architecture. The efficient update and access of the uniform grid are exploited to accelerate the performance i... 详细信息
来源: 评论