咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3171-3180 订阅
排序:
An Efficient Threshold key-Insulated Signature Scheme
收藏 引用
Journal of Shanghai Jiaotong university(science) 2011年 第6期16卷 658-662页
作者: 陈剑洪 龙宇 陈克非 王永涛 李祥学 Department of Computer Science and Engineering Shanghai Jiaotong University School of Computer Engineering Huaiyin Institute of Technology Shanghai Key Laboratory of Scalable Computing and System Shanghai Jiaotong University Department of Computer Science and Technology East China Normal University
To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS *** a TKIS system,at least k out ... 详细信息
来源: 评论
security analysis of two recently proposed RFID authentication protocols
收藏 引用
Frontiers of Materials science 2011年 第3期5卷 335-340页
作者: Chao LV Hui LI Jianfeng MA Meng ZHAO Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Department of Computer Science and Technology Yanshan University Qinhuangdao 066004 China
Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authe... 详细信息
来源: 评论
Software services protection security protocol based on software watermarking in cloud environment
收藏 引用
Tongxin Xuebao/Journal on Communications 2012年 第SUPPL.2期33卷 176-181页
作者: Xu, Jin-Chao Zeng, Guo-Sun Wang, Wei Department of Computer Science and Technology Tongji University Shanghai 201804 China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China
Aimed to resist the infringement of software services in cloud environment, a software services protection security protocol based on software watermarking in cloud environment was presented. On the consideration of a... 详细信息
来源: 评论
An optimal color mapping strategy based on energy minimization for time-varying data
An optimal color mapping strategy based on energy minimizati...
收藏 引用
12th International Conference on computer-Aided Design and computer Graphics, CAD/Graphics 2011
作者: Peng, Yi Dong, Jie Chen, Li Chu, Haiyang Yong, Junhai School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
Color mapping plays a critical role in visualization of time-varying data and also sets a challenge for researchers due to the consistency of mapping and great changes in time-varying data. In order to solve this prob... 详细信息
来源: 评论
Multi-resolution mesh fitting by B-spline surfaces for reverse engineering
Multi-resolution mesh fitting by B-spline surfaces for rever...
收藏 引用
12th International Conference on computer-Aided Design and computer Graphics, CAD/Graphics 2011
作者: Zhang, Sen Li, Zhigang Zhang, Hui Yong, Junhai School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
This paper presents a new multi-resolution mesh fitting algorithm, extending the adaptive patch-based fitting scheme where each underlying quadrilateral is recursively subdivided into four sub-patches. In this paper, ... 详细信息
来源: 评论
Implicit surface reconstruction based on adaptive clustering
Implicit surface reconstruction based on adaptive clustering
收藏 引用
12th International Conference on computer-Aided Design and computer Graphics, CAD/Graphics 2011
作者: Zheng, Chao Zhang, Hui School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
This paper presents an efficient method to reconstruct an implicit surface from a point cloud based on adaptive clustering. First, a novel approach, based on a hierarchical clustering tree with variation and normal co... 详细信息
来源: 评论
Research progress on P2P E-services reputation incentives integration of QoS
收藏 引用
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of science and technology (Natural science Edition) 2012年 第SUPPL.1期40卷 365-371页
作者: Wu, Jiyi Shen, Qianli Chen, Deren Zhang, Jianlin School of Computer Science and Technology Zhejiang University Hangzhou 310027 China Key Laboratory of E-Business and Information Security Hangzhou Normal University Hangzhou 310036 China Key Laboratory of E-Business Market Application Technology of Guangdong Province Guangdong University of Business Studies Guangzhou 510320 China
After the discussion of field research scientific significance, the system quality of service (QoS), reputation mechanisms and reputation incentive were reviewed respectively. Finally, the issue remains in this area w... 详细信息
来源: 评论
Automatic generation of canonical views for CAD models
Automatic generation of canonical views for CAD models
收藏 引用
12th International Conference on computer-Aided Design and computer Graphics, CAD/Graphics 2011
作者: Hu, Kai-Mo Wang, Bin Yuan, Bin Yong, Jun-Hai School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
Selecting the best views for 3D objects is useful for many applications. However, with the existing methods applied in CAD models, the results neither exhibit the 3D structures of the models fairly nor conform to huma... 详细信息
来源: 评论
L-WMxD: Lexical based Webmail XSS Discoverer
L-WMxD: Lexical based Webmail XSS Discoverer
收藏 引用
2011 IEEE Conference on computer Communications Workshops, INFOCOM WKSHPS 2011
作者: Tang, Zhushou Zhu, Haojin Cao, Zhenfu Zhao, Shuai Department of Computer Science and Engineering Shanghai Jiao Tong University China Key Laboratory of Information Network Security Ministry of Public Security China
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail... 详细信息
来源: 评论
Competent predicate abstraction in model checking
收藏 引用
science China(information sciences) 2011年 第2期54卷 258-267页
作者: LI Li1,2,3, SONG XiaoYu4, GU Ming2,3 & LUO XiangYu2,3 1department of computer science & technology, Tsinghua University, Beijing 100084, China 2key laboratory for information system security, Ministry of Education of China, Beijing 100084, China 3School of Software, Tsinghua University, Beijing 100084, China 4department of ECE, Portland State University, Portland, Oregon 97207, USA 1. Department of Computer Science & Technology Tsinghua University Beijing 100084 China2. Key Laboratory for Information System Security Ministry of Education of China Beijing 100084 China3. School of Software Tsinghua University Beijing 100084 China4. Department of ECE Portland State University Portland Oregon 97207 USA
The paper presents a new approach to computing the abstract state and a maximum weight heuristic method for finding the shortest counter-example in verification of imperative programs. The strategy is incorporated in ... 详细信息
来源: 评论