咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是311-320 订阅
排序:
SMWT: A Universal and Lightweight SDN-Based Meter Table Watermarking Traceback Scheme  24
SMWT: A Universal and Lightweight SDN-Based Meter Table Wate...
收藏 引用
24th Asia-Pacific Network Operations and Management Symposium, APNOMS 2023
作者: He, Heng Yang, Sen Zhou, Xiaohu Wang, Jia School of Computer Science and Technology Wuhan University of Science and Technology Wuhan430081 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan430081 China Guilin Medical University Guilin541001 China
The use of anonymous network has increased dramatically due to the development of network technology and people focus on the network security and privacy. However, anonymous networks are often used for illegal purpose... 详细信息
来源: 评论
Using Lock-Free Design for Throughput-Optimized Cache Eviction
收藏 引用
Proceedings of the ACM on Measurement and Analysis of Computing systems 2025年 第2期9卷 1-28页
作者: Chao Dong Fang Wang Hong Jiang Dan Feng Key Laboratory of Information Storage System Wuhan National Laboratory for Optoelectronics) Engineering Research Center of data storage systems and Technology School of Computer Science and Technology) Ministry of Education of China Huazhong University of Science and Technology Wuhan Hubei China Department of Computer Science and Engineering University of Texas at Arlington Arlington Texas USA
In large-scale information systems, storage device performance continues to improve while workloads expand in size and access characteristics. This growth puts tremendous pressure on caches and storage hierarchy in te... 详细信息
来源: 评论
Learning Time Slot Preferences via Mobility Tree for Next POI Recommendation
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Tianhao Pan, Xuan Cai, Xiangrui Zhang, Ying Yuan, Xiaojie College of Computer Science Nankai University China Tianjin Key Laboratory Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education China Science and Technology on Communication Networks Laboratory Shijiazhuang China
Next Point-of-Interests (POIs) recommendation task aims to provide a dynamic ranking of POIs based on users’ current check-in trajectories. The recommendation performance of this task is contingent upon a comprehensi... 详细信息
来源: 评论
Cross-chain Transaction Tracking Protocol based on Multi-dimensional Digital Watermarking Fingerprints
Cross-chain Transaction Tracking Protocol based on Multi-dim...
收藏 引用
Frontiers technology of information and computer (ICFTIC), IEEE International Conference on
作者: Duanzhen Li Shujiang Xu Haochen He Hongrui Xue Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan PR China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan PR China
Cross-chain technology plays a critical role in the process of interconnecting blockchains. However, all attention has been focused on how to achieve efficient cross-chain interoperability protocols, thus neglecting t... 详细信息
来源: 评论
DTAME: A Interpretable and Efficient Approach for ABAC Policy Mining and Evaluation Using Decision Trees
DTAME: A Interpretable and Efficient Approach for ABAC Polic...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Zejun Lan Jianfeng Guan Xianming Gao Tao Feng Kexian Liu Jianbang Chen State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China National Key Laboratory of Science and Technology on Information System Security Institute of System Engineering PLA Academy of Military Science Beijing China
Attribute-Based Access Control (ABAC) has been chosen to replace the traditional access control model due to its dynamics, flexibility and scalability recently. However, during the migration and deployment process of ... 详细信息
来源: 评论
A Time Deterministic Dynamic Segmentation Scheduling Algorithm  9
A Time Deterministic Dynamic Segmentation Scheduling Algorit...
收藏 引用
9th IEEE International Conference on Cyber security and Cloud Computing and 8th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2022
作者: Gu, Haonan Wu, Jing Guo, Yi Wuhan University of Science and Technology College of Computer Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China
This paper proposed a soft real-time scheduling algorithm 'time-deterministic dynamic partitioning scheduling' for multimedia tasks in embedded devices. We established a new model based on the characteristics ... 详细信息
来源: 评论
A Survey of Output Feedback Robust MPC for Linear Parameter Varying systems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第10期9卷 1717-1751页
作者: Xubin Ping Jianchen Hu Tingyu Lin Baocang Ding Peng Wang Zhiwu Li the Department of Automation School of Electro-Mech-anical EngineeringXidian UniversityXi’an 710071China the Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Automation Science and EngineeringFaculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China the State Key Laboratory of Intelligent Manufacturing System Technology Beijing Institute of Electronic System EngineeringBeijing 100854China the College of Automation Chongqing University of Posts and TelecommunicationsChongqing 400065China the Information and Navigation College Air Force Engineering UniversityXi’an 710077China IEEE the School of Electro-Mechanical Engineering Xidian UniversityXi’an 710071 the Institute of System Engineering Macao University of Science and TechnologyMacao SARChina
For constrained linear parameter varying(LPV)systems,this survey comprehensively reviews the literatures on output feedback robust model predictive control(OFRMPC)over the past two decades from the aspects on motivati... 详细信息
来源: 评论
Anomalous negative magnetoresistance in quantum dot Josephson junctions with Kondo correlations
收藏 引用
science China(Physics,Mechanics & Astronomy) 2024年 第8期67卷 3-13页
作者: Mingtang Deng Chunlin Yu Guangyao Huang Rosa López Philippe Caroff Sepideh Ghalamestani Gloria Platero Hongqi Xu Institute for Quantum Information&State Key Laboratory of High Performance Computing College of Computer Science and TechnologyNational University of Defense TechnologyChangsha 410073China NanoLund and Division of Solid State Physics Lund UniversityLund S-22100Sweden China Greatwall Quantum Laboratory Changsha 410006China Institut de Física Interdisciplinària i de Sistemes Complexos IFISC Palma de Mallorca E-07122Spain Instituto de Ciencia de Materiales de Madrid Madrid 28049Spain Beijing Key Laboratory of Quantum Devices Key Laboratory for the Physics and Chemistry of Nanodevicesand Department of ElectronicsPeking UniversityBeijing 100871China Beijing Academy of Quantum Information Sciences Beijing 100193China Hefei National Laboratory Hefei 230088China
The interplay between superconductivity and the Kondo effect has stimulated significant interest in condensed matter *** compete when their critical temperatures are close and can give rise to a quantum phase transiti... 详细信息
来源: 评论
A Data-free Black-box Attack for Generating Transferable Adversarial Examples  24
A Data-free Black-box Attack for Generating Transferable Adv...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data science and systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Wang, Chenxu Zhang, Ming Zhao, Jinjing Kuang, Xiaohui Zhang, Han Zhang, Xuhong National Key Laboratory of Science and Technology on Information System Security Beijing China Tsinghua University Insc and BNRist Beijing China School of Software Technology Zhejiang University Hangzhou China
Deep neural networks (DNNs) are vulnerable to adversarial examples, which are maliciously crafted to fool DNN models. Adversarial examples often exhibit the property of transferability, which means that adversarial ex... 详细信息
来源: 评论
A Blockchain Based system for Multi-level Log Storage  7
A Blockchain Based System for Multi-level Log Storage
收藏 引用
7th International Symposium on Advances in Electrical, Electronics, and computer Engineering
作者: Xu, Gang Yun, Fan Liu, Xin Chen, Xiu-Bo School of Information Science and Technology North China University of Technology Beijing100144 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China School of Information Engineering Inner Mongolia University of Science and Technology Baotou014010 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China
With the development of the Internet, many log data are generated in the server. How to ensure the security of log data in the server is a problem that needs to be solved. At present, log data storage in most servers ... 详细信息
来源: 评论