咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是3191-3200 订阅
排序:
Aquarius: A tiny hypervisor to introspect commodity OSes in a non-bypassable way
Aquarius: A tiny hypervisor to introspect commodity OSes in ...
收藏 引用
2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011
作者: Wen, Yan Zhao, Jinjing Huang, Minhuan Chen, Hua Beijing Institute of System Engineering Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
In this paper, we propose a novel tiny hardware assisted hypervisor, called Aquarius, to introspect the commodity OSes in a non-bypassable way. Compared to previous hypervisor-based approaches, Aquarius offers three d... 详细信息
来源: 评论
Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
收藏 引用
电子学报(英文版) 2012年 第2期21卷 254-259页
作者: CHENG Hongbing RONG Chunming TAN Zhenghua ZENG Qingkai State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Information Engineering Jiangsu City Vocation College Nanjing 210036 China Department of Electronic Engineering and Computer Science University of Stavanger 4036 Stavanger Norway Department of Electronic Systems Aalborg University Niels Jernes Vej 12 9220 Aalborg Denmark
Cloud computing will be a main information infrastructure in the future;it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for clou... 详细信息
来源: 评论
Pulse Coupled Neural Network Edge-Based Algorithm for Image Text Locating
收藏 引用
Tsinghua science and technology 2011年 第1期16卷 22-30页
作者: 张昕 孙富春 State Key Lab of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and TechnologyDepartment of Computer Science and TechnologyTsinghua University
This paper presents a method for locating text based on a simplified pulse coupled neural network (PCNN). The PCNN generates a firings map in a similar way to the human visual system with non-linear image processing... 详细信息
来源: 评论
Efficiently querying business process models with BeehiveZ
Efficiently querying business process models with BeehiveZ
收藏 引用
19th Conference on Business Process Management 2011, BPM 2011
作者: Jin, Tao Wang, Jianmin Wen, Lijie Department of Computer Science and Technology Tsinghua University China School of Software Tsinghua University China Key Laboratory for Information System Security Ministry of Education China Tsinghua National Laboratory for Information Science and Technology China
The technology of business process management is being more widely used, and there are more and more business process models. In this demonstration, we show how to query a large number of models efficiently with Beehi... 详细信息
来源: 评论
Activity recognition based on semantic spatial relation
Activity recognition based on semantic spatial relation
收藏 引用
International Conference on Pattern Recognition
作者: Lingxun Meng Laiyun Qing Peng Yang Jun Miao Xilin Chen Dimitris N. Metaxas University of the Chinese Academy of Sciences Beijing Beijing CN Computer Science Department Rutgers University Piscataway NJ USA Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China
We propose an approach to recognize group activities which involve several persons based on modeling the interactions between human bodies. Benefitted from the recent progress in pose estimation [1], we model the acti... 详细信息
来源: 评论
Index system of network security and survivability
Index system of network security and survivability
收藏 引用
1st International Conference on Instrumentation and Measurement, computer, Communication and Control, IMCCC2011
作者: Ming, Liang Wang, Dongxia Zhang, Lufeng Kuang, Xiaohui Tang, Jian Wang, Chunlei Science and Technology on Information System Security Laboratory Beijing China Beijing Institute of System and Engineering Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
In order to set up universal criteria for measuring and evaluating network security and survivability, this paper presents a novel index system. This index system was built according to the Protection-Detection-Respon... 详细信息
来源: 评论
An overview of bootkit attacking approaches
An overview of bootkit attacking approaches
收藏 引用
2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011
作者: Li, Xiang Wen, Yan Huang, Min Huan Liu, Qiang Beijing Institute of System Engineering Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Boot kit, as an innovative root kit technology, transfer its storage location from the file system to the hardware store, and activates itself while or even before the operating system kernel is loaded. Therefore, boo... 详细信息
来源: 评论
Using random walks for multi-label classification  11
Using random walks for multi-label classification
收藏 引用
20th ACM Conference on information and Knowledge Management, CIKM'11
作者: Wang, Chaokun Zheng, Wei Liu, Zhang Bai, Yiyuan Wang, Jianmin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security Ministry of Education China
The Multi-Label Classification (MLC) problem has aroused wide concern in these years since the multi-labeled data appears in many applications, such as page categorization, tag recommendation, mining of semantic web d... 详细信息
来源: 评论
Linear complexity of sequences produced by single cycle T-function
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第4期18卷 123-128页
作者: WANG Yan HU Yu-pu LI Shun-bo YANG Yang Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China Department of Mathematics Xi'an University of Architecture and Technology Xi'an 710055 China
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on ... 详细信息
来源: 评论
Deterministic Pilot Design for MIMO OFDM system Based on Compressed Sensing
Deterministic Pilot Design for MIMO OFDM System Based on Com...
收藏 引用
2012 IEEE 14th International Conference on Communication technology
作者: Nan Jing Weihong Bi Lin Wang School of Information Science and Engineering Yanshan University The Key Laboratory for Special Fiber and Fiber Sensor of Hebei Province School of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province
We consider the problem of pilot design for sparse multipath channel estimation in multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) system in this *** order to reconstruct MIMO s... 详细信息
来源: 评论