咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3201-3210 订阅
排序:
Proving computational geometry algorithms in TLA+2
Proving computational geometry algorithms in TLA+2
收藏 引用
5th International Conference on Theoretical Aspects of Software Engineering, TASE 2011
作者: Kong, Hui Zhang, Hehua Song, Xiaoyu Gu, Ming Sun, Jiaguang Dept.CST Tsinghua Unviersity Beijing China School of Software Tsinghua University Beijing China Dept.ECE Portland State University OR United States Key Laboratory for Information System Security Ministry of Education China Singhua National Laboratory for Information Science and Technology China
Geometric algorithms are widely used in many scientific fields like computer vision, computer graphics. To guarantee the correctness of these algorithms, it's important to apply formal method to them. In this pape... 详细信息
来源: 评论
Visual Recognition Using Density Adaptive Clustering
Visual Recognition Using Density Adaptive Clustering
收藏 引用
International Conference on Multimedia and Ubiquitous Engineering (MUE)
作者: Lei Ji Zheng Qin Kai Chen Huan Li Key Laboratory for Information System Security Ministry of Education School of Software Dongguan University of Technology Guangdong China Tsinghua National Laboratory for Information Science and Technology China Department of Computer Science and Technology Tsinghua University Beijing China
Visual codebook based texture analysis and image recognition is popular for its robustness to affine transformation and illumination variation. It is based on the affine invariable descriptors of local patches extract... 详细信息
来源: 评论
Fully Secure Identity-based Broadcast Encryption in the Subgroups
收藏 引用
China Communications 2011年 第2期8卷 152-158页
作者: 张乐友 胡予濮 吴青 Department of Mathematical Science Xidian University Key Laboratory of Computer Networks and Information Security Ministry of EducationXidian University School of automation Xi'an Institute of Posts and Telecommunications
In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive se... 详细信息
来源: 评论
A robust affine invariant feature matching approach
A robust affine invariant feature matching approach
收藏 引用
10th International Conference on Machine Learning and Applications, ICMLA 2011
作者: Gao, Ce Song, Yixu Jia, Peifa Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing 100084 China State Key Laboratory on Intelligent Technology and Systems Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
Affine transformation detection can be used in many computer vision and other applications. This paper presents a new method for affine transformation detection. The state-of-the-art methods are mainly divided into tw... 详细信息
来源: 评论
National critical infrastructure modeling and analysis based on complex system theory
National critical infrastructure modeling and analysis based...
收藏 引用
1st International Conference on Instrumentation and Measurement, computer, Communication and Control, IMCCC2011
作者: Wang, Chunlei Fang, Lan Dai, Yiqi Department of Computer Science and Technology Tsinghua University Beijing China Science and Technology on Information System Security Laboratory Beijing China Beijing Institute of System and Engineering Beijing China
National critical infrastructure is a typical complex system with the characteristics of self-organized criticality. In this paper, we firstly analyze the basic concepts of national critical infrastructure and the ass... 详细信息
来源: 评论
Non-reference virtual view quality evaluation of MVD
收藏 引用
Journal of Shanghai University(English Edition) 2011年 第4期15卷 342-346页
作者: 张艳 安平 张秋闻 王元庆 张兆杨 School of Communication and Information Engineering Shanghai University Department of Computer Science and Technology Anhui University of Finance and EconomicsBengbu 230030AnhuiP.R.China Key Laboratory of Advanced Display and System Application (shanghai University) Ministry of Education Department of Electronics Science and Engineering Nanjing University
The quality of virtual view based on multi-view video (MVD) plus depth format is often evaluated by PSNR or subjectively judged. However, due to synthesizing arbitrary view images, the virtual view images mostly hav... 详细信息
来源: 评论
security analysis of a privacy-preserving ECC-based grouping-proof protocol
收藏 引用
Journal of Convergence information technology 2011年 第3期6卷 113-119页
作者: Lv, Chao Li, Hui Ma, Jianfeng Niu, Ben Jiang, Haiyang Key Laboratory of Computer Networks and Information Security Xidian University China Department of Computer Science Tangshan Normal University China
Batina et al. have proposed a privacy-preserving grouping-proof RFID protocol with colluding tag prevention (CTP) recently which relies exclusively on the use of Elliptic Curve Cryptography (ECC). In this paper, we sh... 详细信息
来源: 评论
Robust H∞ filtering for uncertain nonlinear stochastic systems with mode-dependent time-delays and Markovian jump parameters
收藏 引用
Circuits, systems, and Signal Processing 2011年 第2期30卷 303-321页
作者: Yan, Huaicheng Zhang, Hao Shi, Hongbo Meng, Max Q.-H. Cheng, Jiujun School of Information Science and Engineering East China University of Science and Technology Shanghai 200237 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Control Science and Engineering Tongji University Shanghai 200092 China Department of Electronic Engineering Chinese University of Hong Kong Shatin N.T. Hong Kong Department of Computer Science and Technology Tongji University Shanghai 200292 China
This paper investigates the problem of robust H∞ filtering for a class of uncertain nonlinear stochastic time-delay systems with Markovian jump parameters. The system under consideration contains parameter uncertaint... 详细信息
来源: 评论
Designing and analysis of a new book-lending system based on logic Petri nets
Designing and analysis of a new book-lending system based on...
收藏 引用
2011 International Conference on Electric information and Control Engineering, ICEICE 2011
作者: Xia, Jiang Luan, Wenjing Department of Computer Laiwu Vocational and Technical College Laiwu 271100 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China
A new book-lending system is designed and analyzed based on logic Petri nets in this paper. The batch processing function and indeterminacy of readers are included in the system. Its logic Petri net model is establish... 详细信息
来源: 评论
Energy optimal selection of access points in wireless sensor networks
Energy optimal selection of access points in wireless sensor...
收藏 引用
2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011
作者: Xin, Qin Yao, Xiaolan He, Wei Universite Catholique de Louvain Department of Applied Mathematics Louvain-la-Neuve Belgium National University of Defense Technology School of Computer Science Changsha China State Key Laboratory of Power Transmission Equipment and System Security and New Technology College of Electrical Engineering Chongqing University China
In a Wireless Sensor Networks (WSN), there are normally one or several sensor nodes working as Access Points (AP), which are able to provide a relay for other sensors to an external Internet connection. Since WSNs are... 详细信息
来源: 评论