咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3211-3220 订阅
排序:
Index system of Network security and Survivability
Index System of Network Security and Survivability
收藏 引用
2011 International conference on Instrumentation,Measurement,computer,Communication and Control (IMCCC2011)(第一届仪器测量、计算机通信与控制国际会议)
作者: Xiaohui Kuang Lufeng Zhang Dongxia Wang Jian Tang Liang Ming Chunlei Wang Science and Technology on Information System Security Laboratory Beijing China Beijing Institute o Beijing Institute of System and Engineering Beijing China Department of Computer Science and Techn
In order to set up universal criteria for measuring and evaluating network security and survivability,this paper presents a novel index *** index system was built according to the Protection-Detection-Response (PDR) s... 详细信息
来源: 评论
Learning complex image patterns with Scale and Shift Invariant Sparse Coding
Learning complex image patterns with Scale and Shift Invaria...
收藏 引用
IEEE International Conference on Image Processing
作者: Xiaobing Liu Bo Zhang State Key Laboratory of Intelligent Technology and System Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing China
The image patches learned by recent works are usually only bar-like or Gabor-like patterns. However those simple patterns are not meaningful enough to capture higher level information. In this study, we try to learn m... 详细信息
来源: 评论
Fault analysis study of the block cipher FOX64
收藏 引用
Multimedia Tools and Applications 2011年 第3期63卷 691-708页
作者: Li, Ruilin You, Jianxiong Sun, Bing Li, Chao Department of Mathematics and System Science Science College National University of Defense Technology Changsha China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China College of Computer National University of Defense Technology Changsha China
FOX is a family of symmetric block ciphers from MediaCrypt AG that helps to secure digital media, communications, and storage. The high-level structure of FOX is the so-called (extended) Lai–Massey scheme. This paper...
来源: 评论
Assessing network vulnerability under probabilistic region failure model
Assessing network vulnerability under probabilistic region f...
收藏 引用
International Conference on High Performance Switching and Routing
作者: Wang, Xiaoliang Jiang, Xiaohong Pattavina, Achille State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University China Future University Hakodate Hokkaido Japan Department of Electronics and Information Politecnico di Milano 20133 Milano Italy
The mission critical network infrastructures are facing potential large region threats, both intentional (like EMP attack, bomb explosion) and natural (like earthquake, flooding). The available research on region fail... 详细信息
来源: 评论
ID*Lite: Improved D*Lite algorithm  11
ID*Lite: Improved D*Lite algorithm
收藏 引用
Proceedings of the 2011 ACM Symposium on Applied Computing
作者: Yue, Weiya Franco, John Cao, Weiwei Yue, Hongwei Computer Science Department University of Cincinnati Cincinnati OH 45220 United States State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing 100049 China Information College Zhongkai Univ. of Agriculture and Engineering Guangdong Univ. of Technology Guangzhou 510090 China
Robot navigation has been of great importance especially under unknown or keep-changing environment. In order to solve this kind of problems, many algorithms have been brought up. D*Lite is generally considered as one... 详细信息
来源: 评论
Construction of General (k, n) Probabilistic Visual Cryptography Scheme
收藏 引用
Journal of Electronic science and technology 2011年 第4期9卷 317-324页
作者: Ching-Nung Yang Chih-Cheng Wu Feng Liu with the Department of Computer Science and Information Engineering National Dong Hwa University with State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences.
Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images. Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS... 详细信息
来源: 评论
3DV quality model based depth maps for view synthesis in FTV system
收藏 引用
Journal of Shanghai University(English Edition) 2011年 第4期15卷 335-341页
作者: 张秋闻 安平 张艳 张兆杨 王元庆 Key Laboratory of Advanced Display and System Application (Shanghai University) Ministry of EducationShanghai 200072P.R.China School of Communication and Information Engineering Shanghai University Department of Computer Science and Technology Anhui University of Finance and EconomicsBengbu 230030AuhuiP.R.China Department of Electronics Science and Engineering Nanjing University
Depth maps are used for synthesis virtual view in free-viewpoint television (FTV) systems. When depth maps are derived using existing depth estimation methods, the depth distortions will cause undesirable artifacts ... 详细信息
来源: 评论
Automatic Generation of Canonical Views for CAD Models
Automatic Generation of Canonical Views for CAD Models
收藏 引用
IEEE International Conference on computer-Aided Design and computer Graphics
作者: Kaimo Hu Bin Wang Bin Yuan Junhai Yong Key Laboratory for Information System Security Ministry of Education Beijing China Department of Computer Science and Technology Tsinghua University Beijing China School of Software Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China
Selecting the best views for 3D objects is useful for many applications. However, with the existing methods applied in CAD models, the results neither exhibit the 3D structures of the models fairly nor conform to huma... 详细信息
来源: 评论
An Optimal Color Mapping Strategy Based on Energy Minimization for Time-Varying Data
An Optimal Color Mapping Strategy Based on Energy Minimizati...
收藏 引用
IEEE International Conference on computer-Aided Design and computer Graphics
作者: Yi Peng Jie Dong Li Chen Haiyang Chu Junhai Yong Key Laboratory for Information System Security Ministry of Education Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China School of Software Tsinghua University Beijing China
Color mapping plays a critical role in visualization of time-varying data and also sets a challenge for researchers due to the consistency of mapping and great changes in time-varying data. In order to solve this prob... 详细信息
来源: 评论
A Real-Time Face Recognition system Based on BDPCA Plus BDDLDA
收藏 引用
Procedia Environmental sciences 2011年 11卷 139-146页
作者: Jing Li Zehong Yang Yixu Song Quan Yang Fangwen Zhai State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing 100084 China
Holistic-based methods, especially principal component analysis(PCA) and linear discriminant analysis(LDA), are very popularly used in face recognition. In last several years, the direct LDA(D-LDA) method was suggeste... 详细信息
来源: 评论