咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3221-3230 订阅
排序:
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing technology and science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
A Traffic congestion detection method for surveillance videos based on Macro optical flow Velocity
A Traffic congestion detection method for surveillance video...
收藏 引用
11th International Conference of Chinese Transportation Professionals: Towards Sustainable Transportation systems, ICCTP 2011
作者: Li, Xiying She, Yongye Yang, Guigen Zhao, Youting Luo, Donghua Guangdong Provincial Key Laboratory of Intelligent Transportation System School of Engineering Sun Yat-sen University Guangzhou 510006 China Traffic Management Bureau Guangdong Provincial Public Security Department Guangzhou 510440 China School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China
An intelligent and automatic traffic congestion detection method is proposed to reduce labor intensive monitoring work. The developed approach, applied on expressways, is to gather traffic congestion information using... 详细信息
来源: 评论
L-WMxD: Lexical based Webmail XSS Discoverer
L-WMxD: Lexical based Webmail XSS Discoverer
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Zhushou Tang Haojin Zhu Zhenfu Cao Shuai Zhao Department of Computer Science and Engineering Shanghai Jiaotong University China Key Laboratory of Information Network Security Ministry of Public Security China
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail... 详细信息
来源: 评论
Automatic object segmentation from large scale 3D urban point clouds through manifold embedded mode seeking  11
Automatic object segmentation from large scale 3D urban poin...
收藏 引用
19th ACM International Conference on Multimedia ACM Multimedia 2011, MM'11
作者: Yu, Zhiding Xu, Chunjing Liu, Jianzhuang Au, Oscar C. Tang, Xiaoou Shenzhen Key Laboratory for Computer Vision and Pattern Recognition Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong Department of Information Engineering Chinese University of Hong Kong Hong Kong
This paper presents a system that can automatically segment objects in large scale 3D point clouds obtained from urban ranging images. The system consists of three steps: The first one involves a ground detection proc... 详细信息
来源: 评论
Fuzzy H∞ filtering for nonlinear singularly perturbed systems with time-varying delay
Fuzzy H∞ filtering for nonlinear singularly perturbed syste...
收藏 引用
2011 8th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC'11
作者: Li, Yaping Chen, Jinxiang Meng, Lixia He, Meiyun Beijing Information Technology College Beijing 100015 China State Key Laboratory of Hybrid Process Industry Automation System and Equipment Technology Automation Research and Design Institute of Metallurgical Industry 100071 China Department of Computer Science and Technology Tsinghua University Army Aviation College Beijing 100084 China Department of Mechanism Army Aviation College Beijing 100123 China
This paper investigates the problem of designing fuzzy H∞ filter for a class of nonlinear singularly perturbed systems (SPSs) with time-varying delay in states. The considered system is approximated by a Takagi-Sugen... 详细信息
来源: 评论
Genetic Algorithm-Based Power Management in Cloud Platform
Genetic Algorithm-Based Power Management in Cloud Platform
收藏 引用
International Conference on Internet technology and Applications (iTAP)
作者: Zili Xiong Zhang Zhang Huafeng Kong Deqing Zou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Laboratory of Information Network Security Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Cloud computing is a novel computing pattern, and it can provide underlying hardware resource for cloud users on demand. Virtualization is the key technology of cloud computing, and it provides the technical support f... 详细信息
来源: 评论
A new evaluation model for security protocols
收藏 引用
Journal of Communications 2011年 第6期6卷 485-494页
作者: Yang, Chao Ma, Jianfeng Dong, Xuewen Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Computer Science and Technology Xidian University Xi'an 710071 China
Till today, the study of performance of security protocols of WLAN has been one of research focuses. Whereas, owing to enormous complexity and low efficiency of modeling security protocols, there has been by now no un... 详细信息
来源: 评论
Attributes knowledge reduction and evaluation decision of logistics centre location based on rough sets
Attributes knowledge reduction and evaluation decision of lo...
收藏 引用
International Conference on Intelligent Computation technology and Automation
作者: Ren, Yongchang Xing, Tao Quan, Qiang Chen, Xiaoji College of Information Science and Technology Bohai University Jinzhou China Key Laboratory of City Operation and Management Beijing Research Center of Urban Systems Engineering Beijing China Electronic and Information Engineering College Liaoning Technology University Jinzhou China Department of Computer Science Xingtai Polytechnic College Xingtai China
Reasonable choice of logistics center location, has important significance, for optimizing the regional industrial layout, and promoting the development of modern logistics industry. For the problems such as the logis... 详细信息
来源: 评论
An effective control scheme to ensure real-time causal order in large-scale distributed interactive simulations
An effective control scheme to ensure real-time causal order...
收藏 引用
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011
作者: Zhou, Hangjun Fu, Sha Department of Information Management Hunan University of Finance and Economics Chang Sha Hu Nan China Key Laboratory of Science and Technology for National Defence of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Chang Sha Hu Nan China
When a large-scale distributed interactive simulation system is running on WAN, the sites usually disperse over a wide area in geography, which results in the simulation clock of each site is hardly to be accurately s... 详细信息
来源: 评论
An Example-Driven Symbol Recognition Approach Based on key Features in Engineering Drawings
An Example-Driven Symbol Recognition Approach Based on Key F...
收藏 引用
IEEE International Conference on computer-Aided Design and computer Graphics
作者: Tiantian Guo Hui Zhang Yamei Wen Key Laboratory for Information System Security Ministry of Education Beijing China School of Software Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China
In this paper, we present an example-driven symbol recognition algorithm based on its key features in CAD engineering drawings. When user provides an example of a specific symbol, the input symbol is analyzed and its ... 详细信息
来源: 评论