咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3231-3240 订阅
排序:
Robust Real-Time Lane Marking Detection for Intelligent Vehicles in Urban Environment
Robust Real-Time Lane Marking Detection for Intelligent Vehi...
收藏 引用
The 2011 International Conference on Automation and Robotics(ICAR 2011)
作者: Wentao Yao Zhidong Deng State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University
In this paper, we propose a framework of robust and realtime lane marking detection and tracking for the autonomous driving of intelligent vehicle under urban road environments. Our framework use hyperbola model as th... 详细信息
来源: 评论
A Real-time Face Recognition system based on BDPCA plus BDDLDA
A Real-time Face Recognition System based on BDPCA plus BDDL...
收藏 引用
2011 2ND International Conference on Innovative Computing and Communication and 2011 Asia-Pacific Conference on information technology and Ocean Engineering(CICC-ITOE 2011)
作者: Jing Li Zehong Yang Yixu Song Quan Yang Fangwen Zhai State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and TechnologyDepartment of Computer Science and Technology Tsinghua University
Holistic-based methods, especially principal component analysis(PCA) and linear discriminant analysis(LDA), are very popularly used in face recognition. In last several years, the direct LDA(D-LDA) method was suggeste... 详细信息
来源: 评论
A Real-time Face Recognition system based on BDPCA plus BDDLDA
A Real-time Face Recognition System based on BDPCA plus BDDL...
收藏 引用
2011 2nd International Conference on Challenges in Environmental science and computer Engineering (CESCE 2011)
作者: Jing Li Zehong Yang Yixu Song Quan Yang Fangwen Zhai State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University
Holistic-based methods, especially principal component analysis(PCA) and linear discriminant analysis(LDA), are very popularly used in face recognition. In last several years, the direct LDA(D-LDA) method was suggeste... 详细信息
来源: 评论
Genetic algorithm-based power management in cloud platform
Genetic algorithm-based power management in cloud platform
收藏 引用
International Conference on Internet technology and Applications
作者: Xiong, Zili Zhang, Zhang Kong, Huafeng Zou, Deqing School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China Key Laboratory of Information Network Security Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai 201204 China
Cloud computing is a novel computing pattern, and it can provide underlying hardware resource for cloud users on demand. Virtualization is the key technology of cloud computing, and it provides the technical support f... 详细信息
来源: 评论
Directional diagnosis for wireless sensor networks
Directional diagnosis for wireless sensor networks
收藏 引用
International Conference on Distributed Computing in Sensor systems (DCOSS)
作者: Wei Gong Kebin Liu Yunhao Liu Xibin Zhao Ming Gu Tsinghua University Beijing Beijing CN Department of Computer Science Hong Kong University of Science and Technology Hong Kong China Key Laboratory of Information System Security of Ministry of Education TNLIST School of Software Tsinghua University China
Network diagnosis is crucial in managing a wireless sensor network (WSN) since many network-related faults, such as node and link failures, can easily happen. Diagnosis tools usually consist of two key components, inf... 详细信息
来源: 评论
SWP2P: P2P anonymous trace system based on superposition watermarking
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2011年 第8期5卷 116-126页
作者: Wang, Xiaoliang Sun, Xingming Yang, Hengfu Shah, Saeed Arif College of Information Engineering Xiangtan University Xiangtan 411105 China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjin 210044 China Department of Information Science and Engineering Hunan First Normal University Changsha 410205 China Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous a... 详细信息
来源: 评论
An anonymity and authentication mechanism for internet of things
收藏 引用
Journal of Convergence information technology 2011年 第3期6卷 98-105页
作者: Wang, Xiaoliang Sun, Xingming Yang, Hengfu Shah, Saeed Arif College of Information Engineering Xiangtan University Xiangtan 411105 China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjin 210044 China Department of Information Science and Engineering Hunan First Normal University Changsha 410205 China Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy... 详细信息
来源: 评论
Any 2⊗n subspace is locally distinguishable
收藏 引用
Physical Review A 2011年 第1期84卷 012304-012304页
作者: Nengkun Yu Runyao Duan Mingsheng Ying []State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing 100084 China and Centre for Quantum Computation and Intelligent Systems (QCIS) Faculty of Engineering and Information Technology University of Technology Sydney NSW 2007 Australia
A subspace of a multipartite Hilbert space is said to be locally indistinguishable if any orthonormal basis of this subspace cannot be perfectly distinguished by local operations and classical communication. Previousl... 详细信息
来源: 评论
Torus/torus intersection
收藏 引用
computer-Aided Design and Applications 2011年 第3期8卷 465-477页
作者: Liu, Xiao-Ming Liu, Chang-Yuan Yong, Jun-Hai Paul, Jean-Claude Tsinghua University Beijing China Command and Engineering College of Chemical Defense Beijing China Key Laboratory for Information System Security Ministry of Education Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China INRIA France
This paper presents a new algorithm for torus/torus intersection. The pre-image of the intersection in the parametric space of one torus is represented by an implicit equation. The pre-image is divided into one-valued... 详细信息
来源: 评论
AADL-based Modeling and TPN-based Verification of Reconfiguration in Integrated Modular Avionics
AADL-based Modeling and TPN-based Verification of Reconfigur...
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: Dajiang Suo Jinxia An Jihong Zhu State Key Laboratory on Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing China
This paper seeks to model the Integrated Modular Avionics (IMA) using Architectural Analysis and Design Language (AADL). In particular, the mechanism to describe the dynamic reconfiguration of multimodal system is pre... 详细信息
来源: 评论