咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是3251-3260 订阅
排序:
Assessing network vulnerability under probabilistic region failure model
Assessing network vulnerability under probabilistic region f...
收藏 引用
International Conference on High Performance Switching and Routing
作者: Wang, Xiaoliang Jiang, Xiaohong Pattavina, Achille State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University China Future University Hakodate Hokkaido Japan Department of Electronics and Information Politecnico di Milano 20133 Milano Italy
The mission critical network infrastructures are facing potential large region threats, both intentional (like EMP attack, bomb explosion) and natural (like earthquake, flooding). The available research on region fail... 详细信息
来源: 评论
3DV quality model based depth maps for view synthesis in FTV system
收藏 引用
Journal of Shanghai University(English Edition) 2011年 第4期15卷 335-341页
作者: 张秋闻 安平 张艳 张兆杨 王元庆 Key Laboratory of Advanced Display and System Application (Shanghai University) Ministry of EducationShanghai 200072P.R.China School of Communication and Information Engineering Shanghai University Department of Computer Science and Technology Anhui University of Finance and EconomicsBengbu 230030AuhuiP.R.China Department of Electronics Science and Engineering Nanjing University
Depth maps are used for synthesis virtual view in free-viewpoint television (FTV) systems. When depth maps are derived using existing depth estimation methods, the depth distortions will cause undesirable artifacts ... 详细信息
来源: 评论
Automatic Generation of Canonical Views for CAD Models
Automatic Generation of Canonical Views for CAD Models
收藏 引用
IEEE International Conference on computer-Aided Design and computer Graphics
作者: Kaimo Hu Bin Wang Bin Yuan Junhai Yong Key Laboratory for Information System Security Ministry of Education Beijing China Department of Computer Science and Technology Tsinghua University Beijing China School of Software Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China
Selecting the best views for 3D objects is useful for many applications. However, with the existing methods applied in CAD models, the results neither exhibit the 3D structures of the models fairly nor conform to huma... 详细信息
来源: 评论
An Optimal Color Mapping Strategy Based on Energy Minimization for Time-Varying Data
An Optimal Color Mapping Strategy Based on Energy Minimizati...
收藏 引用
IEEE International Conference on computer-Aided Design and computer Graphics
作者: Yi Peng Jie Dong Li Chen Haiyang Chu Junhai Yong Key Laboratory for Information System Security Ministry of Education Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China School of Software Tsinghua University Beijing China
Color mapping plays a critical role in visualization of time-varying data and also sets a challenge for researchers due to the consistency of mapping and great changes in time-varying data. In order to solve this prob... 详细信息
来源: 评论
A Real-Time Face Recognition system Based on BDPCA Plus BDDLDA
收藏 引用
Procedia Environmental sciences 2011年 11卷 139-146页
作者: Jing Li Zehong Yang Yixu Song Quan Yang Fangwen Zhai State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing 100084 China
Holistic-based methods, especially principal component analysis(PCA) and linear discriminant analysis(LDA), are very popularly used in face recognition. In last several years, the direct LDA(D-LDA) method was suggeste... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing technology and science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
A Traffic congestion detection method for surveillance videos based on Macro optical flow Velocity
A Traffic congestion detection method for surveillance video...
收藏 引用
11th International Conference of Chinese Transportation Professionals: Towards Sustainable Transportation systems, ICCTP 2011
作者: Li, Xiying She, Yongye Yang, Guigen Zhao, Youting Luo, Donghua Guangdong Provincial Key Laboratory of Intelligent Transportation System School of Engineering Sun Yat-sen University Guangzhou 510006 China Traffic Management Bureau Guangdong Provincial Public Security Department Guangzhou 510440 China School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China
An intelligent and automatic traffic congestion detection method is proposed to reduce labor intensive monitoring work. The developed approach, applied on expressways, is to gather traffic congestion information using... 详细信息
来源: 评论
L-WMxD: Lexical based Webmail XSS Discoverer
L-WMxD: Lexical based Webmail XSS Discoverer
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Zhushou Tang Haojin Zhu Zhenfu Cao Shuai Zhao Department of Computer Science and Engineering Shanghai Jiaotong University China Key Laboratory of Information Network Security Ministry of Public Security China
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail... 详细信息
来源: 评论
Automatic object segmentation from large scale 3D urban point clouds through manifold embedded mode seeking  11
Automatic object segmentation from large scale 3D urban poin...
收藏 引用
19th ACM International Conference on Multimedia ACM Multimedia 2011, MM'11
作者: Yu, Zhiding Xu, Chunjing Liu, Jianzhuang Au, Oscar C. Tang, Xiaoou Shenzhen Key Laboratory for Computer Vision and Pattern Recognition Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong Department of Information Engineering Chinese University of Hong Kong Hong Kong
This paper presents a system that can automatically segment objects in large scale 3D point clouds obtained from urban ranging images. The system consists of three steps: The first one involves a ground detection proc... 详细信息
来源: 评论
Fuzzy H∞ filtering for nonlinear singularly perturbed systems with time-varying delay
Fuzzy H∞ filtering for nonlinear singularly perturbed syste...
收藏 引用
2011 8th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC'11
作者: Li, Yaping Chen, Jinxiang Meng, Lixia He, Meiyun Beijing Information Technology College Beijing 100015 China State Key Laboratory of Hybrid Process Industry Automation System and Equipment Technology Automation Research and Design Institute of Metallurgical Industry 100071 China Department of Computer Science and Technology Tsinghua University Army Aviation College Beijing 100084 China Department of Mechanism Army Aviation College Beijing 100123 China
This paper investigates the problem of designing fuzzy H∞ filter for a class of nonlinear singularly perturbed systems (SPSs) with time-varying delay in states. The considered system is approximated by a Takagi-Sugen... 详细信息
来源: 评论