咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3261-3270 订阅
排序:
Visual saliency detection by spatially weighted dissimilarity
Visual saliency detection by spatially weighted dissimilarit...
收藏 引用
作者: Duan, Lijuan Wu, Chunpeng Miao, Jun Qing, Laiyun Fu, Yu College of Computer Science and Technology Beijing University of Technology Beijing 100124 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China School of Information Science and Engineering Graduate University Chinese Academy of Sciences Beijing 100049 China Department of Computing University of Surrey Guildford Surrey GU2 7XH United Kingdom
In this paper, a new visual saliency detection method is proposed based on the spatially weighted dissimilarity. We measured the saliency by integrating three elements as follows: the dissimilarities between image pat... 详细信息
来源: 评论
Network survivability against region failure
Network survivability against region failure
收藏 引用
IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)
作者: Ran Li Xiaoliang Wang Xiaohong Jiang Department of Commanding Information System Xian Communication Institute Shaanxi China State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University China Future University Hakodate Hokkaido Japan
Communication networks are now facing more and more potential large scale region threats such as natural disaster and physical attack. Under such region failure scenarios, numerous network elements within a geographic... 详细信息
来源: 评论
Histogram-based image hashing for searching content-preserving copies
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2011年 6730 LNCS卷 83-108页
作者: Xiang, Shijun Kim, Hyoung Joong Department of Electronic Engineering School of Information Science and Technology Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China CIST Graduate School of Information Management and Security Korea University Seoul Korea Republic of
Image hashing as a compact abstract can be used for content search. Towards this end, a desired image hashing function should be resistant to those content-preserving manipulations (including additive-noise like proce... 详细信息
来源: 评论
Circle Text Expansion as Low-Rank Textures
Circle Text Expansion as Low-Rank Textures
收藏 引用
International Conference on Document Analysis and Recognition
作者: Xin Zhang Fuchun Sun Department of Computer Science and Technology State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Tsinghua University Beijing China
Circle ring aligned text is very common in our daily life, such as university logo, advertisement, there are quite few methods to expand the circle text which will greatly improve the working range of optical characte... 详细信息
来源: 评论
Time Petri net model with mixed semantics
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2011年 第6期22卷 1199-1209页
作者: Pan, Li Ding, Zhi-Jun Guo, Guan-Qi School of Information and Communication Engineering Hu'nan Institute of Science and Technology Yueyang 414006 China Department of Computer Science and Technology Tongji University Shanghai 200092 China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China
This paper presents a time Petri net (TPN) model with mixed semantics that efficiently addresses the schedulability analysis problem of the existing semantics models. The proposed model associates each firable transit... 详细信息
来源: 评论
Network dividing for mapping problem of large scale emulation network
收藏 引用
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications 2011年 第SUPPL.期34卷 104-108页
作者: Huang, Min-Huan Zhang, Yao-Xue Tang, Hong Kuang, Xiao-Hui Department of Computer Science and Technology Tsinghua University Beijing 100084 China Science and Technology on Information System Security Laboratory Beijing 100101 China
Mapping of the large scale emulation network topology to the physical devices of network testbed automatically is an non-deterministic polynomial hard problem because the best solution of network dividing is un-resolv... 详细信息
来源: 评论
A Survey of Game Theory in Wireless Sensor Networks security
收藏 引用
Journal of Networks 2011年 第3期6卷 521-532页
作者: Shen, Shigen Yue, Guangxue Cao, Qiying Yu, Fei College of Information Science and Technology Donghua University Shanghai China College of Mathematics and Information Engineering Jiaxing University Jiaxing China College of Computer and Communication Hunan University Changsha China Department of Computer Science and Technology Huaihua University Huaihua China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
Wireless Sensor Networks (WSNs) are becoming an integral part of our lives. There are not widespread applications of WSNs without ensuring WSNs security. Due to the limited capabilities of sensor nodes in terms of com... 详细信息
来源: 评论
Compatibility of photographed images with touch-based fingerprint verification software
Compatibility of photographed images with touch-based finger...
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Fengling Han Jiankun Hu Mohammed Alkhathami Kai Xi State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University China School of Computer Science & IT Royal Melbourne Institute of Technology Melbourne VIC Australia School of Engineering and Information Technology University of New South Wales Canberra ACT Australia
In this paper, the compatibility of fingerprint images captured with mobile cameras (touch-less) with existing touch-based commercial fingerprint verification software VeriFinger SDK is investigated. The touch-less fi... 详细信息
来源: 评论
Multi-User Private keyword Search for Cloud Computing
Multi-User Private Keyword Search for Cloud Computing
收藏 引用
IEEE International Conference on Cloud Computing technology and science (CloudCom)
作者: Yanjiang Yang Haibing Lu Jian Weng Institute for Infocomm Research Singapore Department of Operations Management and Information Systems The Leavey School of Business Santa Clara University USA State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Department of Computer Science and Emergency Technology Research Center of Risk Department of Computer Science and Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
Homomorphic Linear Authentication Schemes for Proofs of Retrievability
Homomorphic Linear Authentication Schemes for Proofs of Retr...
收藏 引用
International Conference on Intelligent Networking and Collaborative systems (INCOS)
作者: Shengli Liu Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China
In a proof of retrievability (POR) system, interactive POR protocols are executed between a storage server and clients, so that clients can be convinced that their data is available at the storage server, ready to be ... 详细信息
来源: 评论