咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3281-3290 订阅
排序:
Neurological rehabilitation of stroke patients via motor imaginary-based brain-computer interface technology
收藏 引用
Neural Regeneration Research 2011年 第28期6卷 2198-2202页
作者: Hongyu Sun Yang Xiang Mingdao Yang Department of Computer Science and Technology Tongji University Shanghai 201804 China College of Information and Electrical Engineering Shandong University of Science and Technology China Key Laboratory of Embedded System and Service Computing Ministry of Education of the People's Republic of China Tongji University Shanghai 201804 China Qingdao Economic & Technical Development Area First People's Hospital Qingdao 266555 Shangdong Province China
The present study utilized motor imaginary-based brain-computer interface technology combined with rehabilitation training in 20 stroke patients. Results from the Berg Balance Scale and the Holden Walking Classificati... 详细信息
来源: 评论
Assigning method for decision power based on linguisitc 2-tuple judgment matrices
Journal of Software
收藏 引用
Journal of Software 2011年 第3期6卷 508-515页
作者: Zhang, Xixiang Yue, Guangxue Zheng, Xiajie Yu, Fei Business School of Jiaxing University Jiaxing China Mathematics and Information Engineering School of Jiaxing University Jiaxing China Department of Computer Science and Technology Huaihua University Huaihua China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
Decision power is very important in group decision making, which effects the final decision making result. When there exists uncertainty in group decision making, it is easy for an expert to express his/her preference... 详细信息
来源: 评论
Case-based safety assessment of thermal power plants: A framework
Case-based safety assessment of thermal power plants: A fram...
收藏 引用
2011 International Conference on Business Management and Electronic information, BMEI 2011 - 2011 International Conference on Supernetworks and system Management, ICSSM 2011
作者: Liang, Changyong Gu, Dongxiao Bichindaritz, Isabelle Zuo, Chunrong Cheng, Fei School of Management Hefei University of Technology Hefei Anhui 230009 China Key Laboratory of Process Optimization Intelligent Decision-making of Ministry of Education of China Hefei Anhui 230009 China Institute of Technology University of Washington Tacoma WA 98402 United States Department of Computer Science University of Illinois at Chicago Chicago IL 60607 United States Research Center of Intelligent Decision Making Information System Technologies of Ministry of Education of China Hefei Anhui 230009 China
security assessment of Thermal Power Plants (TPPs) is one of the important means to guarantee the safety of production in thermal power production enterprises. Essentially, the evaluation of power plant systems relies... 详细信息
来源: 评论
Distributed Angle Estimation for Wireless Sensor Network Localization with Multipath Fading
Distributed Angle Estimation for Wireless Sensor Network Loc...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Weile Zhang Qinye Yin Hongyang Chen Wenjie Wang Tomoaki Ohtsuki MOE Key Laboratory for Intelligent Networks and Network Security Xi''an Jiaotong University Xi'an China Institute of Industrial Science University of Tokyo Tokyo Japan Department of Information and Computer Science Keio University Yokohama Japan
In this paper, we propose a distributed angle estimation method for wireless sensor network localization with multipath fading. The multiple antenna system is equipped at the anchor and the angle of departure (AOD) ca... 详细信息
来源: 评论
Secure identity-based threshold broadcast encryption in the standard model
收藏 引用
Journal of Networks 2011年 第11期6卷 1602-1609页
作者: Zhang, Leyou Wu, Qing Hu, Yupu Department of Mathematical Science Xidian University Xi'an 710071 China School of Automation Xi'an Institute of Posts and Telecommunications Xi'an China Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China
The general threshold broadcast encryption is not suitable for the networks with the constraints of computation and energy. In this paper, two constructions of the proper threshold broadcast encryption to these networ... 详细信息
来源: 评论
Smoothness in noise reduction of chaotic time series
Smoothness in noise reduction of chaotic time series
收藏 引用
2011 International Conference on computers, Communications, Control and Automation
作者: Chenxi Shao Jiangong Ji Jingyuan Shao Lipeng Xiao Department of Computer Science and Technology University of Science and Technology of China Department of Modern Physics and Nonlinear Science Center University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Information center Jianghuai Automobile Co.Ltd.
Noise is an omnipresent phenomenon. It obscures the real behavior of dynamical system. Lots of methods are proposed to remove the noise contaminating time series. However, almost all the methods consider the noise red... 详细信息
来源: 评论
Energy Optimal Selection of Access Points in Wireless Sensor Networks
Energy Optimal Selection of Access Points in Wireless Sensor...
收藏 引用
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Qin Xin Xiaolan Yao Wei He State Key Laboratory of Power Transmission Equipment & System Security and New Technology College of Electrical Engineering Chongqing University China Department of Applied Mathematics Universite Catholique de Louvain Louvain-la-Neuve Belgium School of Computer Science National University of Defense Technology Changsha China
In a Wireless Sensor Networks (WSN), there are normally one or several sensor nodes working as Access Points (AP), which are able to provide a relay for other sensors to an external Internet connection. Since WSNs are... 详细信息
来源: 评论
A Two-Layered Replica Management Method
A Two-Layered Replica Management Method
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Chuncong Xu Xiaomeng Huang Guangwen Yang Yang Zhou Department of Computer Science and Technology Tsinghua University Beijing China Ministry of Education Key Laboratory for Earth System Modeling Center of Earth System Science Institute for Global Change Studies Tsinghua University Beijing China ZTE Corporation Nanjing China
Replica management method has been widely used in distributed file system to improve parallelism and reliability. Traditional replica management method is synchronous replication management (SRM) which updates replica... 详细信息
来源: 评论
Knowledge Granulation in Interval-Valued information systems
Knowledge Granulation in Interval-Valued Information Systems
收藏 引用
International Workshop on Intelligent systems and Applications, ISA
作者: Nan Zhang Duoqian Miao Can Gao Department of Computer Science and Technology University of Tongji Shanghai China Department of Electrical and Computer Engineering University of Alberta Edmonton AB Canada Key Laboratory of Embedded System and Service Computing of Ministry of Education University of Tongji Shanghai China
Rough set theory, proposed by Pawlak, has been proved to be a mathematical tool to deal with vagueness and uncertainty in intelligent information processing. In this paper, we propose the concept of knowledge granulat... 详细信息
来源: 评论
A Multi-Hop Privacy-Preserving Reputation Scheme in Online Social Networks
A Multi-Hop Privacy-Preserving Reputation Scheme in Online S...
收藏 引用
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
作者: Linke Guo Xiaoyan Zhu Chi Zhang Yuguang Fang Department of Electrical and Computer Engineering University of Florida Gainesville FL USA National Key Laboratory of Integrated Services Networks Xidian University Xi'an China School of Information Science and Technology University of Science and Technology Hefei China
Online Social Networks (OSNs) are becoming immensely popular nowadays, and they change the ways people think and live. In this paper, we propose a novel reputation system which allows users to find potential connectio... 详细信息
来源: 评论