咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是3301-3310 订阅
排序:
A Survey of Game Theory in Wireless Sensor Networks security
收藏 引用
Journal of Networks 2011年 第3期6卷 521-532页
作者: Shen, Shigen Yue, Guangxue Cao, Qiying Yu, Fei College of Information Science and Technology Donghua University Shanghai China College of Mathematics and Information Engineering Jiaxing University Jiaxing China College of Computer and Communication Hunan University Changsha China Department of Computer Science and Technology Huaihua University Huaihua China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
Wireless Sensor Networks (WSNs) are becoming an integral part of our lives. There are not widespread applications of WSNs without ensuring WSNs security. Due to the limited capabilities of sensor nodes in terms of com... 详细信息
来源: 评论
Compatibility of photographed images with touch-based fingerprint verification software
Compatibility of photographed images with touch-based finger...
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Fengling Han Jiankun Hu Mohammed Alkhathami Kai Xi State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University China School of Computer Science & IT Royal Melbourne Institute of Technology Melbourne VIC Australia School of Engineering and Information Technology University of New South Wales Canberra ACT Australia
In this paper, the compatibility of fingerprint images captured with mobile cameras (touch-less) with existing touch-based commercial fingerprint verification software VeriFinger SDK is investigated. The touch-less fi... 详细信息
来源: 评论
Multi-User Private keyword Search for Cloud Computing
Multi-User Private Keyword Search for Cloud Computing
收藏 引用
IEEE International Conference on Cloud Computing technology and science (CloudCom)
作者: Yanjiang Yang Haibing Lu Jian Weng Institute for Infocomm Research Singapore Department of Operations Management and Information Systems The Leavey School of Business Santa Clara University USA State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Department of Computer Science and Emergency Technology Research Center of Risk Department of Computer Science and Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
Homomorphic Linear Authentication Schemes for Proofs of Retrievability
Homomorphic Linear Authentication Schemes for Proofs of Retr...
收藏 引用
International Conference on Intelligent Networking and Collaborative systems (INCOS)
作者: Shengli Liu Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China
In a proof of retrievability (POR) system, interactive POR protocols are executed between a storage server and clients, so that clients can be convinced that their data is available at the storage server, ready to be ... 详细信息
来源: 评论
Proving Computational Geometry Algorithms in TLA+2
Proving Computational Geometry Algorithms in TLA+2
收藏 引用
Theoretical Aspects of Software Engineering (TASE)
作者: Hui Kong Hehua Zhang Xiaoyu Song Ming Gu Jiaguang Sun Key Laboratory for Information System Security Ministry of Education China DepartmentCST Tsinghua Unviersity Beijing China Tsinghua National Laboratory for Information Science and Technology China School of Software Tsinghua University Beijing China DepartmentECE Portland State University OR USA
Geometric algorithms are widely used in many scientific fields like computer vision, computer graphics. To guarantee the correctness of these algorithms, it's important to apply formal method to them. In this pape... 详细信息
来源: 评论
Parallel Spatial Hashing for Collision Detection of Deformable Surfaces
Parallel Spatial Hashing for Collision Detection of Deformab...
收藏 引用
IEEE International Conference on computer-Aided Design and computer Graphics
作者: Wenshan Fan Bin Wang Jianliang Zhou Jiaguang Sun Tsinghua University Beijing Beijing CN Key Laboratory for Information System Security Ministry of Education of China China School of Software Tsinghua University China Tsinghua National Laboratory for Information Science and Technology China Beijing AeroSpace Control Center China
We present a fast collision detection method for deformable surfaces with parallel spatial hashing on GPU architecture. The efficient update and access of the uniform grid are exploited to accelerate the performance i... 详细信息
来源: 评论
A no-reference image quality evaluation based on power spectrum
A no-reference image quality evaluation based on power spect...
收藏 引用
3DTV Conference
作者: Yan Zhang Ping An Qiuwen Zhang Liquan Shen Zhaoyang Zhang School of Communication and Information Engineering Shanghai University China Department of Computer Science and Technology Anhui University of Finance and Economics China Key Laboratory of Advanced Displays and System Application Ministry of Education China
No-reference quality evaluation is more difficult because it does not refer to any image. However, in some cases, like virtual view images, can not find the reference image, no-reference method had to be used. With th... 详细信息
来源: 评论
Improved multi-view depth estimation for view synthesis in 3D video coding
Improved multi-view depth estimation for view synthesis in 3...
收藏 引用
3DTV Conference
作者: Qiuwen Zhang Ping An Yan Zhang Liquan Shen Zhaoyang Zhang School of Communication and Information Engineering Shanghai University China Key Laboratory of Advanced Displays and System Application Ministry of Education China Department of Computer Science and Technology Anhui University of Finance and Economics China
Multi-view depth estimation is an important part in the virtual view synthesis and depth map coding within the 3DV/FTV applications. However, existing depth estimation methods generally have difficulty to generate goo... 详细信息
来源: 评论
Any 2⊗n subspace is locally distinguishable
收藏 引用
Physical Review A 2011年 第1期84卷 012304-012304页
作者: Nengkun Yu Runyao Duan Mingsheng Ying State Key Laboratory of Intelligent Technology and Systems Department of Computer Science and Technology Tsinghua University Beijing 100084 China Centre for Quantum Computation and Intelligent Systems (QCIS) Faculty of Engineering and Information Technology University of Technology Sydney NSW 2007 Australia
A subspace of a multipartite Hilbert space is said to be locally indistinguishable if any orthonormal basis of this subspace cannot be perfectly distinguished by local operations and classical communication. Previousl...
来源: 评论
Efficient rendering distortion estimation for depth map compression
Efficient rendering distortion estimation for depth map comp...
收藏 引用
IEEE International Conference on Image Processing
作者: Qiuwen Zhang Ping An Yan Zhang Zhaoyang Zhang School of Communication and Information Engineering Shanghai University China Key Laboratory of Advanced Displays and System Application Ministry of Education China Department of Computer Science and Technology Anhui University of Finance and Economics China
A depth map represents three-dimensional (3D) scene information and is used to synthesize virtual views in 3D video. Since the quality of synthesized virtual views highly depends on the quality of depth map, efficient... 详细信息
来源: 评论