咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3311-3320 订阅
排序:
Adaptively secure identity-based encryption in the anonymous communication
收藏 引用
ICIC Express Letters 2011年 第9 A期5卷 3209-3215页
作者: Zhang, Leyou Wu, Qing Hu, Yupu Department of Mathematical Science Xidian University No. 2 South Taibai Road Xi'an 710071 China School of Automation Xi'an Institute of Posts and Telecommunications No. 563 Chang'an South Road Xi'an 710121 China Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University No. 2 South Taibai Road Xi'an 710071 China
A new construction of the anonymous identity-based encryption is proposed. The new scheme has the exciting features over the availables, such as short public keys and private keys, constant size ciphertexts and low co... 详细信息
来源: 评论
Trainbow: a new trusted virtual machine based platform
收藏 引用
中国高等学校学术文摘·计算机科学 2010年 第1期4卷 47-64页
作者: Yuzhong SUN Yongbing HUANG Yunwei GAO Haifeng FANG Ying SONG Lei DU Kai ZHANG Hongyong ZANG Yaqiong LI Yajun YANG Ran AO Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an 710049China Key Laboratory of Computer System and Architecture Institute of Computing TechnologyChinese Academy of Sciences Beijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity and data security of cloud computing... 详细信息
来源: 评论
Case-based safety assessment of thermal power plants: A framework
Case-based safety assessment of thermal power plants: A fram...
收藏 引用
International Conference on Business Management and Electronic information (BMEI)
作者: Changyong Liang Dongxiao Gu Isabelle Bichindaritz Chunrong Zuo Fei Cheng School of Management Hefei University of Technology Hefei Anhui China Research Center of Intelligent Decision Making and Information System Technologies Ministry of Education of China Hefei Anhui China Department of Computer Science University of Illinois Chicago Chicago IL USA Key Laboratory of Process Optimization and Intelligent Decision-making Ministry of Education of China Hefei Anhui China Institute of Technology University of Washington Tacoma WA USA
security assessment of Thermal Power Plants (TPPs) is one of the important means to guarantee the safety of production in thermal power production enterprises. Essentially, the evaluation of power plant systems relies... 详细信息
来源: 评论
Novel 64×2.5 Gb/s all-optical OFDM symbol generator based on triangle waveform driving-LiNbO_3 modulators
收藏 引用
Chinese Optics Letters 2010年 第5期8卷 449-453页
作者: 李源 李蔚 梁晓军 杨克成 乔耀军 Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Department of Computer Science and Technology Central China Normal University Key Laboratory of Information Photonics and Optical Communications Ministry of EducationBeijing University of Posts and Telecommunications
We propose a novel and simple all-optical 160-Gb/s orthogonal frequency division multiplexing(OFDM) symbol generator which is based on discrete triangle waveform driving-LiNbO_3 modulators to realize large-range lin... 详细信息
来源: 评论
Large-scale network topology generation for emulation environment
Large-scale network topology generation for emulation enviro...
收藏 引用
1st International Conference on Networking and Distributed Computing, ICNDC 2010
作者: Kuang, Xiao-Hui Huang, Min-Huan Che, Yong-Gang Jin, Li Fei, Xu National Key Laboratory of Science and Technology on Information System Security Beijing Institute of System and Engineering Beijing China Department of Computer Science and Technology Tsinghua University Beijing China National Laboratory for Parallel and Distributed Process National University of Defense Technology Changsha China
Network emulation environment is great importance to the research of network protocols, applications and security mechanism. Large-scale network topology generation is one of key technologies to construct network emul... 详细信息
来源: 评论
An extraction method of road structure for surveillance Video
An extraction method of road structure for surveillance Vide...
收藏 引用
11th International Conference of Chinese Transportation Professionals: Towards Sustainable Transportation systems, ICCTP 2011
作者: Luo, Dong-Hua Zhao, Jian-Hua Li, Xi-Ying Wang, Zhen-Bo School of Information Sciences and Technology Sun Yat-sen University Guangzhou Higher Education Mega Center No. 132 East Outer Ring Road Guangzhou 510006 China Traffic Management Bureau Guangdong Provincial Public Security Department NO.388 Jianpeng Road Baiyun District Guangzhou 510440 China School of Engineering Sun Yat-sen University Guangzhou Higher Education Mega Center No.132 East Outer Ring Road Guangzhou 510006 China Guangdong Provincial Key Laboratory of Intelligent Transportation System Building 312 NO.135 West Xingang Road Guangzhou 510275 China
The scene of surveillance video is usually wide and variable, and the target vehicles inside it are often small. Surveillance videos usually are not suitable for intelligent video applications, such as video vehicle d... 详细信息
来源: 评论
Phosphor: A cloud based DRM scheme with sim card
Phosphor: A cloud based DRM scheme with sim card
收藏 引用
12th International Asia Pacific Web Conference, APWeb 2010
作者: Zou, Peng Wang, Chaokun Liu, Zhang Bao, Dalei School of Software Tsinghua University Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security Ministry of Education China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
As 3G networks provide enhanced capabilities of data transportation, a considerable amount of mobile applications and services, which involve mass of unstructured digital contents, e.g., video and audio, are available... 详细信息
来源: 评论
Hybrid network worm emulation and analysis
Hybrid network worm emulation and analysis
收藏 引用
International Forum on information technology and Applications
作者: Xiaohui, Kuang MinHuan, Huang Yan, Wen Fei, Xu National Key Laboratory of Science and Technology on Information System Security Beijing Institute of System Engineering Beijing 100101 China Department of Testing and Command Academy of Equipment Command and Technology Beijing 101400 China Department of Computer Science and Technology Tshinghua University Beijing 100084 China
The worm experimental environment is the pivotal foundation for the worm research. Existing methods to build the environment can be classified into three categories: mathematical modeling, simulation and emulation. Ho... 详细信息
来源: 评论
Research on adaptive strategy for end-hopping system
收藏 引用
Tongxin Xuebao/Journal on Communications 2011年 第11 A期32卷 51-57页
作者: Zhao, Chun-Lei Jia, Chun-Fu Weng, Chen Lin, Kai College of Information Technical Science Nankai University Tianjin 300071 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300384 China Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China
An adaptive strategy was proposed for EH system. Modules of attack detection, feedback transmission and adaptive control were added to original EH system. They could help to make threats analysis and adjust hopping st... 详细信息
来源: 评论
A face-based shape matching method for IGES surface model
A face-based shape matching method for IGES surface model
收藏 引用
International Conference on Shape Modeling and Applications - Shape Modeling International Conference, SMI 2010
作者: Hu, Kai-Mo Wang, Bin Gao, Yi Yuan, Qi-Ming Yong, Jun-Hai School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
IGES is a widely used standard for mechanical data exchange. In this paper, we present a new method for the retrieval task of IGES surface model. Based on this method, a novel distinctive face selection strategy is pr... 详细信息
来源: 评论