咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3371-3380 订阅
排序:
Enhance information Flow Tracking with Function Recognition
收藏 引用
China Communications 2010年 第6期7卷 24-29页
作者: Zhou Kan Huang Shiqiu Huang Shan Qi Zhengwei Gu Jian Guan Haibing School of software Shanghai Jliao Tong University Shanghai 200240 P. R. China Key Lab of Information Network Security Ministry of Public Security Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai 200240 P. R China Shanghai Key Laboratory of Scalable Computing & System Shanghai P. R. China
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput... 详细信息
来源: 评论
Chain of trust testing based on model checking
Chain of trust testing based on model checking
收藏 引用
2nd International Conference on Networks security, Wireless Communications and Trusted Computing, NSWCTC 2010
作者: He, Fan Zhang, Huanguo Wang, Hong Xu, Mingdi Yan, Fei College of Computer Wuhan University Wuhan Hubei 430072 China College of Computer Wuhan University of Technology WuhanHubei430063 China Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wuhan 430072 China Department of Government Procurement WuhanHubei 430071 China
Trusted computing and chain of trust are the very mechanisms to solve the security problems of information system. A chain of trust is established by validating each component of hardware and software from the bottom ... 详细信息
来源: 评论
Efficient online trace building using code replication
Efficient online trace building using code replication
收藏 引用
International Conference on Grid and Cloud Computing
作者: Deng, Haipeng Chen, Kai Liu, Bo He, Yunchao Zhou, Kan Yang, Yindong Liang, Alei Guan, Haibing School of Software Shanghai Jiao Tong University China Department of Computer Science and Engineering Shanghai Jiao Tong University China School of Information Security Engineering Shanghai Jiao Tong University China Shanghai Key Laboratory of Scalable Computing and Systems China
Hot trace building plays an important role in enhancing the performance of dynamic binary translators, since in most cases 10% of code takes 90% of execution time of the whole program. Hot traces can promote the code ... 详细信息
来源: 评论
Analyzing and Correlating security Events Using State Machine
Analyzing and Correlating Security Events Using State Machin...
收藏 引用
International Conference on computer and information technology (CIT)
作者: Feng Xuewei Wang Dongxia Zeng Jiemei Ma Guoqing Li Jin National Key Laboratory of Science and Technology on Information System Security Beijing Institute Beijing China Beijing Aerospace Control Center Beijing China
It is unfeasible to analyze the security events by the manual way for the security manager, because the number of the events is huge and the information contained in the events is meaningless. After analyzing the exis... 详细信息
来源: 评论
A logic-based frame for knowledge reasoning in real-time security analysis
A logic-based frame for knowledge reasoning in real-time sec...
收藏 引用
2010 IEEE International Conference on Software Engineering and Service sciences, ICSESS 2010
作者: Li, Chaoming Wang, Kenwen Department of Computer Science Sun Yat-Sen University Guang Zhou China Key Laboratory of High Confidence Software Technologies Peking University Ministry of Education Beijing China Department of Information Technology Griffith University Brisbane Australia
Continuous time Markov chains (CTMCs) have been used in real-time dependability and security analysis. However, existing approaches assume that the system is fully observable to a system attacker, which is not feasibl... 详细信息
来源: 评论
Dynamic modeling and tracking control of fuel filled space robotic system with flexible manipulators
Dynamic modeling and tracking control of fuel filled space r...
收藏 引用
International Symposium on systems and Control in Aerospace and Astronautics (ISSCAA)
作者: Xinxin Yang Xiong Luo Fuchun Sun Fengge Wu Huaping Liu School of Information Engineering Key Laboratory of Advanced Control of Iron and Steel Process (Ministry of Education) University of Science and Technology Beijing Beijing China State Key Laboratory of Intelligent Technology and System Department of Computer Science and TechnologyTsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China
In recent years, dynamics model and control of space robot system are the hot topics in the research field. In this paper, a new dynamics model and control strategy of space robotic system with a flexible manipulator ... 详细信息
来源: 评论
Fuzzy dynamic characteristic modeling and intelligent adaptive control for complex spacecraft
Fuzzy dynamic characteristic modeling and intelligent adapti...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Xiong Luo Song Hu Zengqi Sun Xintao Qiu School of Information Engineering Key Laboratory of Advanced Control of Iron and Steel Process (Ministry of Education) University of Science and Technology Beijing Beijing China State Key Laboratory of Intelligent Technology and System Department of Computer Science and Technology Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China
Because of strong coupling, nonlinear, and time-varying characteristics, it is difficult to control complex spacecraft. By means of combining with controlled object dynamics and performance requirements, characteristi... 详细信息
来源: 评论
Notice of Retraction: Evolutionary algorithm for optimal visual coverage path in raster terrain
Notice of Retraction: Evolutionary algorithm for optimal vis...
收藏 引用
International Conference on computer science and information technology (CSIT)
作者: Jie Li Changwen Zheng Xiaohui Hu Department of Electronic Engineering and Information Science University of Science and Technology Hefei China National Key Laboratory of Integrated Information System Technology IS-CAS Beijing China
This article has been retracted by the publisher.
来源: 评论
The Transition Between Sharp and Rounded Features and the Manipulation of Incompatible Boundary in Filling n-sided Holes
The Transition Between Sharp and Rounded Features and the Ma...
收藏 引用
International Conference on Shape Modeling and Applications
作者: Kan-Le Shi Jun-Hai Yong Peng Liu Jia-Guang Sun Jean-Claude Paul Key Laboratory of Information System Security Ministry of Education of China Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China School of Software Tsinghua University Beijing China Tsinghua University Beijing Beijing CN INRIA France
N-sided hole filling plays an important role in vertex blending. Piegl and Tiller presented an algorithm to interpolate the given boundary and cross-boundary derivatives in B-spline form. To deal with the incompatible... 详细信息
来源: 评论
On Achieving Maximum Secure Throughput Using Network Coding Against Wiretap Attack
On Achieving Maximum Secure Throughput Using Network Coding ...
收藏 引用
IEEE International Conference on Distributed Computing systems
作者: Xiangmao Chang Jin Wang Jianping Wang Victor Lee Kejie Lu Yixian Yang Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Department of Computer Science University of Science and Technology of China Department of Computer Science City University of Hong Kong Department of Electrical and Computer Engineering University of Puerto Rico at Mayaguez
In recent years network coding has attracted significant attention in telecommunication. The benefits of network coding to a communication network include the increased throughput as well as secure data transmission. ... 详细信息
来源: 评论