咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3401-3410 订阅
排序:
A Hierarchical Image Annotation Method Based on SVM and Semi-supervised EM
收藏 引用
自动化学报 2010年 第7期36卷 960-967页
作者: GAO Yan-Yu YIN Yi-Xin UOZUMI Takashi School of Information Engineering University of Science and Technology Beijing Beijing 100083 P.R.China Key Laboratory of Advanced Control of Iron and Steel Process (Ministry of Education) University of Science and Technology Beijing Beijing 100083 P. R. China Department of Computer Science and Systems Engineering Muroran Institute of Technology Muroran 050- 8585 Japan
Automatic image annotation, which aims at automatically identifying and then assigning semantic keywords to the meaningful objects in a digital image, is not a very difficult task for human but has been regarded as a ... 详细信息
来源: 评论
Efficient hash chain traversal based on binary tree inorder traversal
Efficient hash chain traversal based on binary tree inorder ...
收藏 引用
2010 2nd Pacific-Asia Conference on Circuits, Communications and system, PACCS 2010
作者: Fu, Jian-Qing Wu, Chun-Ming Wu, Ji-Yi Fan, Rong Ping, Ling-Di College of Computer Science and Technology ZheJiang University Hangzhou 310027 China Key Laboratory of Electronic Commerce and Information Security Hangzhou Normal University Hangzhou 310036 China
This paper presents an algorithm to improve the time and spacc complexity of reverse hash chain traversal. Mapping the traversing of a reverse hash chain to the inorder traversing of a binary tree, the proposed algori... 详细信息
来源: 评论
Availability based trust model of clusters for MANET
Availability based trust model of clusters for MANET
收藏 引用
International Conference on Services systems and Services Management, ICSSSM
作者: Xibin Zhao Zhiyang You Zhifeng Zhao Danning Chen Feng Peng Key Laboratory of Information System Security of Ministry of Education School of Software Tsinghua University China Department of Computer Science and Technology Tsinghua University China Zhenjiang Watercraft College Department of Computer Science Zhenjiang Watercraft College China School of Software Tsinghua University China China Minzu Securities Company Limited China
MANET (Mobile ad hoc network) is vulnerable to security attack due to its characteristics such as open network environment, lack of centralized control, dynamic topology, and so on, while traditional security mechanis... 详细信息
来源: 评论
Investigation of the relation between acoustic features and articulation — An application to emotional speech analysis
Investigation of the relation between acoustic features and ...
收藏 引用
International Symposium on Chinese Spoken Language Processing
作者: Yongxin Wang Jianwu Dang Lianhong Cai School of Information Science Japan Advanced Institute of Science and Technology Ishikawa Japan State Key Laboratory on Intelligent Technology and Systems Tsinghua National Laboratory of Information Science and Technology(TNList) Department of Computer Science and Technology Tsinghua University Beijing China School of Computer Science and Technology Tianjin University TJU Tianjin China
In speech communication, humans are able to perceive not only the acoustic features but also the articulation state from speech sounds. Some specific articulation configurations can carry certain non-linguistic inform... 详细信息
来源: 评论
A privacy-preserving mutual authentication protocol for vehicle Ad Hoc networks
收藏 引用
Journal of Convergence information technology 2010年 第7期5卷 24-24页
作者: Tan, Zuowen Department of Computer Science and Technology School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
Recently, Jung et al. proposed a robust conditional privacy-preserving authentication protocol in vehicle ad-hoc networks. However, Jung et al.'s authentication protocol cannot provide unlinkage and mutual authent... 详细信息
来源: 评论
An associative memory system for incremental learning and temporal sequence
An associative memory system for incremental learning and te...
收藏 引用
2010 6th IEEE World Congress on Computational Intelligence, WCCI 2010 - 2010 International Joint Conference on Neural Networks, IJCNN 2010
作者: Shen, Furao Yu, Hui Kasai, Wataru Hasegawa, Osamu State Key Laboratory for Novel Software Technology Jiangyin Information Technology Research Institute Nanjing University Nanjing 210093 China Department of Computer Intelligence and Systems Science Tokyo Institute of Technology Yokohama 226-8503 Japan Imaging Science and Engineering Lab. Tokyo Institute of Technology R2-52 4259 Nagatsuda Midori-ku Yokohama 226-8503 Japan
An associative memory (AM) system is proposed to realize incremental learning and temporal sequence learning. The proposed system is constructed with three layer networks: The input layer inputs key vectors, response ... 详细信息
来源: 评论
Analyzing Real-time Schedulability of Resource-oriented Distributed Real-time Embedded Software
Analyzing Real-time Schedulability of Resource-oriented Dist...
收藏 引用
2010 2nd IEEE International Conference on information Management and Engineering(2010年IEEE第二届信息管理与工程国际会议 IEEE ICIME 2010)
作者: Liqiong Chen Yunxiang Liu Guisheng Fan Department of Computer Science and Information EngineeringShanghai Institute of Technology Shanghai Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 201112 China Departme
As computer systems become increasingly internetworked, Distributed Realtime Embedded (DRE) software is becoming increasingly common and important, a challenging problem faced by researchers and developers of DRE soft... 详细信息
来源: 评论
Reduction Criteria for Probabilistic Models with Spatial Restrictions on States
Reduction Criteria for Probabilistic Models with Spatial Res...
收藏 引用
International Conference on Networks security, Wireless Communications and Trusted Computing, NSWCTC
作者: Niu Jun Guosun Zeng Embedded System and Service Computing Key Laboratory Ministry of Education Shanghai China College of Information Engineering Zhejiang Business and Technology Institute Ningbo China Department of Computer Science and Technology University of Tongji Shanghai China
Partial order reduction techniques have been used to combat the state explosion problem in model checking procedures for concurrent systems with probabilistic behaviors. There are some results that give criteria on ap... 详细信息
来源: 评论
A Generalized Model with Spatial Resources Labels
A Generalized Model with Spatial Resources Labels
收藏 引用
International Conference on Biomedical Engineering and computer science (ICBECS)
作者: Niu Jun Guosun Zeng Embedded System and Service Computing Key Laboratory Ministry of Education Shanghai China College of Information Engineering Zhejiang Business and Technology Institute Ningbo China Department of Computer Science and Technology University of Tongji Shanghai China
This paper proposes a generalized model by extending Markov chain with spatial resources labels, which can describe the functional and performance properties and some basic characteristics such as nondeterminacy and r... 详细信息
来源: 评论
Hybrid state space and echo state networks model of a miniature helicopter
Hybrid state space and echo state networks model of a miniat...
收藏 引用
作者: Tan, Li Song, Yixu Jia, Peifa State Key Laboratory of Intelligent Technology and Systems Department of Computer Science and Technology Tsinghua University Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing 100084 China
To solve the problem of modeling the horizontal translational motion of a Raptor 30 based miniature helicopter near hovering, a black-box model is built based on echo state networks. Combined with a state space angula... 详细信息
来源: 评论