咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3421-3430 订阅
排序:
A privacy-preserving mutual authentication protocol for vehicle Ad Hoc networks
收藏 引用
Journal of Convergence information technology 2010年 第7期5卷 24-24页
作者: Tan, Zuowen Department of Computer Science and Technology School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
Recently, Jung et al. proposed a robust conditional privacy-preserving authentication protocol in vehicle ad-hoc networks. However, Jung et al.'s authentication protocol cannot provide unlinkage and mutual authent... 详细信息
来源: 评论
An associative memory system for incremental learning and temporal sequence
An associative memory system for incremental learning and te...
收藏 引用
2010 6th IEEE World Congress on Computational Intelligence, WCCI 2010 - 2010 International Joint Conference on Neural Networks, IJCNN 2010
作者: Shen, Furao Yu, Hui Kasai, Wataru Hasegawa, Osamu State Key Laboratory for Novel Software Technology Jiangyin Information Technology Research Institute Nanjing University Nanjing 210093 China Department of Computer Intelligence and Systems Science Tokyo Institute of Technology Yokohama 226-8503 Japan Imaging Science and Engineering Lab. Tokyo Institute of Technology R2-52 4259 Nagatsuda Midori-ku Yokohama 226-8503 Japan
An associative memory (AM) system is proposed to realize incremental learning and temporal sequence learning. The proposed system is constructed with three layer networks: The input layer inputs key vectors, response ... 详细信息
来源: 评论
Analyzing Real-time Schedulability of Resource-oriented Distributed Real-time Embedded Software
Analyzing Real-time Schedulability of Resource-oriented Dist...
收藏 引用
2010 2nd IEEE International Conference on information Management and Engineering(2010年IEEE第二届信息管理与工程国际会议 IEEE ICIME 2010)
作者: Liqiong Chen Yunxiang Liu Guisheng Fan Department of Computer Science and Information EngineeringShanghai Institute of Technology Shanghai Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 201112 China Departme
As computer systems become increasingly internetworked, Distributed Realtime Embedded (DRE) software is becoming increasingly common and important, a challenging problem faced by researchers and developers of DRE soft... 详细信息
来源: 评论
Reduction Criteria for Probabilistic Models with Spatial Restrictions on States
Reduction Criteria for Probabilistic Models with Spatial Res...
收藏 引用
International Conference on Networks security, Wireless Communications and Trusted Computing, NSWCTC
作者: Niu Jun Guosun Zeng Embedded System and Service Computing Key Laboratory Ministry of Education Shanghai China College of Information Engineering Zhejiang Business and Technology Institute Ningbo China Department of Computer Science and Technology University of Tongji Shanghai China
Partial order reduction techniques have been used to combat the state explosion problem in model checking procedures for concurrent systems with probabilistic behaviors. There are some results that give criteria on ap... 详细信息
来源: 评论
A Generalized Model with Spatial Resources Labels
A Generalized Model with Spatial Resources Labels
收藏 引用
International Conference on Biomedical Engineering and computer science (ICBECS)
作者: Niu Jun Guosun Zeng Embedded System and Service Computing Key Laboratory Ministry of Education Shanghai China College of Information Engineering Zhejiang Business and Technology Institute Ningbo China Department of Computer Science and Technology University of Tongji Shanghai China
This paper proposes a generalized model by extending Markov chain with spatial resources labels, which can describe the functional and performance properties and some basic characteristics such as nondeterminacy and r... 详细信息
来源: 评论
Hybrid state space and echo state networks model of a miniature helicopter
Hybrid state space and echo state networks model of a miniat...
收藏 引用
作者: Tan, Li Song, Yixu Jia, Peifa State Key Laboratory of Intelligent Technology and Systems Department of Computer Science and Technology Tsinghua University Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing 100084 China
To solve the problem of modeling the horizontal translational motion of a Raptor 30 based miniature helicopter near hovering, a black-box model is built based on echo state networks. Combined with a state space angula... 详细信息
来源: 评论
QoS Requirement Generation and Algorithm Selection for Composite Service Based on Reference Vector
收藏 引用
Journal of computer science & technology 2009年 第2期24卷 357-372页
作者: 吴邦欲 支志雄 徐世杰 顾明 孙家广 School of Software Tsinghua University Key Laboratory for Information System Security Ministry of Education of China Department of Computer Science and Technology Tsinghua University
Under SOA (Service-Oriented Architecture), composite service is formed by aggregating multiple component services together in a given workflow. One key criterion of this research topic is QoS composition. Most work ... 详细信息
来源: 评论
Hierarchical Certificateless Signatures
Hierarchical Certificateless Signatures
收藏 引用
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC
作者: Lei Zhang Qianhong Wu Josep Domingo-Ferrer Bo Qin UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain School of Computer Key Laboratory of AeroSpace Information Security and Trusted Computing Wuhan University of Technology China School of Science Department of Maths Xi'an University of Technology China
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In... 详细信息
来源: 评论
Distributed Fault Detection for Wireless Sensor Based on Weighted Average
Distributed Fault Detection for Wireless Sensor Based on Wei...
收藏 引用
International Conference on Networks security, Wireless Communications and Trusted Computing, NSWCTC
作者: Sai Ji Shen-fang Yuan Ting-huai Ma Chang Tan Aeronautic Science Key Laboratory for Smart Materials & Structures Nanjing University of Aeronautics and Astronautics Nanjing China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjing China
This paper presents a distributed fault detection algorithm for wireless sensor networks (WSNs) by exploring the weighted average value scheme. Considering the spatial correlations in WSNs, a faulty sensor can diagnos... 详细信息
来源: 评论
Authenticated Asymmetric Group key Agreement Protocol and Its Application
Authenticated Asymmetric Group Key Agreement Protocol and It...
收藏 引用
IEEE International Conference on Communications
作者: Lei Zhang Qianhong Wu Bo Qin Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain School of Computer Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education Wuhan University of China China School of Science Department of Maths Xi''an University of Technology China
A recent primitive known as asymmetric group key agreement allows a group of users to negotiate a common encryption key which is accessible to any entities while each user holds her respective secret decryption key. T... 详细信息
来源: 评论