咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3471-3480 订阅
排序:
An Improved Genetic Algorithm for Solving Conic Fitting Problems
An Improved Genetic Algorithm for Solving Conic Fitting Prob...
收藏 引用
computer science and information Engineering, CSIE, WRI World Congress on FLAGGED
作者: Song Gao Chunping Li Computer Science and Technology Department Key Laboratory of Information System Security Tsinghua University China School of Software Key Laboratory of Information System Security Tsinghua University China
This paper presents an improved genetic algorithm for solving conic fitting problem. We first use several parallel small-populations genetic algorithms to obtain initial population, which has better average fitness. T... 详细信息
来源: 评论
Complex Network Model for Software system and Complexity Measurement
Complex Network Model for Software System and Complexity Mea...
收藏 引用
computer science and information Engineering, CSIE, WRI World Congress on FLAGGED
作者: Song Gao Chunping Li Computer Science and Technology Department Key Laboratory of Information System Security Tsinghua University China School of Software Key Laboratory of Information System Security Tsinghua University China
This paper proposes a new method for measuring the complexity of software systems based on complex network theory. We first construct the complex network model for software system. Then, the complexity of a homogeneou... 详细信息
来源: 评论
GMW sequences over Galois rings and their linear complexities
收藏 引用
Frontiers of Electrical and Electronic Engineering in China 2009年 第2期4卷 141-144页
作者: Nigang SUN Lei HU Department of Computer Science and Engineering East China University of Science and TechnologyShanghai 200237China State Key Laboratory of Information Security Graduate University of Chinese Academy of SciencesBeijing 100049China
A new family of GMW sequences over an arbitrary Galois ring was defined by using the trace functions and *** generalizes the concept of GMW sequences over finite *** the Fourier representation,we derived an estimate o... 详细信息
来源: 评论
New cryptanalysis of block ciphers with low algebraic degree
New cryptanalysis of block ciphers with low algebraic degree
收藏 引用
16th International Workshop on Fast Software Encryption, FSE 2009
作者: Sun, Bing Qu, Longjiang Li, Chao Department of Mathematics and System Science Science College National University of Defense Technology Changsha 410073 China State Key Laboratory of Information Security Graduate University Chinese Academy of Sciences 10039 China
Improved interpolation attack and new integral attack are proposed in this paper, and they can be applied to block ciphers using round functions with low algebraic degree. In the new attacks, we can determine not only... 详细信息
来源: 评论
Democratic Group Signatures with Threshold Traceability
收藏 引用
Journal of Shanghai Jiaotong university(science) 2009年 第1期14卷 98-101页
作者: 李祥学 钱海峰 李建华 School of Information Security Engineering Shanghai Jiaotong UniversityShanghai 200240China State Key Lab of Information Security Graduate School of Chinese Academy of SciencesBeijing 100039China State Key Laboratory of Integrated Service Networks Xidian UniversityXi'an 710071China Computer Science and Technology Department East China Normal UniversityShanghai 200241China
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a... 详细信息
来源: 评论
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution  16
IntScope: Automatically Detecting Integer Overflow Vulnerabi...
收藏 引用
16th Symposium on Network and Distributed system security, NDSS 2009
作者: Wang, Tielei Wei, Tao Lin, Zhiqiang Zou, Wei Key Laboratory of Network and Software Security Assurance Institute of Computer Science and Technology Peking University China Department of Computer Science Purdue University United States
The number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, we present a system, IntScope, which can automatically detect integer overflow vulnerabilities in x...
来源: 评论
Ideal perfect multilevel threshold secret sharing scheme
Ideal perfect multilevel threshold secret sharing scheme
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Lin, Changlu Harn, Lein Ye, Dingfeng Key Laboratory of Network Security and Cryptology Fujian Normal University China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences China Key Laboratory of Communication and Information System Beijing Jiaotong University Beijing Municipal Commission of Education China Department of Computer Science Electrical Engineering University of Missouri-Kansas City United States
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,... 详细信息
来源: 评论
Aspect-Oriented Modeling and Verification with Finite State Machines
收藏 引用
Journal of computer science & technology 2009年 第5期24卷 949-961页
作者: 徐殿祥 Omar El-Ariss 许巍峰 王林章 National Center for the Protection of the Financial Infrastructure Dakota State UniversityMadisonSD 57042 U.S.A. State Key Laboratory of Novel Software Technology Department of Computer Science and TechnologyNanjing University Department of Computer Science North Dakota State UniversityFargoND 58105 U.S.A Computer and Information Science Department Gannon University109 University SquareEriePA 16541 U.S.A
Aspect-oriented programming modularizes crosscutting concerns into aspects with the advice invoked at the specified points of program execution. Aspects can be used in a harmful way that invalidates desired properties... 详细信息
来源: 评论
Trusted resource dissemination in internetware systems  09
Trusted resource dissemination in internetware systems
收藏 引用
1st Asia-Pacific Symposium on Internetware, Internetware 2009
作者: Li, Zude Ye, Xiaojun Wang, Jianmin Computer Science Department University of Western Ontario London ON N6A 5B7 Canada Key Laboratory for Information System Security School of Software Tsinghua University Beijing 100084 China
Trusted resource dissemination over Internet is still an open problem. However, it is crucial to the success of Internet-based or Internetware systems. We propose an approach that supports trusted resource disseminati... 详细信息
来源: 评论
Geophysical methods for the study of sedimentary cycles
收藏 引用
Petroleum science 2009年 第3期6卷 259-265页
作者: Xu Jingling Liu Luofu Wang Guiwen Shen Jinsong Zhang Chunhua School of Resources and Information Technology China University of Petroleum Beijing 102249 China State Key Laboratory of Petroleum Resource and Prospecting China University of Petroleum Beijing 102249 China Department of Computer Science and Technology China University of Petroleum Beijing 102249 China
We present the wavelet depth-frequency analysis and variable-scale frequency cycle analysis methods to study sedimentary cycles. The spectrum analysis, variable-scale frequency cycle analysis, and wavelet depth-freque... 详细信息
来源: 评论