咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3481-3490 订阅
排序:
Extracting real-life log with data perspective in PLM system for business process analysis
Extracting real-life log with data perspective in PLM system...
收藏 引用
2009 WRI World Congress on computer science and information Engineering, CSIE 2009
作者: Wang, Zhaoxia Wang, Jianmin Wen, Lijie Liu, Yingbo Department of Computer Science Tsinghua University Beijing China School of Software Tsinghua University Beijing China Key Laboratory for Information System Security Ministry of Education Logistical Engineering University Chongqing China Department of Logistical Information Engineering Logistical Engineering University Chongqing China
Event log is the important starting point of any process analysis technique. Existent business process analysis techniques are applied mainly to manual or simulated logs, considering mainly information about control p... 详细信息
来源: 评论
Secure authentication and authorization scheme for mobile devices
Secure authentication and authorization scheme for mobile de...
收藏 引用
2009 IEEE International Conference on Communications technology and Applications, IEEE ICCTA2009
作者: Jian, Wang Nan, Jiang School of Computer and Information Technology Beijing Jiaotong University Beijing China College of Computer Science Beijing University of Technology Beijing China Key Laboratory of Communication and Information System Beijing Municipal Commission of Education Beijing Jiaotong University Beijing China
Future mobile devices are expected to access different networks (such as 3rd generation network, WLAN, Bluetooth, Internet, and etc). Hence many sensitivity data are stored in them. How to protect the security of info... 详细信息
来源: 评论
Distributed Certificateless key Encapsulation Mechanism Secure Against the Adaptive Adversary
收藏 引用
Journal of Shanghai Jiaotong university(science) 2009年 第1期14卷 102-106页
作者: 龙宇 李祥学 陈克非 洪璇 Department of Computer Science and Engineering Shanghai Jiaotong UniversityShanghai 200240China School of Information Security Engineering Shanghai Jiaotong UniversityShanghai 200240China State Key Laboratory of Integrated Service Networks Xidian UniversityXi'an 710071China
This paper proposes an adaptively secure solution to certificateless distributed key encapsulation mechanism from pairings by using Canetti's adaptive secure key generation scheme based on discrete logarithm. The pro... 详细信息
来源: 评论
A hierarchical routing architecture for the aviation communication network
A hierarchical routing architecture for the aviation communi...
收藏 引用
2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009
作者: Yuan, Wang Hua, Xu Peifa, Jia State Key Laboratory on Intelligent Technology and Systems Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Aviation communication network is composed of various kinds of IP-enabled aerial mobile Ad Hoc network, IP-enabled ground network and aerial data link system that don't support IP protocol. Satellite data links wo... 详细信息
来源: 评论
Conflict driven scan chain configuration for high transition fault coverage and low test power
Conflict driven scan chain configuration for high transition...
收藏 引用
Asia and South Pacific Design Automation Conference
作者: Zhen Chen Boxue Yin Dong Xiang Department of Computer Science and Technology Tsinghua University Beijing China School of software Key Laboratory of Information System Security Ministry of Education Tsinghua National Laboratory of Information Science and Technology Tsinghua University Beijing China School of software Key Laboratory of Information System Security Ministry of Education Tsinghua National Laboratory of Information Science and Technology Tsinghua University Beijing China
Two conflict-driven schemes and a new scan architecture based on them are presented to improve fault coverage of transition fault. They make full use of the advantages of broadside, skewed-load and enhanced scan testi... 详细信息
来源: 评论
A security Model for VoIP Steganography
A Security Model for VoIP Steganography
收藏 引用
The First International Conference on Multimedia information Networking and security(第一届国际多媒体网络信息安全会议 MINES 2009)
作者: Zhiwei Yu Clark Thomborson Junning Fu Jianmin Wang Chaokun Wang Department of Computer Science and Technology Tsinghua University Department of Computer Science The University of Auckland New Zealand School of Software Tsinghua University Key Laboratory for Information System Security Ministry of
In 2005, an extensive taxonomy of threats for VoIP was published by a prominent industry group. Strangely, this taxonomy does not identify stegocommunication as a threat, even though many steganographic channels have ... 详细信息
来源: 评论
ARRAY: A non-application-related, secure,wide-area disaster recovery storage system
ARRAY: A non-application-related, secure,wide-area disaster ...
收藏 引用
2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009
作者: Zeng, Lingfang Feng, Dan Veeravalli, Bharadwaj Wei, Qingsong Division of Data Storage System Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage Wuhan 430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China Department of Electrical Computer Engineering National University of Singapore Singapore 117608 Singapore Data Storage Institute Singapore 117608 Singapore
With our society more information-driven, we have begun to distribute data in wide-area storage systems. At the same time, both physical failure and logic error have made it difficult to bring the necessary recovery t... 详细信息
来源: 评论
Fuzzy Timed Agent Based Petri Nets for Modeling Cooperative Multi-Robot systems
收藏 引用
International Journal of Communications, Network and system sciences 2009年 第9期2卷 827-835页
作者: Xingli HUANG Hua XU Peifa JIA State Key Laboratory on Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University
A cooperative multi-robot system (CMRS) modeling method called fuzzy timed agent based Petri nets (FTAPN) is proposed in this paper, which has been extended from fuzzy timed object-oriented Petri net (FTOPN). The prop... 详细信息
来源: 评论
A static method for detection of information theft malware
A static method for detection of information theft malware
收藏 引用
2nd International Symposium on Electronic Commerce and security, ISECS 2009
作者: Li, JiaJing Wei, Tao Zou, Wei Mao, Jian Key Laboratory of Network and Software Security Assurance Ministry of Education Peking University Beijing 100871 China Institute of Computer Science and Technology Peking University Beijing 100871 China Department of Electronic and Information Engineering BeiHang University Beijing 10083 China
Existing techniques based on behavior semantics for information theft malware detection have the main shortcomings of low path coverage and disability of finding hidden malicious behaviors. In this paper we propose a ... 详细信息
来源: 评论
An efficient gene selection algorithm based on tolerance rough set theory  1
收藏 引用
12th International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing, RSFDGrC 2009
作者: Jiao, Na Miao, Duoqian Department of Computer Science and Technology Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education of China Tongji University Shanghai 201804 China
Gene selection, a key procedure of the discriminant analysis of microarray data, is to select the most informative genes from the whole gene set. Rough set theory is a mathematical tool for further reducing redundancy... 详细信息
来源: 评论