咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3491-3500 订阅
排序:
A clustering protocol based on the probability fading strategy in WSNs
A clustering protocol based on the probability fading strate...
收藏 引用
2009 International Conference on information Engineering and computer science, ICIECS 2009
作者: Zheng, Gengsheng Hu, Zhengbing Hubei Province Key Laboratory of Intelligent Robot School of Computer Science and Engineering Wuhan Institute of Technology Wuhan 430073 China Department of Information Technology Huazhong Normal University Wuhan 430079 China
In WSNs, energy efficiency are considered as the key issues in designing routing protocol. This paper proposes a clustering protocol F-LEACH based on the probability fading strategy. It makes further improvement over ... 详细信息
来源: 评论
Solid texture synthesis using Position Histogram Matching
Solid texture synthesis using Position Histogram Matching
收藏 引用
IEEE International Conference on computer-Aided Design and computer Graphics
作者: Jiating Chen Bin Wang Department of Computer Science and Technology Tsinghua University Beijing China Ministry of Education Key Laboratory of Information System Security Beijing China School of Software Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China
In the past, several approaches have been proposed to produce high quality solid textures. Unfortunately, they often suffer from several synthesis artifacts, such as color blurry, bad texture structures, introducing a... 详细信息
来源: 评论
Extended PEG Algorithm for High Rate LDPC Codes
Extended PEG Algorithm for High Rate LDPC Codes
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Zhiheng Zhou Xiangxue Li Dong Zheng Kefei Chen Jianhua Li Department of Computer Science and Engineering Shanghai Jiaotong University China School of Information Security Engineering Shanghai Key Laboratory of Information Security Management and Technology Research Shanghai Jiaotong University China
Progressive edge-growth (PEG) algorithm is a good candidate to generate tanner graphs with a large girth by establishing edges or connections between symbol and check nodes in an edge-by-edge manner. In this paper, we... 详细信息
来源: 评论
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric security
Reusable Set Constructions Using Randomized Dissolvent Templ...
收藏 引用
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
作者: Jinyang Shi Kwok-yan Lam Ming Gu Husheng Li Key Laboratory of Information System Security Ministry of Education Tsinghua National Laboratory of Information Science & Technology Tsinghua University Beijing China Department of EECS University of Tennessee Knoxville TN USA
The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for fingerprints may either be too weak to offer en... 详细信息
来源: 评论
Model Checking Needham-Schroeder security Protocol Based on Temporal Logic of Knowledge
Model Checking Needham-Schroeder Security Protocol Based on ...
收藏 引用
International Conference on Networks security, Wireless Communications and Trusted Computing, NSWCTC
作者: Xiangyu Luo Yan Chen Ming Gu Lijun Wu School of Software Key Laboratory of Security for Information System of Ministry of Education Tsinghua University Beijing China Department of Computer Science Guilin University of Electronic Technology Guilin China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the... 详细信息
来源: 评论
Task Scheduling for Heterogeneous Computing Based on Bayesian Optimization Algorithm
Task Scheduling for Heterogeneous Computing Based on Bayesia...
收藏 引用
International Conference on Computational Intelligence and security
作者: Jiadong Yang Hua Xu Peifa Jia State Key Laboratory on Intelligent Technology and Systems Tsinghua National Laboratory of Information Science and Technology Department of Computer Science and Technology Department of Computer Science and Technology Tsinghua University Beijing China
Efficient task scheduling, as a crucial step to achieve high performance for multiprocessor platform, remains one of the challenge problems despite of numerous studies. This paper presents a novel scheduling algorithm... 详细信息
来源: 评论
New birthday attacks on some MACs based on block ciphers
收藏 引用
29th Annual International Cryptology Conference, CRYPTO 2009
作者: Yuan, Zheng Wang, Wei Jia, Keting Xu, Guangwu Wang, Xiaoyun Institute for Advanced Study Tsinghua University Beijing 100084 China Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan 250100 China Department of Electrical Engineering and Computer Science University of Wisconsin Milwaukee WI United States
This paper develops several new techniques of cryptanalyzing MACs based on block ciphers, and is divided into two parts. The first part presents new distinguishers of the MAC construction Alred and its specific instan... 详细信息
来源: 评论
Localizing Loads Execution in a Data Cache Distributed Processor Architecture
Localizing Loads Execution in a Data Cache Distributed Proce...
收藏 引用
International Association of computer science and information technology - Spring Conference, IACSITSC
作者: Ruiling Dou Hong An Rui Guo Wenting Han Ming Cong Yongqing Ren Department of Computer Science and Technology University of Science and Technology Hefei China Key Laboratory of Computer System and Architecture Chinese Academy and Sciences Beijing China
To scale with the on-chip wire delay, the inside of a processor will further be partitioned into more small banks. As the amount of data cache bank scales, the load routing latency will contribute a considerable porti... 详细信息
来源: 评论
Performance and Power Efficiency Analysis of the Symmetric Cryptograph on Two Stream Processor Architectures
Performance and Power Efficiency Analysis of the Symmetric C...
收藏 引用
International Conference on Intelligent information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Guang Xu Hong An Gu Liu Ping Yao Mu Xu Wenting Han Xiaoqiang Li Xiurui Hao Department of Computer Science and Technology University of Science and Technology Hefei China Key Laboratory of Computer System and Architecture Chinese Academy and Sciences Beijing China
Multimedia and some scientific applications have achieved good performance on the stream processor architecture by employing the stream programming model. In order to find out the way to accelerate the symmetric crypt... 详细信息
来源: 评论
Real-Time Rendering of Translucent Objects with Variable Sizes
Real-Time Rendering of Translucent Objects with Variable Siz...
收藏 引用
11th IEEE International Conference on computer-Aided Design and computer Graphics(第11届IEEE国际计算机辅助设计与图形学学术会议 IEEE CAD/GRAPHICS 2009)
作者: Chunhui Yao Bin Wang School of Software Tsinghua University Beijing China 100084 Department of Computer Science and Technology Tsinghua University Beijing China 100084 Key Laboratory for Information System Security Ministry of Education Beijing China 100084 Tsinghua
We present a novel technique for real-timely rendering translucent objects. Our technique is mainly based on translucent shadow maps with a new adaptive sampling strategy. In this sampling strategy, the hierarchy le... 详细信息
来源: 评论