咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3501-3510 订阅
排序:
Differential Fault Analysis on SHACAL-1
Differential Fault Analysis on SHACAL-1
收藏 引用
Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
作者: Ruilin Li Chao Li Chunye Gong Department of Mathematics and System Science Science College National University of Defense Technology Changsha China State Key Laboratory of Information Security Institute of Software Chinese Academy and Sciences Beijing China School of Computer National University of Defense Technology Changsha China
SHACAL-1, known as one of the finalists of the NESSIE project, originates from the compression component of the widely used hash function SHA-1. The requirements of confusion and diffusion are implemented through mixi... 详细信息
来源: 评论
An Ultra-kernel Model for Dedicated security systems
An Ultra-kernel Model for Dedicated Security Systems
收藏 引用
International Conference on Education technology and computer, ICETC
作者: Jing Wang Luning Xia Jiwu Jing Department of Electronic Engineering and information Science University of Science and Technology Hefei China State Key Laboratory of information Security Chinese Academy and Sciences Beijing China
security, simplicity, efficiency, are three important aspects of system architecture design, especially for dedicated security systems. The legacy horizontal-layered architectures (e.g., microkernel model) suffer from... 详细信息
来源: 评论
Task Scheduling for Heterogeneous Computing Based on Learning Classifier system
Task Scheduling for Heterogeneous Computing Based on Learnin...
收藏 引用
International Conference on Artificial Intelligence and Computational Intelligence (AICI)
作者: Jiadong Yang Hua Xu Peifa Jia State Key Laboratory Intelligent Technology and Systems Tsinghua National Laboratory of Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing China
Task scheduling still remains one of the most challenging problems to achieve high performance in heterogeneous computing environments in spite of numerous efforts. This paper presents a novel scheduling algorithm bas... 详细信息
来源: 评论
Vehicle detection and tracking in relatively crowded conditions
Vehicle detection and tracking in relatively crowded conditi...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Wenhao Lu Shengjin Wang Xioaqing Ding Department of Electronic Engineering State Key Laboratory of Intelligent Technology and System Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China
Aiming at vehicle detection and tracking problems in video monitoring and controlling system, this paper mainly studies vehicle detection and tracking problems in conditions of high traffic density in daytime. This pa... 详细信息
来源: 评论
An efficient certificateless signature from pairings
收藏 引用
International Journal of Network security 2009年 第1期8卷 96-100页
作者: Wang, Changji Long, Dongyang Tang, Yong Department of Computer Science Sun Yat-sen University Guangzhou China not available Xingang West Road 135 Guangzhou 510275 China Guangdong Province Information Security Key Laboratory Guangzhou China The State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China
A certificateless signature retains the efficiency of Shamir's identity-based signature while it does not suffer from the inherent private key escrow problem, which is first introduced by S. Al-Riyami and K. Pater... 详细信息
来源: 评论
Generalization of Some Attacks on RSA with Small Prime Combination and Small Private Exponent
Generalization of Some Attacks on RSA with Small Prime Combi...
收藏 引用
Asia-Pacific Conference on information Processing, APCIP
作者: Lidong Han Guangwu Xu Key Laboratory of Cryptographic Technology and Information Security Ministry of Education Shandong University Jinan China Department of Electrical Engineering and Computer Science University of Wisconsin Milwaukee Milwaukee USA
In 2002, de Weger proposed an attack on small RSA secret decryption exponent with small prime difference |p-q|, which improved the insecure private key bound of Wiener and Boneh-Durfee attacks. Recently, Maitra and Sa... 详细信息
来源: 评论
Development of a visual navigation system for 3D virtual mine
Development of a visual navigation system for 3D virtual min...
收藏 引用
2009 International Conference on information Engineering and computer science, ICIECS 2009
作者: Dewen, Seng Xi, Liang Hongxia, Wang Guoying, Yue Department of Computer and Information Engineering Zhejiang Water Conservancy and Hydropower College Hangzhou 310018 China State Key Laboratory of High-Efficient Mining and Safety of Metal Mines of Ministry of Education University of Science and Technology Beijing Beijing 100083 China
Our research is to develop a system of effectively visualizing large scale geographically related data sets and demonstrate to the industry the advantages of integrating topographic, geological, geophysical and mine p... 详细信息
来源: 评论
Load Balancing Routing Algorithm for Ad Hoc Networks
Load Balancing Routing Algorithm for Ad Hoc Networks
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Wenbin Jiang Zhaojing Li Chunqiang Zeng Hai Jin Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Electronics and Information Engineering Huazhong University of Science and Technology Wuhan China
In ad hoc networks, when the load is heavy, the performance of on-demand routing protocols, such as DSR protocol, will suffer large degradation. For instance, the absence of balanced distribution of network flow among... 详细信息
来源: 评论
L-UCON: Towards Layered Access Control with UCON
L-UCON: Towards Layered Access Control with UCON
收藏 引用
IEEE International Conference on Computational science and Engineering, CSE
作者: Hao Hu Hao Li Dengguo Feng National Engineering Research Center for Information Security Beijing China Department of Electronic Engineering and Information Science University of Science and Technology Hefei China The State Key Laboratory of Information Security Institute of Software Chinese Academy and Sciences Beijing China
Traditional access control solutions suffer from difficulties in access rights authorization and usage policy enforcement, especially in highly distributed environments. The layered nature of common digital content sh... 详细信息
来源: 评论
A stochastic method for controlling the scaling parameters of Cauchy mutation in fast evolutionary programming
A stochastic method for controlling the scaling parameters o...
收藏 引用
Congress on Evolutionary Computation
作者: Yunji Chen Ke Tang Tianshi Chen Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Nature Inspired Computation and Applications Laboratory Department of Computer Science and Technology University of Science and Technology of China Hefei Anhui China
The fast evolutionary programming (FEP) introduced the Cauchy distribution into its mutation operator, thus the performances of EP were promoted significantly on a number of benchmark problems. However, the scaling pa... 详细信息
来源: 评论