咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3511-3520 订阅
排序:
ARRAY: A Non-application-Related, Secure, Wide-Area Disaster Recovery Storage system
ARRAY: A Non-application-Related, Secure, Wide-Area Disaster...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Lingfang Zeng Dan Feng Bharadwaj Veeravalli Qingsong Wei Division of Data Storage System Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Electrical and Computer Engineering National University of Singapore Singapore Data Storage Institute Singapore
With our society more information-driven, we have begun to distribute data in wide-area storage systems. At the same time, both physical failure and logic error have made it difficult to bring the necessary recovery t... 详细信息
来源: 评论
Research of secure intranet/internet access platform based on ontology
收藏 引用
Journal of Networks 2009年 第10期4卷 1009-1016页
作者: Shen, Shigen Ye, Lihua Yue, Guangxue Yu, Fei College of Mathematics and Information Engineering Jiaxing University Jiaxing China College of Computer and Communication Hunan University Changsha China Department of Computer Science and Technology Huaihua University Huaihua China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou China
Faced with the general trend of centralization of information, the biggest challenge to enterprise is how to ensure that all fixed computers and different mobile devices anywhere can access securely and quickly enterp... 详细信息
来源: 评论
The ATPG Conflict-Driven Scheme for High Transition Fault Coverage and Low Test Cost
The ATPG Conflict-Driven Scheme for High Transition Fault Co...
收藏 引用
IEEE VLSI Test Symposium (VTS)
作者: Zhen Chen Dong Xiang Boxue Yin Department of Computer Science and Technology Tsinghua University School of software Key Laboratory for Information System Security Ministry of Education Tsinghua National Laboratory for Information Science and Technology Tsinghua University
This paper presents two new conflict-driven techniques for improving transition fault coverage using multiple scan chains. These techniques are based on a novel test application scheme, in order to break the functiona... 详细信息
来源: 评论
A Structural Health Monitoring system Using Wireless Sensor Network
A Structural Health Monitoring System Using Wireless Sensor ...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Jianjun Niu Zhidong Deng Fengguang Zhou Zongsheng Cao Zhanqing Liu Fangzhou Zhu State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory of Information Science and Technology Department of Computer Science and Technology Tsinghua University China Beijing Special Engineering Design and Research Institute China
Wireless sensor network (WSN) based structural health monitoring (SHM) system attracts increasing interest in recent years. However, the restricted bandwidth, memory and energy pose great challenges to the application... 详细信息
来源: 评论
A New Data Streaming Method for Locating Hosts with Large Connection Degree
A New Data Streaming Method for Locating Hosts with Large Co...
收藏 引用
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
作者: Xiaohong Guan Pinghui Wang Tao Qin MOE Key Laboratory of Intelligent Networks and Network Security State Key Laboratory of Manufacturing Systems Xi'an Jiaotong University Xi'an China Department of Automation Tsinghua National Laboratory of Information Science and Technology Tsinghua University Beijing China
Locating hosts with large connection degree is very important for monitoring anomalous network traffics. The in-degree (out-degree), defined as the number of distinct sources (destinations) that a network host is conn... 详细信息
来源: 评论
A Universal Composability Framework for Analysis of Proxy Threshold Signature
收藏 引用
Journal of Shanghai Jiaotong university(science) 2009年 第1期14卷 107-111页
作者: 洪璇 李详学 龚征 陈克非 Department of Computer Science and Engineering Shanghai Jiaotong UniversityShanghai 200240China School of Information Security Engineering Shanghai Jiaotong UniversityShanghai 200240China State Key Laboratory of Information Security Graduate School of the Chinese Academy of SciencesBeijing 100039China Distributed and Embedded Security Group Faculty of EEMCSUniversity of Twente7500 AE Enschedethe Netherlands
The universal composability framework is a new approach for designing and analyzing the security of cryptographic *** this framework,the security of protocols is maintained under a general protocol composition *** the... 详细信息
来源: 评论
Calculating Minimum Buffer Requirement of Constant Rate Transmission Scheme Based on SVM
Calculating Minimum Buffer Requirement of Constant Rate Tran...
收藏 引用
International Conference on computer and information technology (CIT)
作者: Zilei Wang Hongsheng Xi Guo Wei Key Laboratory of Network Communication System and Control Chinese Academy of Sciences University of Science and Technology Hefei Anhui China Department of Electronic Engineering and Information Science USTC Hefei Anhui China
Constant rate transmission and transport (CRTT) is an effective bandwidth smoothing scheme resulting in one fixed rate during the whole duration of variable bit-rate video, which, however, needs a large client buffer ... 详细信息
来源: 评论
Universal composability framework for analysis of proxy threshold signature
收藏 引用
Journal of Shanghai Jiaotong University (science) 2009年 第1期14 E卷 107-111页
作者: Hong, Xuan Li, Xiang-Xue Gong, Zheng Chen, Ke-Fei Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai 200240 China School of Information Security Engineering Shanghai Jiaotong University Shanghai 200240 China State Key Laboratory of Information Security Graduate School Chinese Acad. of Sci. Beijing 100039 China Distributed and Embedded Security Group Faculty of EEMCS University of Twente 7500 AE Enschede Netherlands
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols. In this framework, the security of protocols is maintained under a general protocol composit... 详细信息
来源: 评论
A Dynamic Description Logic-Based Formalism for RBAC
A Dynamic Description Logic-Based Formalism for RBAC
收藏 引用
International Conference on computer sciences and Convergence information technology (ICCIT)
作者: Li Ma Shilong Ma Jianghua Lv Yuefei Sui Department of Computer Science Beihang University Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy and Sciences Beijing China
Applications in the open and dynamic environment become more intelligent and complicated. To secure these applications is a big challenge. RBAC model, as a de facto standard in access control field, is widely used in ... 详细信息
来源: 评论
Single vs. population cell coding: Gaze movement control in target search
Single vs. population cell coding: Gaze movement control in ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Jun Miao Laiyun Qing Lijuan Duan Baixian Zou Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy and Sciences Beijing China School of Information Science and Engineering Chinese Academy of Sciences Beijing China College of Computer Science and Technology University of Technology Beijing China Department of Information Science and Technology College of Art and Science Beijing Union Technology Beijing China
Gaze movement plays an important role in human visual search system. In literature, the winner-take-all method is wildly used to simulate the controlling of the gaze movement. The winner-take-all is a type of single-c... 详细信息
来源: 评论