咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3601-3610 订阅
排序:
High precision test method and apparatus for photoelectric encoder
收藏 引用
Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of technology 2007年 第11期27卷 977-980+1008页
作者: Deng, Fang Chen, Jie Chen, Wen-Jie Chi, Cheng Department of Automatic Control School of Information Science and Technology Beijing Institute of Technology Beijing 100081 China Key Laboratory of Complex System Intelligent Control and Decision School of Information Science and Technology Beijing Institute of Technology Beijing 100081 China
A new method and apparatus is proposed to improve the precision and reduce the cost of photoelectric encoder measurements. The method is based on highest resolution measurement and completely statistical analysis. The... 详细信息
来源: 评论
ID-based Ring Proxy Signatures
ID-based Ring Proxy Signatures
收藏 引用
IEEE International Symposium on information Theory
作者: Baodian Wei Fangguo Zhang Xiaofeng Chen Department of Electronics and Communication Engineering Guangdong Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou Guangdong China Department of Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou Guangdong China
In this paper, by combining the functionalities of proxy signatures and ring signatures, we propose a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of ... 详细信息
来源: 评论
Society-oriented Designated Confirmer Signatures
Society-oriented Designated Confirmer Signatures
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Baodian Wei Fangguo Zhang Xiaofeng Chen Department of Electronics and Communication Engineering Guangdong Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou Guangdong China Department of Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou Guangdong China
The concept of society-oriented designated confirmer signatures (SDCS) is introduced in this paper. SDCS can be used in the circumstances where the capability of the signer and that of the confirmer are both needed to... 详细信息
来源: 评论
Efficient Mediated Certificates Public-key Encryption Scheme without Pairings
Efficient Mediated Certificates Public-Key Encryption Scheme...
收藏 引用
International Conference on Advanced information Networking and Applications Workshops (AINAW)
作者: Chen Yang Furong Wang Xinmei Wang Ministry of Education Key Laboratory of Computer Networks and Information Security Xi'an China Department of Electronics & Information Engineering Zhong University of Science and Technology Wuhan China
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in traditional ID-based crypto systems. In this paper, we present an efficient mediated certificateless public... 详细信息
来源: 评论
Research of electronic document certification testing system base on characteristics getting
收藏 引用
Zhongshan Daxue Xuebao/Acta Scientiarum Natralium Universitatis Sunyatseni 2007年 第6期46卷 44-47页
作者: Zeng, Fan-Zhi Zhao, Hui-Min Lu, Yan-Sheng Fang, Yan-Mei Department of Computer Science Foshan University Foshan 528000 China Department of Computer Science Huazhong Univ. of Sci. and Technol. Wuhan 430074 China Guangdong Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou 510275 China
In the web environment, there is a novel algorithm of electronic documents falsification, which uses the document whole characteristics getting to certify the reliability of the information. To avoid malicious attacks... 详细信息
来源: 评论
Towards Improving Ant-Based Clustering - An Chaotic Ant Clustering Algorithm
Towards Improving Ant-Based Clustering - An Chaotic Ant Clus...
收藏 引用
International Conference on Computational Intelligence and security Workshops (CISW)
作者: Xiaofang Huang Yixian Yang Xinxin Niu Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Department of Computer Science Southwest University of Science and Technology China
Ant-based clustering as a nature-inspired heuristic algorithm has been applied in a data-mining context to perform both clustering and topographic mapping. It is derived from a basic model of behavior observed in real... 详细信息
来源: 评论
A New Prime-Phase Sequence Family with Low Correlation and Large Size
A New Prime-Phase Sequence Family with Low Correlation and L...
收藏 引用
第三届信号设计及其在通信中的应用国际会议(Proceedings of 2007 International Workshop on Signal Design and Its Applications in Communications IWSDA'07)
作者: Nigang SUN Lei HU Li LU Xuyun NIE Department of Computer Science and Engineering East China University of Science and Technology Sha State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Be Department of Computer Science and Engineering Hong Kong University of Science and Technology Kowl School of Computer Science and Engineering University of Electronic Science and Technology of China
A new family of p-phase low-correlation sequences with large family size, where p is an odd prime,is constructed by using the highest coordinate of linear recurrence sequences over the ring Zp1, for l ≥2. Utilizing G... 详细信息
来源: 评论
Dynamic key-Updating: Privacy-Preserving Authentication for RFID systems
Dynamic Key-Updating: Privacy-Preserving Authentication for ...
收藏 引用
IEEE International Conference on Pervasive Computing and Communications (PerCom)
作者: Li Lu Jinsong Han Lei Hu Yunhao Liu Lionel M. Ni State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China
The objective of private authentication for radio frequency identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking tags' private information. To ach... 详细信息
来源: 评论
Collaborative filtering recommendation algorithm based on cloud model
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2007年 第10期18卷 2403-2411页
作者: Zhang, Guang-Wei Li, De-Yi Li, Peng Kang, Jian-Chu Chen, Gui-Sheng State Key Laboratory of Software Development Environment Beihang University Beijing 100083 China Institute of Electronic System Engineering Beijing 100840 China Information Security Center Shenzhen Graduate School Harbin Institute of Technology Shenzhen 518055 China School of Computer Science and Technology Shandong Jianzhu University Ji'nan 250101 China
Recommendation system is one of the most important technologies applied in e-commerce. Similarity measuring method is fundamental to collaborative filtering algorithm, and traditional methods are inefficient especiall... 详细信息
来源: 评论
A NEW APPROACH TO MULTILEVEL security BASED ON TRUSTED COMPUTING PLATFORM
A NEW APPROACH TO MULTILEVEL SECURITY BASED ON TRUSTED COMPU...
收藏 引用
2007 International Conference on Machine Learning and Cybernetics(IEEE第六届机器学习与控制论国际会议)
作者: XIAO-DONG ZUO FENG-MEI LIU CHAO-BIN MA State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing Department of Information Research College of Information Engineering Information Engineering Univ College of Computer Science Beijing University of Technology Beijing 100022China
To achieve the multilevel security goal some models bad been developed such as BLP since *** models can't successfully work in network environment nowadays due to the difficulty to make the labels of subjects and ... 详细信息
来源: 评论