咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3631-3640 订阅
排序:
Network anomalous intrusion detection using Fuzzy-Bayes
Network anomalous intrusion detection using Fuzzy-Bayes
收藏 引用
4th IFIP TCI2 International Conference on Intelligent information Processing, IIP 2006
作者: Adetunmbi, Adebayo O. Shi, Zhiwei Shi, Zhongzhi Adewale, Oiumide S. Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing 100080 China Department of Computer Science Federal University of Technology Ondo State Nigeria
security of networking systems has been an issue since computer networl
来源: 评论
Robust moving object segmentation in the compressed domain for H.264/AVC video stream
Robust moving object segmentation in the compressed domain f...
收藏 引用
25th PCS: Picture Coding Symposium 2006, PCS2006
作者: Yang, Gaobo Yu, Shengfa Zhang, Zhaoyang Network and Information Security Lab School of Computer and Communication Hunan University Changsha Hunan 410082 China School of Electronic Science and Engineering National University of Defense Technology Changsha Hunan 410073 China Key Laboratory of Advanced Displays and System Application Shanghai University Ministry of Education Shanghai 200072 China
Moving object segmentation in the compressed domain plays an important role in many real-time applications, e.g. video indexing, video surveillance, etc. H.264/AVC is the up-to-date video coding standard, which employ... 详细信息
来源: 评论
The graph-theoretical properties of partitions and information entropy
The graph-theoretical properties of partitions and informati...
收藏 引用
High-Power Diode Laser technology and Applications IV
作者: Cao, Cungen Sui, Yuefei Xia, Youming Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Department of Computer Science Yunnan Normal University Kunming 650092 Yunnan China
The information entropy, as a measurement of the average amount of information contained in an information system, is used in the classification of objects and the analysis of information systems. The information entr... 详细信息
来源: 评论
SINS/GPS integrated system state estimation based on covariance assignment
SINS/GPS integrated system state estimation based on covaria...
收藏 引用
systems and Control in Aerospace and Astronautics, 2006. ISSCAA 2006. 1st International Symposium on
作者: Hang Shi Jihong Zhu Haiyan Tian State Key Laboratory of Intelligent Technology and System Department of Computer Science and Technology Tsinghua University Beijing China College of Mathematics and Information Science Hebei Normal University Shijiazhuang China
SINS and GPS are widely used. Combining SINS and GPS organically, we can get an reliable integrated navigating system which can overcome the respective defects of the two systems, including signal blockage for GPS and... 详细信息
来源: 评论
Disaster recovery system model with e-government case study
收藏 引用
Natural Hazards Review 2006年 第4期7卷 145-149页
作者: Wang, Kun Li, Long-Hai Yuan, Feng Zhou, Li-Hua Key Laboratory of Computer Network and Information Security Xidian Univ. Ministry of Education Xi'an 710071 Shaanxi China Dept. of Computer Science and Technology Xidian Univ. Xi'an 710071 Shaanxi China National Information Security Engineering and Technology Research Center Beijing 100093 China
We present a robust disaster recovery system model according to the requests of disaster recovery talent of a key e-government project of China. The model strengthens the safe communication ability and guarantees the ... 详细信息
来源: 评论
Formalization for Granular Computing Based on Logical Formulas
收藏 引用
南昌工程学院学报 2006年 第2期25卷 60-65页
作者: Lin Yan Qing Liu Key Laboratory for Intelligent Information Processing College of Computer and Information Technology Henan Normal University Xinxiang 453007 China Department o f Computer Science Nanchang University Nanchang 330029 China
In order to make formalization for granular computing,some kinds of formulas are constructed on a universe by a logical method. Every formula expresses a property, and can separate a semantic set which consists of all... 详细信息
来源: 评论
A quantum reinforcement learning method for repeated game theory
A quantum reinforcement learning method for repeated game th...
收藏 引用
2006 International Conference on Computational Intelligence and security, ICCIAS 2006
作者: Chen, Chunlin Dong, Daoyi Dong, Yu Shi, Qiong Department of Control and System Engineering School of Management and Engineering Nanjing University Nanjing 210093 China Key Laboratory of Systems and Control Institute of Systems Science Chinese Academy of Sciences Beijing 100080 China Department of Information Management and Decision Science University of Science and Technology of China Hefei 230026 China College of Humanities and Social Science Anhui Medical University Hefei 230032 China
In this paper, a quantum reinforcement learning method is proposed for repeated game theory. First, the quantum reinforcement learning algorithm is introduced based on quantum state superposition principle and its sup... 详细信息
来源: 评论
On Control Gain Selection in PI-RED
On Control Gain Selection in PI-RED
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Naixue Xiong X. Defago Yan Yang Yanxiang He Jing He Key Laboratory of Software Engineering Computer School of Wuhan University China School of Information Science Institute of Science and Technology Japan School of Computer Science and Technology Wuhan University of Science and Technology Hubei China State Key Laboratory of Software Engineering Computer School Wuhan University of China Hubei China Department of Computer Science Utah State University Logan UT USA
Active queue management (AQM) is an effective method used in Internet routers to enhance congestion control, and to achieve a trade off between link utilization and delay. The de facto standard, the random early detec... 详细信息
来源: 评论
Theory and Network Applications of Dynamic Bloom Filters
Theory and Network Applications of Dynamic Bloom Filters
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: D. Guo J. Wu H. Chen X. Luo Key laboratory of C4ISR Technology School of Information System and Management National University of Defense Technology Changsha Hunan China Department of Computer Science and Engineering Florida Atlantic University Boca Raton FL USA
来源: 评论
Integrated information processing and communications: Complexity analysis
Integrated information processing and communications: Comple...
收藏 引用
IASTED International Conference on COMMUNICATION systemS AND APPLICATIONS Part of the Sixth IASTED International Multi-Conference on WIRELESS AND OPTICAL COMMUNICATIONS
作者: Huyu, Qu Le, Yi Wang Yaprak, Ece Hong, Wang Yanlong, Zhao Department of Electrical and Computer Engineering Wayne State University Detroit MI 48202 United States Division of Engineering Technology Wayne State University Detroit MI 48202 United States Department of Anesthesiology Wayne State University Detroit MI 48202 United States Key Laboratory of System and Control Academy of Mathematics and Systems Science Chinese Academy of Sciences China
Accuracy of information transmission when a signal must be transmitted through a communication channel is of essential importance in design of communication systems. When system resources are limited, such as transmis... 详细信息
来源: 评论