咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3641-3650 订阅
排序:
A Self-Tuning Multicast Flow Control Scheme Based on Autonomic technology
A Self-Tuning Multicast Flow Control Scheme Based on Autonom...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: N. Xiong Yanxiang He Yan Yang Laurence T. Yang Chao Peng The State Key Laboratory of Software Engineering Computer School of Wuhan University China School of Information Science Japan Advanced Institute of Science and Technology Japan Department of Computer Science Saint Francis Xavier University Antigonish Canada
With the increase of multicast data applications, research interests have focused on the design of congestion control schemes for multicast communications. This paper describes a novel control-theoretic multicast cong... 详细信息
来源: 评论
Narrowband audio hiding algorithm based on human auditory system
收藏 引用
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications 2006年 第SUPPL. 2期29卷 101-104+121页
作者: Yuan, Kai-Guo Yang, Ya-Tao Zhang, Ru Niu, Xin-Xin Yang, Yi-Xian Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China State Key Laboratory of Switching and Networking Beijing University of Posts and Telecommunications Beijing 100876 China Department of Communication Engineering Beijing Electronic Science and Technology Institute Beijing 100070 China
After studying about human auditory system and narrowband communications system model, a narrowband audio hiding algorithm based on human auditory system was presented. A lot of experiments proved that the algorithm h... 详细信息
来源: 评论
Effective Acquisition of Geospatial Data Products in a Collaborative Grid Environment
Effective Acquisition of Geospatial Data Products in a Colla...
收藏 引用
IEEE International Conference on Services Computing (SCC)
作者: Yaxing Wei Peng Yue Upendra Dadi Min Min Chengfang Hu Liping Di Department of Computer Science University of Science and Technology Hefei Anhui China Center for Spatial Information Science and Systems (CSISS) George Mason University Greenbelt MD USA State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University of China Wuhan China
Geospatial data is playing an increasingly important role in many areas. But there are still many problems associated with the effective use of geospatial data. One is that geospatial data is usually large in volume a... 详细信息
来源: 评论
Anomaly detection model based on dynamic behavior and character patterns
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2006年 第9期29卷 1553-1560页
作者: Lin, Guo-Yuan Guo, Shan-Qing Huang, Hao Cao, Tian-Jie State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China School of Computer China University of Mining and Technology Xuzhou 221008 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100080 China
Differing from existed anomaly detection methods which only dealt with the frequencies of system calls or local variation, the paper puts forward a model named DBCPIDS. It took in both dynamic behavior and character p... 详细信息
来源: 评论
A method to integrate, assess and characterize the protein-protein interactions
A method to integrate, assess and characterize the protein-p...
收藏 引用
IEEE Symposium on Computational Intelligence and Bioinformatics and Computational Biology (CIBCB)
作者: Fa Zhang Lin Xu Jingchun Chen Zhiyong Liu Bo Yuan Key Laboratory of Computer System and architecture the Institute of Computing Technology Chinese Academy and Sciences China Graduate School Chinese Academy and Sciences China Department of Biomedical Informatics Ohio State Uinversity USA National Natural Science Foundation China
Recently, large-scale protein-protein interactions were recovered using the similar two-hybrid system for the model systems. This information allows us to investigate the protein interaction network from a systematic ... 详细信息
来源: 评论
A Quantum Reinforcement Learning Method for Repeated Game Theory
A Quantum Reinforcement Learning Method for Repeated Game Th...
收藏 引用
International Conference on Computational Intelligence and security
作者: Chunlin Chen Daoyi Dong Yu Dong Qiong Shi Department of Control and System Engineering School of Management and Engineering Nanjing University Nanjing China Key Laboratory of Systems and Control Institute of Systems Science Chinese Academy and Sciences Beijing China Department of Information Management and Decision Science University of Science and Technology Hefei China College of Humanities and Social Science Anhui Medical University Hefei China
In this paper, a quantum reinforcement learning method is proposed for repeated game theory. First, the quantum reinforcement learning algorithm is introduced based on quantum state superposition principle and its sup... 详细信息
来源: 评论
Battery-Sensing Intrusion Protection system
Battery-Sensing Intrusion Protection System
收藏 引用
Proceedings of the Annual IEEE SMC information Assurance Workshop (IAW)
作者: Buennemeyer Jacoby Chiang Marchany Tront Bradley Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State University Blacksburg VA USA United States Military Academy West Point NY USA Computer Science Department Virginia Polytechnic Institute and State University Blacksburg VA USA Information Technology and Security Laboratory Virginia Polytechnic Institute and State University Blacksburg VA USA
This paper proposes an innovative battery-sensing intrusion protection system (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices. These hosts are employed as sensors in a w... 详细信息
来源: 评论
Research on Restraining Low Frequency Oscillation with Flywheel Energy Storage system
Research on Restraining Low Frequency Oscillation with Flywh...
收藏 引用
International Conference on Power system technology (POWERCON)
作者: Yun Zhong Jiancheng Zhang Gengyin Li Zhiyuan Chen School of Information Engineering University of Nanchang Baoding Jiangxi China Department of Electrical power Engineering North China Electric Power University Baoding Hebei China Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control under Ministry of Education North China Electric Power University Baoding Hebei China Baoding Zhongli Power Science and Technology Development Company Limited Baoding Hebei China
Low frequency oscillations in the interconnected power systems are observed all around the world. Besides conventional PSS to suppress Low frequency oscillation, there are other modern FACTS devices to damp oscillatio... 详细信息
来源: 评论
Modeling the intrusion by using capability of attackers
Modeling the intrusion by using capability of attackers
收藏 引用
International Conference on Machine Learning and Cybernetics, ICMLC 2005
作者: Wang, Liang-Min Zhang, Jian-Ming Ma, Jian-Fenc Department of Computer Science Jiangsu University Zhenjiang 212013 China Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University 710071 China
Modeling the intrusion is an open problem which is necessary to be solved in Intrusion Tolerance system. A model of state transition and its constructing algorithm is presented which is described with the capability o... 详细信息
来源: 评论
security policy analysis in network-attached optical disk storage system
Security policy analysis in network-attached optical disk st...
收藏 引用
Seventh International Symposium on Optical Storage, ISOS 2005
作者: Liu, Jun Xie, Changsheng Huang, Hao Key Laboratory of Data Storage System Huazhong University of Science and Technology Wuhan 430074 China Department of Computer Science Wuhan Institute of Technology Wuhan 430074 China
The network-attached optical disk storage system has the advantages of the network-attached storage system and the optical storage device. Due to the data reliability and the removability of the storage medium, this o... 详细信息
来源: 评论