咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3651-3660 订阅
排序:
EAR Protocol-Towards Fair Optimistic Non-Repudiation Exchange
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2005年 第2期12卷 59-63页
作者: WANG Hai-yan WANG Ru-chuan Department of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 P.R. China State Key Laboratory of Information Security Beijing 100039 P.R. China
Fairness is of crucial importance for the exchange protocols via Internet . Non-repudiation therefore becomes one of the vital premises, which are essential in the exchange of sensitive and important messages. This pa... 详细信息
来源: 评论
Improved vicinal SV algorithm
收藏 引用
Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of technology 2005年 第11期25卷 967-970页
作者: Bi, Le-Peng Zheng, Zhi-Yun Song, Han-Tao Lu, Yu-Chang Department of Computer Science and Engineering School of Information Science and Technology Beijing Institute of Technology Beijing 100081 China State Key Laboratory of Intelligent Technology and System Tsinghua University Beijing 100084 China
Two improvements are introduced into vicinal-risk-minimization based support vector (SV) algorithm. Since the misclassified samples must be support vectors, a scheme for pruning hard-to-learn samples from the training... 详细信息
来源: 评论
UML modeling security mobile agent system based on role-based access control
Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute ...
收藏 引用
Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications 2005年 第3期25卷 83-86页
作者: Gao, Ran Wang, Ru-Chuan Zhu, Feng Department of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China Laboratory of Information Security Graduate School Chinese Academy of Science Beijing 100039 China
We present a role-based access control (RBAC) model and a mobile agent system with the universal modeling language (UML), we use the RBAC to control the access of the agent to the source of the agent platform, and we ... 详细信息
来源: 评论
Two kinds of timing cues and their usage in concept detection in news video
Two kinds of timing cues and their usage in concept detectio...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Dong Wang Dayong Ding Le Chen Shen Zhang Fuzong Lin Bo Zhang State Key Laboratory of Intelligent Technology & System Department of Computer Science and Technology Tsinghua University Beijing China
Two open problems remain unsolved in the content based video retrieval area. Firstly, how to find useful information and express it by different features. Secondly, how to fuse the heterogeneous information together t... 详细信息
来源: 评论
Modeling the intrusion by using capability of attackers
Modeling the intrusion by using capability of attackers
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Liang-Min Wang Jian-Ming Zhang Jian-Feng Ma The Department of Computer Science Jiangsu University Zhenjiang China The Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University China
Modeling the intrusion is an open problem which is necessary to be solved in intrusion tolerance system. A model of state transition and its constructing algorithm is presented which is described with the capability o... 详细信息
来源: 评论
Provide privacy for mobile P2P systems
Provide privacy for mobile P2P systems
收藏 引用
International Conference on Distributed Computing systems Workshop
作者: Jinsong Han Yanmin Zhu Yunhao Liu Jianfeng Cai Lei Hu Department of Computer Science Hong Kong University of Science and Technology Hong Kong China Department of Computer Science Texas A and M University USA The State Key Laboratory of Information Security Chinese Academy and Sciences Beijing China
Nowadays privacy and anonymity have become an increasing requirement in wireless networks. However, current mobile peer-to-peer architectures have not taken into account anonymity, especially the mutual anonymity betw... 详细信息
来源: 评论
Study on routing security management scheme in multi-mobile agent system
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and information technology 2005年 第6期27卷 978-982页
作者: Wang, Ru-Chuan Huang, Hai-Ping Li, Ming-Yuan Dept. of Computer Science and Technology Nanjing University of Posts and Telecom. Nanjing 210003 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100039 China
The rapid development of E-business and network management has been promoting the broad applications on multi-mobile agents system. However, it made routing security management of this system more complex and flexible... 详细信息
来源: 评论
Application of string kernels in protein sequence classification
收藏 引用
Applied Bioinformatics 2005年 第1期4卷 45-52页
作者: Zaki, Nazar M. Deris, Safaai Illias, Rosli College of Information Technology United Arab Emirates University Al Ain United Arab Emirates Artificial Intelligence and Bioinformatics Laboratory Faculty of Computer Science and Information System Universiti Teknologi Skudai Johor Malaysia Department of Bioprocess Engineering Faculty of Chemical and Natural Resource Engineering Universiti Teknologi Skudai Johor Malaysia College of Information Technology United Arab Emirate University Al Ain PO Box 17555 United Arab Emirates
Introduction: The production of biological information has become much greater than its consumption. The key issue now is how to organise and manage the huge amount of novel information to facilitate access to this us... 详细信息
来源: 评论
Describing Service-Oriented Architecture by Extended Darwin
收藏 引用
Wuhan University Journal of Natural sciences 2005年 第6期10卷 971-976页
作者: ZHANG Tao SHEN Mei-e YING Shi YE Peng LIANG Zao-qing State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 Hubei China Computer Department Beijing Information Technology Institute Beijing 100101 China School of Computer Science Wuhan University of Science and Engineering Wuhan 430074 Hubei China
Describing Service-Oriented Architecture (SOA) is critical in the development of Web based system, in this paper, an approach for describing SOA by extended Darwin is proposed. The requirements for describing SOA, w... 详细信息
来源: 评论
Electronic voting scheme
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2005年 第10期16卷 1805-1810页
作者: Li, Yan-Jiang Ma, Chuan-Gui Huang, Liu-Sheng Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Department of Applied Mathematics PLA Information Engineering University Zhengzhou 450002 China Anhui Province-MOST Co-Key Laboratory of High Performance Computing and Application Hefei 230027 China
A dynamic multi-secrets sharing threshold scheme is presented to apply to a large scale electronic voting system with many talliers (tallying authorities). Even if there exists adaptive adversaries, this scheme can gu... 详细信息
来源: 评论