咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3661-3670 订阅
排序:
Authenticated public-key encryption based on elliptic curve
Authenticated public-key encryption based on elliptic curve
收藏 引用
International Conference on Embedded Software and systems
作者: Yiliang Han Xiaoyuan Yang Yupu Hu Key Laboratory of Network and Information Security A.P.FDepartment of Electronic Technology Engineering College of A. P. F Xi'an China College of Computer Science Xidian University Xi'an China
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm EC... 详细信息
来源: 评论
Spectral feature analysis
Spectral feature analysis
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Fei Wang Jingdong Wang Changshui Zhang State Key Laboratory of Intelligent Technology and System Department of Automation Tsinghua University Beijing China Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay Hong Kong China
We have seen a surge of interest in spectral-based methods and kernel-based methods for machine learning and data mining. Despite the significant research, these methods remain only loosely related. In this paper, we ... 详细信息
来源: 评论
Phishing Web page detection
Phishing Web page detection
收藏 引用
International Conference on Document Analysis and Recognition
作者: Liu Wenyin Guanglin Huang Liu Xiaoyue Xiaotie Deng Zhang Min Department of Computer Science City University of Hong Kong Hong Kong China State Key Laboratory of Intelligent Technology & System Tsinghua University Beijing China
An approach to detection of phishing Web pages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution to antiphishing. A legitimate Web page owner can use this approach to se... 详细信息
来源: 评论
Intelligent Meeting Room: Facilitating Collaboration for Multi Mobile Devices on Contextual information
Intelligent Meeting Room: Facilitating Collaboration for Mul...
收藏 引用
The 8th International Conference on computer Supported Cooperative Work in Design(第八届计算机支持的协同工作设计国际会议)(CSCWD2004)
作者: Enyi CHEN Yuanchun SHI Degan ZHANG Guangyou XU The State Key Laboratory of Intelligence System and Technology Department of Computer Science and Technology Tsinghua University Beijing 100084
This paper presents the Intelligent Meeting Room, anongoing project dedicated to the development of anaugmented meeting room. which facilitates participantswith mobile device to argue or discuss their ideas. Forpresen... 详细信息
来源: 评论
Publicly verifiable auctions with minimal leakage
Publicly verifiable auctions with minimal leakage
收藏 引用
Proceedings of the 28th Annual International computer Software and Applications Conference, COMPSAC 2004
作者: Wu, Qianhong Wang, Changjie Chen, Xiaofeng Wang, Yumin State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China Department of Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong School of Information Science and Technology Sun Yat-sen University Guangzhou 510275 China
Publicly verifiable sealed electronic auctions are proposed. The schemes enjoy the following advantages. They require no special trusted parties. After bid opening phase, only the winning price is revealed and the rel... 详细信息
来源: 评论
TMS: Targeted marketing system based on market value functions
TMS: Targeted marketing system based on market value functio...
收藏 引用
Proceedings - IEEE/WIC/ACM International Conference on Web Intelligence, WI 2004
作者: Huang, Jiajin Zhong, Ning Liu, Chunnian Yao, Y.Y. Qiu, Dejun Ou, Chuangxin Coll. of Comp. Sci. and Technology Beijing University of Technology Beijing Municipal Key Laboratory Beijing 100022 China Dept. of Information Engineering Maebashi Institute of Technology 460-1 Kammisadori-Cho Maebashi 371-0816 Japan Department of Computer Science University of Regina Regina Sask. Canada
TMS (Targeted Marketing system) is an integrated system and toolkit for profit-driven and cost-effective marketing. The system consists of three components: a Web-based user interface, a market value inference engine,... 详细信息
来源: 评论
TMS: Targeted Marketing system Based on Market Value Functions  04
TMS: Targeted Marketing System Based on Market Value Functio...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Jiajin Huang Ning Zhong Chunnian Liu Y.Y. Yao Dejun Qiu Chuangxin Ou College of Computer Science and Technology Multimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing University of Technology Beijing China Department of Information Engineering Maebashi Institute of Technology Maebashi Japan Department of Computer Science University of Regina Regina SAS Canada
TMS (Targeted Marketing system) is an integrated system and toolkit for profit-driven and cost-effective marketing. The system consists of three components: a Web-based user interface, a market value inference engine,... 详细信息
来源: 评论
An effective iris recognition system for identification of humans
An effective iris recognition system for identification of h...
收藏 引用
IEEE International Conference on Multi Topic
作者: M.K. Khan J. Zhang S.-J. Horng Research Group for Biometrics (RGB) Key Laboratory Signal and Information Processing Southwest Jiaotong University Chengdu Sichuan China Department of Computer Science & Information Engineering National Taiwan University of Science and Technology Taipei Taiwan
In this paper, identification and verification approach based on human iris pattern is presented. The system is based on several steps from capturing the iris pattern, determining and localizing the iris boundaries, t... 详细信息
来源: 评论
A Multi-layers Neural Network Model based on Characteristics of Ganglions' Receptive Fields in Retina and an Algorithm for Watchfulness-keeping
A Multi-layers Neural Network Model based on Characteristics...
收藏 引用
The Third Asian Conference on Vision (ACV2004)
作者: 危辉 陆汝钤 Department of Computer Science Lab of Algorithm for Cognitive Model Brain Science Research Center Fudan University Shanghai 200433 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing 100080 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing 100080 China
Machine vision is an active branch of Artificial Intelligence. An important problem in this area is the balance among efficiency, accuracy and huge computing. The visual system of human can keep watchfulness to the pe... 详细信息
来源: 评论
Study on automatic degasification system of hydrocarbon component in rock cuttings
Study on automatic degasification system of hydrocarbon comp...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Hong He Shi-Jiu Jin Xi-Jun Tong Wen-Min Yang Department of Opto Electronic Information and Electronic Engineering Tianjin University of Technology Tianjin China State Key Laboratory for Precision Measuring Technology and Instruments Tianjin University TJU Tianjin China Department of Computer Science Tianjin Administration academy Tianjin China
With the development of well drilling technique and the reform on drill bit technique, each oil field has adopted new PDC drill bit to smash rock cuttings. However, the severely mixed cuttings have greatly increased t... 详细信息
来源: 评论