咨询与建议

限定检索结果

文献类型

  • 252 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 246 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 62 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 化学工程与技术
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 438 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
469 条 记 录,以下是331-340 订阅
排序:
GB-RC4: Effective brute force attacks on RC4 algorithm using GPU  7
GB-RC4: Effective brute force attacks on RC4 algorithm using...
收藏 引用
7th International Green and Sustainable computing Conference, IGSC 2016
作者: Xue, Pei Li, Tao Dong, Han Liu, Chunbo Ma, Wenjing Pei, Songwen College of Computer and Control Engineering Nankai University Tianjin300071 China Information Security Evaluation Center Civil Aviation University of China Tianjin300300 China Laboratory of Parallel Software and Computational Science State Key Laboratory of Computing Science Institute of Software CAS Beijing China Shanghai Key Lab of Modern Optical Systems Department of Computer Science and Engineering University of Shanghai for Science and Technology Shanghai200093 China
Encryption algorithms are applied to a variety of fields and the security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space search. RC4 algorithm has an extensive appl... 详细信息
来源: 评论
A sharp condition for exact support recovery of sparse signals with orthogonal matching pursuit
A sharp condition for exact support recovery of sparse signa...
收藏 引用
2016 IEEE International Symposium on Information Theory, ISIT 2016
作者: Wen, Jinming Zhou, Zhengchun Wang, Jian Tang, Xiaohu Mo, Qun College of Information Engineering Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China ENS de Lyon LIP Lyon69007 France School of Mathematics Southwest Jiaotong University Chengdu610031 China Dept. of Electrical and Computer Engineering Seoul National University Seoul151742 Korea Republic of Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu610031 China Department of Mathematics Zhejiang University Hangzhou310027 China
Support recovery of sparse signals from noisy measurements with orthogonal matching pursuit (OMP) has been extensively studied in the literature. In this paper, we show that for any K-sparse signal x, if the sensing m... 详细信息
来源: 评论
Survey on cyberspace security
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 5-47页
作者: ZHANG HuanGuo HAN WenBao LAI XueJia LIN DongDai MA JianFeng LI JianHua Computer School of Wuhan University State Key Laboratory of Mathematics Engineering and Advanced Computing Department of Computer Shanghai Jiaotong University Institute of Information Engineering Chinese Academy of Sciences School of Cyber Engineering Xidian University School of Information Security Engineering Shanghai Jiaotong University
Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace. Cyberspace is the collection of all info... 详细信息
来源: 评论
Empirical analysis of Rate Limiting + Leap Ahead (RL+LA) countermeasure against witty worm  15
Empirical analysis of Rate Limiting + Leap Ahead (RL+LA) cou...
收藏 引用
15th IEEE International Conference on computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and computing, PICom 2015
作者: Shahzad, Khurram Woodhead, Steve Internet Security Research Laboratory Department of Electrical and Computer Engineering University of Greenwich Chatham United Kingdom
Wormable system vulnerabilities continue to be identified and so fast spreading network worms continue to pose a threat to the internet infrastructure due to their increased virulence, speed and sophistication in succ... 详细信息
来源: 评论
Erratum to “An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model”
收藏 引用
security and Communication Networks 2017年 第1期2017卷
作者: Guomin Zhou Peng Zeng Xiaohui Yuan Siyuan Chen Kim-Kwang Raymond Choo Department of Computer and Information Technology Zhejiang Police College Hangzhou Zhejiang Province *** Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai *** Department of Computer Science and Engineering University of North Texas Denton TX 76203 USAunt.edu College of Information Engineering China University of Geosciences Wuhan *** Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX 78249 USAutsa.edu
来源: 评论
Empirical Analysis of Rate Limiting + Leap Ahead (RL+LA) Countermeasure against Witty Worm
Empirical Analysis of Rate Limiting + Leap Ahead (RL+LA) Cou...
收藏 引用
IEEE International Conference on Ubiquitous computing and Communications
作者: Khurram Shahzad Steve Woodhead Internet Security Research Laboratory Department of Electrical and Computer Engineering University of Greenwich Chatham UK
Wormable system vulnerabilities continue to be identified and so fast spreading network worms continue to pose a threat to the internet infrastructure due to their increased virulence, speed and sophistication in succ... 详细信息
来源: 评论
Radiation constrained wireless charger placement
Radiation constrained wireless charger placement
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Haipeng Dai Yunhuai Liu Alex X. Liu Lingtao Kong Guihai Chen Tian He State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu CHINA Third Research Institute of Ministry of Public Security Shanghai CHINA Shanghai key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China Computer Science and Engineering University of Minnesota Minneapolis MN USA Department of Automation Shanghai Jiao Tong University Shanghai China
Wireless Power Transfer has become a commercially viable technology to charge devices because of the convenience of no power wiring and the reliability of continuous power supply. This paper concerns the fundamental i... 详细信息
来源: 评论
A sharp condition for exact support recovery of sparse signals with orthogonal matching pursuit
A sharp condition for exact support recovery of sparse signa...
收藏 引用
IEEE International Symposium on Information Theory
作者: Jinming Wen Zhengchun Zhou Jian Wang Xiaohu Tang Qun Mo College of Information Engineering Shenzhen University Shenzhen China ENS de Lyon LIP Lyon France School of Mathematics Southwest Jiaotong University Chengdu China Dept. of Electrical & Computer Engineering Seoul National University Seoul Korea Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu China Department of Mathematics Zhejiang University Hangzhou China
Support recovery of sparse signals from noisy measurements with orthogonal matching pursuit (OMP) has been extensively studied in the literature. In this paper, we show that for any K-sparse signal x, if the sensing m... 详细信息
来源: 评论
Fast approximate matching of binary codes with distinctive bits
收藏 引用
Frontiers of computer Science 2015年 第5期9卷 741-750页
作者: Chenggang Clarence YAN Hongtao XIE Bing ZHANG Yanping MA Qiong DAI Yizhi LIU Institute of Information Engineering Chinese Academy of Sciences National Engineering Laboratory for Information Security Technologies Beijing 100093 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Department of Automation Tsinghua University Beijing 100083 China School of Physics Beijing Institute of Technology Beijing 100081 China School of Information Science and Engineering Ocean University of China Qingdao 266100 China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan 411201 China
Although the distance between binary codes can be computed fast in Hamming space, linear search is not practical for large scale datasets. Therefore attention has been paid to the efficiency of performing approximate ... 详细信息
来源: 评论
Dynamic resource provision for cloud broker with multiple reserved instance terms  1
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Zhang, Jiangtao Chen, Shi Huang, Hejiao Wang, Xuan Du, Dingzhu School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School Shenzhen518055 China Public Service Platform of Mobile Internet Application Security Industry Shenzhen518057 China Shenzhen Key Laboratory of Internet of Information Collaboration Shenzhen518055 China Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application Shenzhen518055 China Department of Computer Science University of Texas at Dallas RichardsonTX75080 United States
Relying on the knowledge of the pricing benefit of long-term reserved resource and multiplexing gains, cloud broker strives to minimize its cost by utilizing infrastructure resources from public cloud service provider... 详细信息
来源: 评论