咨询与建议

限定检索结果

文献类型

  • 261 篇 期刊文献
  • 220 篇 会议
  • 2 册 图书

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 347 篇 工学
    • 256 篇 计算机科学与技术...
    • 192 篇 软件工程
    • 89 篇 信息与通信工程
    • 64 篇 电气工程
    • 41 篇 电子科学与技术(可...
    • 33 篇 控制科学与工程
    • 28 篇 生物工程
    • 28 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 7 篇 化学工程与技术
  • 142 篇 理学
    • 80 篇 数学
    • 33 篇 物理学
    • 30 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 7 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 federated learni...
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 department of co...

作者

  • 11 篇 eui-nam huh
  • 9 篇 cao xiaochun
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 7 篇 luo xiangyang
  • 7 篇 lu wei
  • 6 篇 mcdaniel patrick
  • 6 篇 zhou jiantao
  • 6 篇 cao jiannong
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...

语言

  • 437 篇 英文
  • 42 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
483 条 记 录,以下是341-350 订阅
排序:
Unified quantum no-go theorems and transforming of quantum states in a restricted set
arXiv
收藏 引用
arXiv 2017年
作者: Luo, Ming-Xing Li, Hui-Ran Lai, Hong Wang, Xiaojun Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu610031 China Department of Physics University of Michigan Ann ArborMI48109 United States School of Computer and Information Science Southwest University Chongqing400715 China School of Electronic Engineering Dublin City University Dublin 9 Ireland
The linear superposition principle in quantum mechanics is essential for several no-go theorems such as the no-cloning theorem, the no-deleting theorem and the no-superposing theorem. It remains an open problem of fin... 详细信息
来源: 评论
Modularity based community detection with deep learning  25
Modularity based community detection with deep learning
收藏 引用
25th International Joint Conference on Artificial Intelligence, IJCAI 2016
作者: Liang, Yang Cao, Xiaochun He, Dongxiao Chuan, Wang Xiao, Wang Weixiong, Zhang State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China School of Information Engineering Tianjin University of Commerce China School of Computer Science and Technology Tianjin Key Laboratory of Cognitive Computing and Application Tianjin University China Department of Computer Science and Technology Tsinghua University China College of Math and Computer Science Institute for Systems Biology Jianghan University China Department of Computer Science and Engineering Washington University St. Louis United States
Identification of module or community structures is important for characterizing and understanding complex systems. While designed with different objectives, i.e., stochastic models for regeneration and modularity max... 详细信息
来源: 评论
Performance analysis of parallel replica molecular dynamics
收藏 引用
AIP Conference Proceedings 2018年 第1期1978卷
作者: Boyao Zhang Jue Wang Yangde Feng Ji Xiang Lei Wang 1Computer Network Information Center Chinese Academy of Science Department of High Performance Computing Technology and Application Development Beijing China 2University of Chinese Academy of Sciences Beijing China 3State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China 4School of cybersecurity Chinese Academy of Sciences China
Molecular dynamics simulation is an important tool for studying materials microstructure evolution under radiation effects. It is difficult to simulate atomic diffusion in materials owing to the time-scale limitations...
来源: 评论
GB-RC4: Effective brute force attacks on RC4 algorithm using GPU  7
GB-RC4: Effective brute force attacks on RC4 algorithm using...
收藏 引用
7th International Green and Sustainable computing Conference, IGSC 2016
作者: Xue, Pei Li, Tao Dong, Han Liu, Chunbo Ma, Wenjing Pei, Songwen College of Computer and Control Engineering Nankai University Tianjin300071 China Information Security Evaluation Center Civil Aviation University of China Tianjin300300 China Laboratory of Parallel Software and Computational Science State Key Laboratory of Computing Science Institute of Software CAS Beijing China Shanghai Key Lab of Modern Optical Systems Department of Computer Science and Engineering University of Shanghai for Science and Technology Shanghai200093 China
Encryption algorithms are applied to a variety of fields and the security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space search. RC4 algorithm has an extensive appl... 详细信息
来源: 评论
A sharp condition for exact support recovery of sparse signals with orthogonal matching pursuit
A sharp condition for exact support recovery of sparse signa...
收藏 引用
2016 IEEE International Symposium on Information Theory, ISIT 2016
作者: Wen, Jinming Zhou, Zhengchun Wang, Jian Tang, Xiaohu Mo, Qun College of Information Engineering Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China ENS de Lyon LIP Lyon69007 France School of Mathematics Southwest Jiaotong University Chengdu610031 China Dept. of Electrical and Computer Engineering Seoul National University Seoul151742 Korea Republic of Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu610031 China Department of Mathematics Zhejiang University Hangzhou310027 China
Support recovery of sparse signals from noisy measurements with orthogonal matching pursuit (OMP) has been extensively studied in the literature. In this paper, we show that for any K-sparse signal x, if the sensing m... 详细信息
来源: 评论
Survey on cyberspace security
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 5-47页
作者: ZHANG HuanGuo HAN WenBao LAI XueJia LIN DongDai MA JianFeng LI JianHua Computer School of Wuhan University State Key Laboratory of Mathematics Engineering and Advanced Computing Department of Computer Shanghai Jiaotong University Institute of Information Engineering Chinese Academy of Sciences School of Cyber Engineering Xidian University School of Information Security Engineering Shanghai Jiaotong University
Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace. Cyberspace is the collection of all info... 详细信息
来源: 评论
Empirical analysis of Rate Limiting + Leap Ahead (RL+LA) countermeasure against witty worm  15
Empirical analysis of Rate Limiting + Leap Ahead (RL+LA) cou...
收藏 引用
15th IEEE International Conference on computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and computing, PICom 2015
作者: Shahzad, Khurram Woodhead, Steve Internet Security Research Laboratory Department of Electrical and Computer Engineering University of Greenwich Chatham United Kingdom
Wormable system vulnerabilities continue to be identified and so fast spreading network worms continue to pose a threat to the internet infrastructure due to their increased virulence, speed and sophistication in succ... 详细信息
来源: 评论
Erratum to “An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model”
收藏 引用
security and Communication Networks 2017年 第1期2017卷
作者: Guomin Zhou Peng Zeng Xiaohui Yuan Siyuan Chen Kim-Kwang Raymond Choo Department of Computer and Information Technology Zhejiang Police College Hangzhou Zhejiang Province *** Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai *** Department of Computer Science and Engineering University of North Texas Denton TX 76203 USAunt.edu College of Information Engineering China University of Geosciences Wuhan *** Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX 78249 USAutsa.edu
来源: 评论
Empirical Analysis of Rate Limiting + Leap Ahead (RL+LA) Countermeasure against Witty Worm
Empirical Analysis of Rate Limiting + Leap Ahead (RL+LA) Cou...
收藏 引用
IEEE International Conference on Ubiquitous computing and Communications
作者: Khurram Shahzad Steve Woodhead Internet Security Research Laboratory Department of Electrical and Computer Engineering University of Greenwich Chatham UK
Wormable system vulnerabilities continue to be identified and so fast spreading network worms continue to pose a threat to the internet infrastructure due to their increased virulence, speed and sophistication in succ... 详细信息
来源: 评论
Radiation constrained wireless charger placement
Radiation constrained wireless charger placement
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Haipeng Dai Yunhuai Liu Alex X. Liu Lingtao Kong Guihai Chen Tian He State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu CHINA Third Research Institute of Ministry of Public Security Shanghai CHINA Shanghai key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China Computer Science and Engineering University of Minnesota Minneapolis MN USA Department of Automation Shanghai Jiao Tong University Shanghai China
Wireless Power Transfer has become a commercially viable technology to charge devices because of the convenience of no power wiring and the reliability of continuous power supply. This paper concerns the fundamental i... 详细信息
来源: 评论