咨询与建议

限定检索结果

文献类型

  • 1,740 篇 期刊文献
  • 1,514 篇 会议

馆藏范围

  • 3,254 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,126 篇 工学
    • 1,047 篇 计算机科学与技术...
    • 820 篇 软件工程
    • 427 篇 信息与通信工程
    • 375 篇 电子科学与技术(可...
    • 349 篇 电气工程
    • 256 篇 控制科学与工程
    • 169 篇 化学工程与技术
    • 158 篇 机械工程
    • 146 篇 材料科学与工程(可...
    • 142 篇 仪器科学与技术
    • 125 篇 生物工程
    • 124 篇 光学工程
    • 120 篇 网络空间安全
    • 108 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 环境科学与工程(可...
    • 63 篇 安全科学与工程
    • 57 篇 建筑学
    • 55 篇 生物医学工程(可授...
  • 1,273 篇 理学
    • 488 篇 数学
    • 472 篇 物理学
    • 163 篇 生物学
    • 157 篇 统计学(可授理学、...
    • 147 篇 大气科学
    • 142 篇 化学
    • 92 篇 系统科学
  • 400 篇 管理学
    • 267 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 82 篇 法学
  • 77 篇 医学
    • 55 篇 临床医学
  • 57 篇 农学
  • 54 篇 军事学
  • 38 篇 经济学
  • 7 篇 艺术学
  • 6 篇 教育学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 66 篇 cryptography
  • 54 篇 feature extracti...
  • 49 篇 authentication
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 deep learning
  • 41 篇 privacy
  • 40 篇 information secu...
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 39 篇 training
  • 35 篇 optimization
  • 35 篇 computational mo...
  • 33 篇 quantum cryptogr...
  • 32 篇 protocols
  • 27 篇 blockchain
  • 26 篇 neural networks
  • 26 篇 machine learning
  • 24 篇 data mining
  • 23 篇 predictive model...

机构

  • 174 篇 state key labora...
  • 150 篇 national key lab...
  • 113 篇 university of ch...
  • 84 篇 department of co...
  • 81 篇 school of softwa...
  • 69 篇 information secu...
  • 67 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 44 篇 state key labora...
  • 37 篇 key laboratory f...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 34 篇 state key labora...
  • 32 篇 shandong provinc...
  • 31 篇 science and tech...
  • 27 篇 state key labora...
  • 26 篇 beijing institut...
  • 26 篇 key laboratory o...

作者

  • 32 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 30 篇 yuan yuan
  • 26 篇 huang wei
  • 26 篇 zhang yichen
  • 26 篇 ai bo
  • 24 篇 wang wei
  • 23 篇 zhao jinjing
  • 22 篇 li yang
  • 19 篇 xiu-bo chen
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 19 篇 xiaohui kuang
  • 19 篇 xu bingjie
  • 18 篇 xiaochun cao
  • 18 篇 wang qing
  • 18 篇 gang xu
  • 17 篇 qing wang
  • 17 篇 li jin
  • 17 篇 yang yang

语言

  • 2,989 篇 英文
  • 153 篇 中文
  • 109 篇 其他
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3254 条 记 录,以下是3181-3190 订阅
排序:
Simulation study of electromagnetism forward problem of brain impedance network
Simulation study of electromagnetism forward problem of brai...
收藏 引用
Proceedings of the Biannual World Automation Congress
作者: Danmei Huang Zhanlong Zhang Xihong Wu Ke Wang State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University China National 863 plans projects The Natural Science Foundation of Chongqing China
Based on electromagnetism and electricity network theory a kind of brain impedance network mode is built in the paper. And in order to study the relation between impedance of bleeding or shortness of blood encephalic ... 详细信息
来源: 评论
An improved back-projection algorithm for electrical impedance tomography
An improved back-projection algorithm for electrical impedan...
收藏 引用
Proceedings of the Biannual World Automation Congress
作者: Qingyou Zhu CiYong Luo ZhanLong Zhong MinYou Chen State Key Laboratory of Power Transmission Equipment & System Security and New Technology Electrical Engineering of Chongqing University Chongqing China Department of Physicsand electronic information Engineering Yangtze Normal University Fuling China
The dynamic algorithm of back-projection has been widely used in electrical impedance tomography (EIT) systems due to its simplicity and feasibility. However, the impedance images produced by back-projection algorithm... 详细信息
来源: 评论
Proxy blind signature scheme and a multi-proxy blind signature scheme based on XTR
收藏 引用
Journal of information and Computational science 2008年 第1期5卷 305-312页
作者: Zhang, Jianhong Ji, Cheng Mao, Jian College of Sciences North China University of Technology Beijing 100041 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China Institute of Computer Science and Technology Peking University Beijing 100871 China
The definition of XTR system, which is based on the elements' trace compact denotation in the subgroup of the multiplicative group of the finite field, is a new public key system. We propose two signature schemes ... 详细信息
来源: 评论
Effective Predicate Abstraction for Program Verification
Effective Predicate Abstraction for Program Verification
收藏 引用
第二届IFIP/IEEE软件工程理论基础国际研讨会(TASE 2008)(Second IFIP/IEEE International Symposium on Theoretical Aspects of Software Engineering)
作者: Li Li Ming Gu Xiaoyu Song Jianmin Wang Dept.Computer Science & Technology Tsinghua University Beijing China Key Laboratory for Informati Key Laboratory for Information System Security Ministry of Education China School of Software Tsin Dept.ECE Portland State University Oregon USA School of Software Tsinghua University Beijing China Dept.ECE Portland State University Oregon
The paper presents a new approach to computing the abstract state and a maximum weight heuristic method for finding the shortest counter-example in verification of imperative programs. The strategy is incorporated in ... 详细信息
来源: 评论
Solving Sum and Product Riddle via BDD-Based Model Checking
Solving Sum and Product Riddle via BDD-Based Model Checking
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Xiangyu Luo Kaile Su Abdul Sattar Yan Chen Tsinghua National Laboratory for Information Science and Technology Key Laboratory of Security for Information System of Ministry of Education School of Software Tsinghua University Beijing China Department of Computer Science Guilin University of Electronic and Technology Guilin China School of Electronics Engineering and Computer Science Peking University Beijing China Institute for Integrated and Intelligent Systems Griffith University Brisbane QLD Australia
We model the sum and product riddle in public announcement logic, which is interpreted on an epistemic Kripke model. The model is symbolically represented as a finite state program with n agents. A model checking meth... 详细信息
来源: 评论
Breaking Instance II of New TTM Cryptosystems
Breaking Instance II of New TTM Cryptosystems
收藏 引用
International Conference on Intelligent information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Xuyun Nie Xin Jiang Lei Hu Jintai Ding Zhiguang Qin School of Computer Science and Engineering University of Electronic Science and Technology Chengdu China State Key Laboratory of Information Security Chinese Academy of Sciences Beijing China Department of Mathematical Sciences University of Cincinnati Cincinnati OH USA
TTM (tame transformation method) is a type of multivariate public key cryptosystem. In 2007, the inventor of TTM proposed two new instances of TTM to resist the existing attacks, in particular, the Nie et al attack. T... 详细信息
来源: 评论
Modified min-sum decoding algorithm for LDPC codes based on classified correction
Modified min-sum decoding algorithm for LDPC codes based on ...
收藏 引用
International Conference on Communications and Networking in China (CHINACOM)
作者: Zhou Zhong Yunzhou Li Xiang Chen Hanying Hu Jing Wang State Key Laboratory on Microwave and Digital Communications National Laboratory for Information Science and Technology Department of Electronic Engineering Tsinghua University Beijing China National Digital Switching System Engineering and Technological Research and Development Center Zhengzhou China
In this paper, a modified min-sum decoding algorithm based on classified correction is proposed for low density parity check (LDPC) codes. Different from the single correction in the normalized belief propagation (BP)... 详细信息
来源: 评论
Research on rough set theory and applications in China
收藏 引用
Lecture Notes in Computer science
作者: Wang, Guoyin Zhang, Qinghua Huang, Houkuan Ye, Dongyi Hu, Qinghua Hu, Xuegang Shi, Zhongzhi Li, Yongli Shang, Lin An, Liping Sai, Ying Chen, Shanben Liang, Jiye Qin, keyun Zeng, Huanglin Xie, Keming Miao, Duoqian Min, Fan Wu, Zhaocong Wu, Weizhi Dai, Jianhua Institute of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing 400065 China School of Information Science and Technology Southwest Jiaotong University Chengdu 610031 China School of Computer and Information Technology Beijing Jiaotong University Beijing 100044 China College of Math. and Computer Fuzhou University Fuzhou 350002 China Harbin Institute of Technology PO Box 458 Harbin 150006 China School of Computer and Information Hefei University of Technology Hefei 230009 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Lanzhou University No.222 Tianshui South Rd. Lanzhou 730000 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Management Science and Engineering Department Business School Nankai University Tianjin 300071 China Shandong University of Finance No.40 Shun-geng Road Jinan 250014 China Welding Engineering Institute Shanghai Jiaotong University Shanghai 200030 China School of Computer and Information Technology Shanxi University Taiyuan 030006 China Intelligent Control Development Center Southwest Jiaotong University Chengdu 610031 China Artificial Intelligence of Key Laboratory Sichuan University of Science and Engineering Zigong 643000 China Department of Automation College of Information Engineering Taiyuan University of Technology Taiyuan 030024 China 4800 CaoAn Highway Shanghai 201804 China School of Computer Science and Technology University of Electronic Science and Technology of China Chengdu 610054 China School of Remote Sensing Information Engineering Wuhan University Wuhan 430079 China Institute for Information and System Sciences Faculty of Science Xi'an Jiaotong University Xi'an 710049 China Information College Zhejiang Ocean University Zhejiang 316004 China Institute of Artificial Intelligence Zhejiang University Hangzhou 310027 China
This article gives a capsule view of research on rough set theory and applications ongoing at universities and laboratories in China. Included in this capsule view of rough set research is a brief description of the f... 详细信息
来源: 评论
Error bounded algorithm for approximate B-spline surface skinning
收藏 引用
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics 2008年 第11期20卷 1477-1482页
作者: Wang, Wenke Zhang, Hui Wang, Bin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
B-spline surface skinning is a commonly used tool in surface modeling. Huge amounts of control points will be introduced in the skinned surface by traditional skinning approach. This paper proposes an efficient approx... 详细信息
来源: 评论
Pointwise Logic on Completely Distributive Lattices and Approximate Reasoning
Pointwise Logic on Completely Distributive Lattices and Appr...
收藏 引用
International Conference on Fuzzy systems and Knowledge Discovery (FSKD)
作者: Yalin Zheng Guang Yang Jing Zheng Jinsheng Xing State Key Laboratory for Intelligent Technology and Systems Department of Automation Faculty of Information Science and Technology Tsinghua University Beijing China Research Center of Intelligent Information Technology Department of Computer Science and Technology Faculty of Software Dongguan University of Science and Technology Dongguan China Research Center of Dongguan Economy Department of Economy and Commerce Dongguan University of Science and Technology Dongguan China Faculty of Mathematics and Computer Science Shanxi Normal University Linfen China Research Center of System Engineering Faculty of Electronic and Information Engineering Xi'an Jiaotong University Xi'an China
In this paper, we propose the basic framework of point- wise topological logic on completely distributive lattices and explore approximate reasoning in it. The logic of this paper is based on pointwise characterizatio... 详细信息
来源: 评论