咨询与建议

限定检索结果

文献类型

  • 1,410 篇 期刊文献
  • 51 篇 会议

馆藏范围

  • 1,461 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,254 篇 工学
    • 617 篇 计算机科学与技术...
    • 319 篇 网络空间安全
    • 262 篇 软件工程
    • 192 篇 电子科学与技术(可...
    • 157 篇 仪器科学与技术
    • 152 篇 信息与通信工程
    • 150 篇 控制科学与工程
    • 136 篇 机械工程
    • 41 篇 电气工程
    • 33 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 20 篇 光学工程
    • 14 篇 地质资源与地质工...
    • 13 篇 材料科学与工程(可...
    • 13 篇 动力工程及工程热...
    • 13 篇 建筑学
    • 13 篇 测绘科学与技术
    • 12 篇 公安技术
    • 11 篇 环境科学与工程(可...
  • 233 篇 管理学
    • 223 篇 管理科学与工程(可...
  • 206 篇 理学
    • 76 篇 数学
    • 65 篇 物理学
    • 16 篇 系统科学
    • 9 篇 地理学
  • 71 篇 军事学
    • 71 篇 军队指挥学
  • 35 篇 医学
    • 23 篇 临床医学
  • 25 篇 农学
    • 11 篇 农业资源与环境
  • 24 篇 艺术学
    • 22 篇 设计学(可授艺术学...
  • 22 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
    • 13 篇 教育学
  • 11 篇 法学
  • 11 篇 文学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 68 篇 blockchain
  • 61 篇 security
  • 31 篇 machine learning
  • 30 篇 deep learning
  • 28 篇 system
  • 26 篇 cloud computing
  • 24 篇 information secu...
  • 23 篇 internet of thin...
  • 22 篇 cryptography
  • 21 篇 image encryption
  • 19 篇 privacy
  • 18 篇 authentication
  • 16 篇 trusted computin...
  • 16 篇 encryption
  • 14 篇 access control
  • 14 篇 information
  • 14 篇 cloud
  • 14 篇 network security
  • 14 篇 data
  • 12 篇 network

机构

  • 22 篇 school of comput...
  • 18 篇 school of comput...
  • 17 篇 school of cyber ...
  • 14 篇 state key labora...
  • 13 篇 state key labora...
  • 13 篇 institute of inf...
  • 11 篇 school of softwa...
  • 11 篇 school of softwa...
  • 11 篇 university of ch...
  • 11 篇 school of comput...
  • 10 篇 school of inform...
  • 10 篇 state key labora...
  • 10 篇 information secu...
  • 9 篇 school of electr...
  • 9 篇 department of co...
  • 9 篇 state key labora...
  • 8 篇 ieee
  • 8 篇 school of electr...
  • 8 篇 state key labora...
  • 8 篇 school of comput...

作者

  • 13 篇 zhang huanguo
  • 11 篇 gang xu
  • 9 篇 xiu-bo chen
  • 9 篇 jianfeng ma
  • 8 篇 wei li
  • 8 篇 kim-kwang raymon...
  • 8 篇 wei zhang
  • 8 篇 jinyue xia
  • 7 篇 xin liu
  • 7 篇 bo zhao
  • 7 篇 xiaolong xu
  • 7 篇 muhammad adnan k...
  • 6 篇 hai jin
  • 6 篇 xiubo chen
  • 6 篇 yongjun ren
  • 6 篇 qi wang
  • 6 篇 qihui wu
  • 6 篇 wei wang
  • 6 篇 taher m.ghazal
  • 5 篇 jianwei liu

语言

  • 1,343 篇 英文
  • 118 篇 中文
检索条件"机构=School of Software and Key Laboratory for Information System Security"
1461 条 记 录,以下是1-10 订阅
排序:
A Cross-Multi-Domain Trust Assessment Authority Delegation Method Based on Automotive Industry Chain
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 407-426页
作者: Binyong Li Liangming Deng Jie Zhang Xianhui Deng school of Cybersecurity(Xin Gu Industrial College) Chengdu University of Information TechnologyChengdu610225China Advanced Cryptography and system security key laboratory of Sichuan Province Chengdu610225China SUGON Industrial Control and security Center Chengdu610225China
To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply rel... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Prospects on mangrove knowledge services in the smart era: From plant atlas to knowledge graphs
收藏 引用
Science China Earth Sciences 2025年 第1期68卷 111-127页
作者: Zhi-Wei HOU Wenlong JING Cheng-Zhi QIN Ji YANG Qing XIA Xiaoling YIN key laboratory of Guangdong for Utilization of Remote Sensing and Geographical information system Guangdong Open Laboratory of Geospatial Information Technology and Application Guangzhou Institute of Geography Guangdong Academy of Sciences Southern Marine Science and Engineering Guangdong laboratory (Guangzhou) State key laboratory of Resources and Environmental information system Institute of Geographic Sciences and Natural Resources ResearchChinese Academy of Sciences College of Resources and Environment University of Chinese Academy of Sciences school of Traffic & Transportation Engineering Changsha University of Science and Technology
Mangroves are crucial to the ecological security of the Earth and human well-being. Their management, conservation, and restoration are of great importance and necessitate the support of spatio-temporal information an... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 799-816页
作者: Congcong Wang Chen Wang Wenying Zheng Wei Gu school of software Nanjing University of Information Science and TechnologyNanjing210044China school of information Science and Engineering Zhejiang Sci-Tech UniversityHangzhou310018China State key laboratory of Public Big Data Guizhou UniversityGuiyang550025China school of Computer Science and Technology(school of Artificial Intelligence) Zhejiang Sci-Tech UniversityHangzhou310018China school of Computer Science(school of Cyber Science and Engineering) Nanjing University of Information Science and TechnologyNanjing210044China
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy conce... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
QoS Requirement Generation and Algorithm Selection for Composite Service Based on Reference Vector
收藏 引用
Journal of Computer Science & Technology 2009年 第2期24卷 357-372页
作者: 吴邦欲 支志雄 徐世杰 顾明 孙家广 school of software Tsinghua University key laboratory for information system security Ministry of Education of China Department of Computer Science and Technology Tsinghua University
Under SOA (Service-Oriented Architecture), composite service is formed by aggregating multiple component services together in a given workflow. One key criterion of this research topic is QoS composition. Most work ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Dominant Skyline Query Processing over Multiple Time Series
收藏 引用
Journal of Computer Science & Technology 2013年 第4期28卷 625-635页
作者: 汪浩 王朝坤 徐亚军 宁苑池 Department of Computer Science and Technology Tsinghua University Tsinghua National laboratory for information Science and Technology key laboratory for information system security Ministry of Education school of software Tsinghua University
Multiple time series (MTS), which describes an object in multi-dimensions, is based on single time series and has been proved to be useful. In this paper, a new analytical method called α/β-Dominant-Skyline on MTS... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Integrated importance measure for multi-state coherent systems of k level
收藏 引用
Journal of systems Engineering and Electronics 2013年 第6期24卷 1029-1037页
作者: Xibin Zhao Shubin Si Hongyan Dui Zhiqiang Cai Shudong Sun key laboratory for information system security of Ministry of Education School of SoftwareTsinghua University Ministry of Education key laboratory of Contemporary Design and Integrated Manufacturing Technology School of MechatronicsNorthwestern Polytechnical University
To verify the effectiveness of the integrated importance measure (IIM) for multi-state coherent systems of k level, the definition and physical meaning of IIM are demonstrated. Then, the improvement potential and Δ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Hierarchical Ensemble Learning Framework for Energy-Efficient Automatic Train Driving
收藏 引用
Tsinghua Science and Technology 2019年 第2期24卷 226-237页
作者: Guohua Xi Xibin Zhao Yan Liu Jin Huang Yangdong Deng CRRC Corporation Limited school of software and key laboratory for information system security Ministry of Education (KLISS)/Beijing National Research Center for Information Science and Technology (BNRist) Tsinghua University
Railway transportation plays an important role in modern society. As China's massive railway transportation network continues to grow in total mileage and operation density, the energy consumption of trains becomes a ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SMT-based query tracking for differentially private data analytics systems
收藏 引用
Frontiers of Computer Science 2018年 第6期12卷 1192-1207页
作者: Chen LUO Fei HE Tsinghua National laboratory for information Science and Technology (TNList) School of SoftwareTsinghua UniversityBeijing 100084China key laboratory for information system security Ministry of EducationTsinghua UniversityBeijing 100084China
Differential privacy enables sensitive data to be analyzed in a privacy-preserving manner. In this paper, we focus on the online setting where each analyst is assigned a privacy budget and queries the data interactive... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A B-spline curve extension algorithm
收藏 引用
Science China(information Sciences) 2016年 第3期59卷 37-45页
作者: Yang LU Kanle SHI Junhai YONG Hejin GU Haichuan SONG school of software Tsinghua University Department of Computer Science and Technology Tsinghua University key laboratory for information system security Ministry of Education of China Tsinghua National laboratory for information Science and Technology Jiangxi Academy of Science
B-spline curve extension is an important operation in computer aided design systems. In this paper,we present a new extension algorithm for B-spline curves. The algorithm uses curve unclamping to generate a uniform B-... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
TAR~*:an improved process similarity measure based on unfolding of Petri nets
收藏 引用
计算机集成制造系统 2012年 第8期18卷 1774-1784页
作者: WANG Wen-xing WANG Jian-min school of software Tsinghua University Beijing 100084 China Ministry of Education key laboratory for information system security Tsinghua UniversityBeijing 100084 China Tsinghua National laboratory for information Science and Technology Beijing 100084 China
Determining the similarity degree between process models was very important for their management,reuse,and *** approaches either focused on process model's structural aspect,or had inefficiency or imprecision in behav... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论