咨询与建议

限定检索结果

文献类型

  • 41,477 篇 会议
  • 896 册 图书
  • 384 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 42,756 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 29,125 篇 工学
    • 22,483 篇 计算机科学与技术...
    • 15,086 篇 软件工程
    • 7,383 篇 控制科学与工程
    • 4,867 篇 信息与通信工程
    • 3,691 篇 电气工程
    • 2,263 篇 机械工程
    • 2,147 篇 生物工程
    • 2,067 篇 生物医学工程(可授...
    • 1,562 篇 电子科学与技术(可...
    • 1,381 篇 交通运输工程
    • 1,302 篇 动力工程及工程热...
    • 1,217 篇 安全科学与工程
    • 1,203 篇 光学工程
    • 1,158 篇 仪器科学与技术
    • 878 篇 化学工程与技术
  • 10,932 篇 理学
    • 5,931 篇 数学
    • 2,595 篇 生物学
    • 2,239 篇 物理学
    • 1,948 篇 系统科学
    • 1,724 篇 统计学(可授理学、...
    • 1,021 篇 化学
  • 6,635 篇 管理学
    • 4,440 篇 管理科学与工程(可...
    • 2,794 篇 图书情报与档案管...
    • 2,299 篇 工商管理
  • 2,091 篇 医学
    • 1,900 篇 临床医学
    • 1,788 篇 基础医学(可授医学...
    • 998 篇 公共卫生与预防医...
    • 932 篇 药学(可授医学、理...
  • 1,141 篇 法学
    • 952 篇 社会学
  • 813 篇 教育学
    • 801 篇 教育学
  • 672 篇 经济学
  • 437 篇 农学
  • 111 篇 文学
  • 82 篇 军事学
  • 21 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 1,502 篇 control systems
  • 1,268 篇 computer science
  • 809 篇 real-time system...
  • 692 篇 covid-19
  • 635 篇 access control
  • 611 篇 artificial intel...
  • 602 篇 computational mo...
  • 599 篇 computer archite...
  • 455 篇 internet of thin...
  • 420 篇 deep learning
  • 373 篇 protocols
  • 371 篇 accuracy
  • 343 篇 process control
  • 323 篇 feature extracti...
  • 319 篇 monitoring
  • 300 篇 reinforcement le...
  • 282 篇 training
  • 278 篇 machine learning
  • 276 篇 learning systems
  • 259 篇 traffic control

机构

  • 37 篇 school of comput...
  • 34 篇 college of compu...
  • 34 篇 department of el...
  • 30 篇 college of infor...
  • 25 篇 univ chinese aca...
  • 24 篇 univ politehn bu...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 tsinghua univers...
  • 19 篇 school of automa...
  • 18 篇 college of compu...
  • 18 篇 federal research...
  • 18 篇 center for astro...
  • 18 篇 school of comput...
  • 18 篇 department of ph...
  • 18 篇 department of ph...
  • 18 篇 the graduate sch...
  • 18 篇 department of ph...
  • 18 篇 graduate school ...

作者

  • 26 篇 andrzej napieral...
  • 25 篇 wang jing
  • 23 篇 liu yang
  • 22 篇 li yang
  • 20 篇 jui c.c.h.
  • 20 篇 oshima a.
  • 20 篇 tsuda r.
  • 20 篇 kim j.h.
  • 20 篇 bergman d.r.
  • 20 篇 allen m.
  • 20 篇 matsuyama t.
  • 20 篇 wong t.
  • 19 篇 ishii t.
  • 18 篇 zhang lei
  • 18 篇 machida k.
  • 18 篇 uchihori y.
  • 18 篇 kim s.w.
  • 18 篇 takamura m.
  • 17 篇 ohnishi m.
  • 16 篇 wang lei

语言

  • 41,702 篇 英文
  • 833 篇 其他
  • 328 篇 中文
  • 17 篇 俄文
  • 10 篇 西班牙文
  • 2 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 乌克兰文
检索条件"任意字段=19th International Conference on Control Systems and Computer Science"
42758 条 记 录,以下是31-40 订阅
排序:
POP-HIT: Partially Order-Preserving Hash-Induced Transformation for Privacy Protection in Face Recognition Access control  19th
POP-HIT: Partially Order-Preserving Hash-Induced Transformat...
收藏 引用
19th international conference on Security and Privacy in Communication Networks
作者: Dubasi, Yatish Li, Qinghua Luu, Khoa Univ Arkansas Fayetteville AR 72701 USA
Server-based face recognition access control (SFRAC) is a widely used biometric authentication method where a camera captures a user's face image and sends the face information to a backend server to determine an ... 详细信息
来源: 评论
Monitoring Real-Time systems Under Parametric Delay  19th
Monitoring Real-Time Systems Under Parametric Delay
收藏 引用
19th international conference on Integrated Formal Methods
作者: Fraenzle, Martin Grosen, thomas M. Larsen, Kim G. Zimmermann, Martin Carl von Ossietzky Univ Oldenburg Oldenburg Germany Aalborg Univ Aalborg Denmark
Timed Buchi automata provide a very expressive formalism for expressing requirements of real-time systems. Online monitoring of embedded real-time systems can then be achieved by symbolic execution of such automata on... 详细信息
来源: 评论
Recognition of Remakes and Fake Facial Images  19th
Recognition of Remakes and Fake Facial Images
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Bobulski, Janusz Kubanek, Mariusz Department of Computer Sciences Czestochowa University of Technology Czestochowa42-201 Poland
computer Vision techniques are extensively utilised in entertainment, enhancing realism in games and movies. Within video games, these techniques enable the recognition of objects, characters, and player movements, th... 详细信息
来源: 评论
Proceedings - 2023 24th international conference on control systems and computer science, CSCS 2023
Proceedings - 2023 24th International Conference on Control ...
收藏 引用
24th international conference on control systems and computer science, CSCS 2023
the proceedings contain 103 papers. the topics discussed include: evolutionary hyper-heuristics for improving global optimization algorithms;multi-objective decision making system based on spatial -temporal logics;ana...
来源: 评论
A Framework for Applying Artificial Intelligence Algorithms in Command and control systems  24
A Framework for Applying Artificial Intelligence Algorithms ...
收藏 引用
8th international conference on computer science and Artificial Intelligence, CSAI 2024
作者: Xiao, Bo Zhou, Xuan National Defence University Beijing China
the rapid development of artificial intelligence (AI) technology has driven substantial transformations across various sectors of commercial society. However, the successful application of AI System in the command and... 详细信息
来源: 评论
A Novel Method of Improving Intrusion Detection systems Robustness Against Adversarial Attacks, through Feature Omission and a Committee of Classifiers  19th
A Novel Method of Improving Intrusion Detection Systems Rob...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Pawlicki, Marek Uccello, Federica D’Antonio, Salvatore Kozik, Rafal Choraś, Michal Bydgoszcz University of Science and Technology PBS Bydgoszcz Poland University of Naples ‘Parthenope’ Centro Direzionale Isola C4 Napoli80133 Italy
Intrusion Detection systems play an important role in network security. With the advent of Machine Learning and Artificial Intelligence, ML-based IDS have been gaining increasing popularity in comparison with traditio... 详细信息
来源: 评论
Research on control Strategies for Partially Observable Discrete Event systems Based on Normal State Tree Structure  24
Research on Control Strategies for Partially Observable Disc...
收藏 引用
5th international conference on computer science and Management Technology, ICCSMT 2024
作者: Gu, Chan Tang, Bo Chi, Encheng School of Electrical and Control Engineering Shaanxi University of Science and Technology Shaanxi Xi'an China
In the process of modeling and solving large-scale complex systems, issues with complex state structures and low computational efficiency are often *** partially observable discrete event systems, this paper proposes ... 详细信息
来源: 评论
Best-Practices-Based Training for Improving Cybersecurity in Power Grids  19th
Best-Practices-Based Training for Improving Cybersecurity i...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Kavallieratos, Georgios Amro, Ahmed Gkioulos, Vasileios Stamatescu, Grigore Rantos, Kostantinos Lagkas, thomas Demertzis, Konstantinos Paterakis, Fotis Lekidis, Alexios Dalamagkas, Christos Kotsiuba, Igor Katsikas, Sokratis Norwegian University of Science and Technology Gjøvik Norway TÜV Austria Romania 139B Calea Plevnei Bucharest060011 Romania Department of Automation and Industrial Informatics University Politehnica of Bucharest 313 Splaiul Independentei Bucharest060042 Romania Department of Informatics Democritus University of Thrace Kavala65404 Greece School of Science Department of Computer Science Kavala Campus International Hellenic University Kavala65404 Greece Athens Greece Innovation Hub of Public Power Corporation S.A. Attica Greece Durham University Durham United Kingdom
the increased financial value of the power grids and the multitude of potential attackers, including such with advanced capabilities, makes the enhancement of cybersecurity in power grids very important. In order to s... 详细信息
来源: 评论
Dynamic k-Anonymity for Electronic Health Records: A Topological Framework  19th
Dynamic k-Anonymity for Electronic Health Records: A Topolo...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Swaminathan, Arjhun Akgün, Mete Medical Data Privacy and Privacy Preserving Machine Learning Department of Computer Science University of Tübingen Tübingen Germany Institute for Bioinformatics and Medical Informatics Tübingen Germany
With the rapid digitization of Electronic Health Records (EHRs), fast and adaptive data anonymization methods have become increasingly important. While tools from topological data analysis (TDA) have been proposed to ... 详细信息
来源: 评论
controlled Multi-client Functional Encryption for Flexible Access control  19th
Controlled Multi-client Functional Encryption for Flexible A...
收藏 引用
19th international conference on Information Security Practice and Experience
作者: Zhang, Mingwu Zhong, Yulu Wang, Yifei Wang, Yuntao Guilin Univ Elect Technol Sch Comp Sci & Informat Secur Guilin Peoples R China Hubei Univ Technol Sch Comp Wuhan Peoples R China Univ Edinburgh Sch Math Edinburgh Midlothian Scotland Univ Electrocommun Sch Informat & Engn Chofu Tokyo Japan
In controlled Functional Encryption (C-FE), a policy parameter is introduced during encryption to restrict how the decryptor can decrypt and compute the ciphertext, but C-FE shows certain limitations in complex scenar... 详细信息
来源: 评论