咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 323 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 680 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 361 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 123 篇 信息与通信工程
    • 82 篇 电气工程
    • 71 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 30 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 186 篇 理学
    • 94 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 120 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 41 篇 医学
    • 35 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 33 篇 法学
    • 17 篇 社会学
    • 16 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 19 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 cryptography
  • 13 篇 information secu...
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 9 篇 reliability
  • 9 篇 wireless sensor ...
  • 9 篇 predictive model...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 14 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...

语言

  • 618 篇 英文
  • 56 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
680 条 记 录,以下是401-410 订阅
排序:
Conflict-Free Coloring: Graphs of Bounded Clique Width and Intersection Graphs
arXiv
收藏 引用
arXiv 2021年
作者: Bhyravarapu, Sriram Hartmann, Tim A. Hoang, Hung P. Kalyanasundaram, Subrahmanyam Reddy, I. Vinod The Institute of Mathematical Sciences HBNI Chennai India CISPA Helmholtz Center for Information Security Germany Algorithms and Complexity Group TU Wien Austria Department of Computer Science and Engineering IIT Hyderabad India Department of Electrical Engineering and Computer Science IIT Bhilai India
A conflict-free coloring of a graph G is a (partial) coloring of its vertices such that every vertex u has a neighbor whose assigned color is unique in the neighborhood of u. There are two variants of this coloring, o... 详细信息
来源: 评论
Battery Capacity of Energy-Storing Quantum Systems
收藏 引用
Physical Review Letters 2023年 第3期131卷 030402-030402页
作者: Xue Yang Yan-Han Yang Mir Alimuddin Raffaele Salvia Shao-Ming Fei Li-Ming Zhao Stefan Nimmrichter Ming-Xing Luo School of Information Science and Technology Southwest Jiaotong University Chengdu 610031 China School of Computer and Network Security Chengdu University of Technology Chengdu 610059 China Department of Physics of Complex Systems S. N. Bose National Center for Basic Sciences Kolkata 700106 India Scuola Normale Superiore I-56127 Pisa Italy School of Mathematical Sciences Capital Normal University Beijing 100048 China Max-Planck-Institute for Mathematics in the Sciences 04103 Leipzig Germany Naturwissenschaftlich-Technische Fakultät Universität Siegen Siegen 57068 Germany CAS Center for Excellence in Quantum Information and Quantum Physics Hefei 230026 China Shenzhen Institute for Quantum Science and Engineering Southern University of Science and Technology Shenzhen 518055 China
The quantum battery capacity is introduced in this Letter as a figure of merit that expresses the potential of a quantum system to store and supply energy. It is defined as the difference between the highest and the l... 详细信息
来源: 评论
V3H: View Variation and View Heredity for Incomplete Multiview Clustering
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2020年 第3期1卷 233-247页
作者: Fang, Xiang Hu, Yuchong Zhou, Pan Wu, Dapeng Oliver The School of Computer Science and Technology Key Laboratory of Information Storage System Ministry of Education of China Huazhong University of Science and Technology Wuhan 430074 China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan 430074 China The Department of Electrical and Computer Engineering University of Florida Gainesville 32611 FL United States
Real data often appear in the form of multiple incomplete views. Incomplete multiview clustering is an effective method to integrate these incomplete views. Previous methods only learn the consistent information betwe... 详细信息
来源: 评论
Implementation of an Intelligent Animal Monitoring System Using Wireless Sensor Network and IoT Platform
Implementation of an Intelligent Animal Monitoring System Us...
收藏 引用
Cyber Resilience (ICCR), International Conference on
作者: Ateeq Ur Rehman Jehangir Arshad Muhammad Tariq Sadiq Abdul Rehman Munir Ahmad Mohammad Kamrul Hasan Hussam Al Hamadi Tauqeer Faiz Department of Electrical Engineering GC University Lahore Pakistan Department of Electrical & Computer Engineering Lahore Campus COMSATS University Islamabad Lahore Pakistan School of Architecture Technology and Engineering University of Brighton Brighton United Kingdome NCBAE School of Computer Science Lahore Pakistan Faculty of Information Science and Technology Center for Cyber Security Universiti Kebansaan Malaysia (UKM) Bangi Selangor Malaysia College of Engineering and IT University of Dubai School of IT Skyline University College Sharjah UAE Faculty of Engineering Computing and Science (FECS) - Swinburne University of Technology Australia
Meat and dairy products are negatively impacted by a lack of technology in the livestock industry in developing countries. To cater for this challenge, the Internet of Things (IoT), Node-MCU, and intelligent wireless ... 详细信息
来源: 评论
An artificial intelligence and blockchain technology-based data management framework for multicenter randomized controlled trials
收藏 引用
science Bulletin 2025年 第6期70卷 856-860页
作者: Dongyuan Yun Xiaohang Wu Xi Chen Yahan Yang Yuanjun Shang Shaopeng Liu Dinesh Visva Gunasekeran Duoru Lin Lixue Liu Lanqin Zhao Wenben Chen Jingjing Chen Ling Jin Yuxuan Wu Jiaming Hong Weiling Hu Zhenzhe Lin Carol Y.Cheung Xiang Chen Peichen Xie Zhenzhen Liu Changhai Ding Patrick Yu-Wai-Man Keming Yu Daniel Shu Wei Ting Yizhi Liu Zibin Zheng Gansen Zhao Zhihua Xia Tien Yin Wong Haotian Lin on behalf of Advanced Technologies Improve Clinical Trial(ATICT)Group State Key Laboratory of Ophthalmology Zhongshan Ophthalmic CenterSun Yat-sen UniversityGuangdong Provincial Key Laboratory of Ophthalmology and Visual ScienceGuangdong Provincial Clinical Research Center for Ocular DiseasesGuangzhou 510000China School of Biomedical Engineering Sun Yat-sen UniversityGuangzhou 510000China School of Computer Science Guangdong Polytechnic Normal UniversityGuangzhou 510000China Singapore Eye Research Institute Singapore National Eye CenterSingapore999002Singapore School of Medical Information Engineering Guangzhou University of Chinese MedicineGuangzhou 510000China Department of Ophthalmology and Visual Sciences The Chinese University of Hong KongHong Kong 999077China Zhongshan School of Medicine Sun Yat-sen UniversityGuangzhou 510000China Clinical Research Center Zhujiang HospitalSouthern Medical UniversityGuangzhou 510000China Cambridge Center for Brain Repair and MRC Mitochondrial Biology Unit Department of Clinical NeurosciencesUniversity of CambridgeCambridgeCB20XYUnited Kingdom UCL Institute of Ophthalmology University College LondonLondonWC1E 6BTUnited Kingdom School of Data and Computer Science Sun Yat-sen UniversityGuangzhou 510000China School of Computer Science South China Normal UniversityGuangzhou 510000China College of Cyber Security Jinan UniversityGuangzhou 510000China Duke-NUS Medical School Singapore999002Singapore Tsinghua Medicine Tsinghua UniversityBeijing 100010China Hainan Eye Hospital and Key Laboratory of Ophthalmology Zhongshan Ophthalmic CenterSun Yat-sen UniversityHaikou 570100China Centre for Precision Medicine and Department of Genetics and Biomedical Informatics Zhongshan School of MedicineSun Yat-sen UniversityGuangzhou 510000China 不详
Randomized controlled trials(RCTs)provide optimal evidence of the effectiveness and safety of a new drug,a new medical device,or a new therapeutic strategy with the necessary scientific design[1].Traditional electroni... 详细信息
来源: 评论
Intelligent decoding method for Ground-penetrating radar based on improved YOLOv5
Intelligent decoding method for Ground-penetrating radar bas...
收藏 引用
computer, Big Data and Artificial Intelligence (ICCBD+AI), International Conference on
作者: ZeYu Chen YongKang Wang HongLiang Liu Chuan Wang XinBo Jiang Ning Zhang Zhen Huang Lei Jiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) JiNan China Technological Innovation Department Shandong Hi-Speed Group Co Ltd JiNan China School of Qilu Transportation Shandong University JiNan China No.1 Engineering Development Co. Ltd. of China Railway 14Th Bureau Group RiZhao China
Ground-penetrating radar (GPR) is a non-invasive detection technique that effectively gathers information about subsurface materials. In tunneling projects, GPR can provide a fast and accurate forecast of the geologic... 详细信息
来源: 评论
Problems in NP can Admit Double-Exponential Lower Bounds when Parameterized by Treewidth or Vertex Cover
arXiv
收藏 引用
arXiv 2023年
作者: Foucaud, Florent Galby, Esther Khazaliya, Liana Li, Shaohua Inerney, Fionn Mc Sharma, Roohani Tale, Prafullkumar Université Clermont Auvergne CNRS Mines Saint-Étienne Clermont Auvergne INP LIMOS Clermont-Ferrand63000 France Department of Computer Science and Engineering Chalmers University of Technology University of Gothenburg Gothenburg Sweden Technische Universität Wien Vienna Austria CISPA Helmholtz Center for Information Security Saarbrücken Germany University of Bergen Bergen Norway Indian Institute of Science Education and Research Pune Pune India
Treewidth serves as an important parameter that, when bounded, yields tractability for a wide class of problems. For example, graph problems expressible in Monadic Second Order (MSO) logic and Quantified SAT or, more ... 详细信息
来源: 评论
Efficient and secure two-party distributed signing protocol for the gost signature algorithm  6th
Efficient and secure two-party distributed signing protocol ...
收藏 引用
6th International Symposium on security and Privacy in Social Networks and Big Data, SocialSec 2020
作者: Zhang, Yunru Luo, Min Choo, Kim-Kwang Raymond Li, Li He, Debiao Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Cyber Science and Engineering Wuhan University Wuhan430072 China Department of Information Systems and Cyber Security and the Department of Electrical and Computer Engineering University of Texas at San Antonio San AntonioTX78249 United States
Mobile devices, such as Android and iOS devices, are often used for electronic/mobile commerce (e.g. payments using WeChat Pay and Bitcoin wallet). Hence, ensuring the security of a user’s private key stored on the d... 详细信息
来源: 评论
GSLB: the graph structure learning benchmark  23
GSLB: the graph structure learning benchmark
收藏 引用
Proceedings of the 37th International Conference on Neural information Processing Systems
作者: Zhixun Li Liang Wang Xin Sun Yifan Luo Yanqiao Zhu Dingshuo Chen Yingtao Luo Xiangxin Zhou Qiang Liu Shu Wu Jeffrey Xu Yu Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong Center for Research on Intelligent Perception and Computing State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences and School of Artificial Intelligence University of Chinese Academy of Sciences and Department of Automation University of Science and Technology of China Department of Automation University of Science and Technology of China School of Cyberspace Security Beijing University of Posts and Telecommunications Department of Computer Science University of California Los Angeles Center for Research on Intelligent Perception and Computing State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences and School of Artificial Intelligence University of Chinese Academy of Sciences Heinz College of Information Systems and Public Policy Machine Learning Department School of Computer Science Carnegie Mellon University
Graph Structure Learning (GSL) has recently garnered considerable attention due to its ability to optimize both the parameters of Graph Neural Networks (GNNs) and the computation graph structure simultaneously. Despit...
来源: 评论
SWIN-TRANSFORMER-YOLOV5 FOR REAL-TIME WINE GRAPE BUNCH DETECTION
arXiv
收藏 引用
arXiv 2022年
作者: Lu, Shenglian Liu, Xiaoyu He, Zixuan Liu, Wenbo Zhang, Xin Karkee, Manoj Guangxi Key Lab of Multisource Information Mining & Security College of Computer Science & Engineering Guangxi Normal University Guilin541004 China Center for Precision and Automated Agricultural Systems Department of Biological Systems Engineering Washington State University ProsserWA99350 United States Department of Agricultural and Biological Engineering Mississippi State University Mississippi State MS39762 United States
Precise canopy management is critical in vineyards for premium wine production because maximum crop load does not guarantee the best economic return for wine producers. Therefore, the wine grape growers need to keep t... 详细信息
来源: 评论