咨询与建议

限定检索结果

文献类型

  • 351 篇 会议
  • 323 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 682 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 454 篇 工学
    • 361 篇 计算机科学与技术...
    • 273 篇 软件工程
    • 123 篇 信息与通信工程
    • 81 篇 电气工程
    • 71 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 30 篇 安全科学与工程
    • 29 篇 电子科学与技术(可...
    • 26 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 14 篇 动力工程及工程热...
    • 14 篇 交通运输工程
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 120 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 41 篇 医学
    • 35 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 16 篇 法学
    • 16 篇 社会学
  • 9 篇 军事学
  • 8 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 34 篇 authentication
  • 27 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 19 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 15 篇 cryptography
  • 13 篇 feature extracti...
  • 13 篇 information secu...
  • 13 篇 accuracy
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 11 篇 access control
  • 11 篇 data privacy
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 17 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 12 篇 school of cyber ...
  • 11 篇 department of co...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...
  • 8 篇 china informatio...

作者

  • 29 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mahmood khalid
  • 14 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 9 篇 nurhizam safie m...
  • 9 篇 choo kim-kwang r...
  • 9 篇 fan chun-i
  • 9 篇 amrita
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...
  • 8 篇 wazid mohammad

语言

  • 574 篇 英文
  • 102 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
682 条 记 录,以下是461-470 订阅
排序:
Reasoning over the Air: A Reasoning-based Implicit Semantic-Aware Communication Framework
arXiv
收藏 引用
arXiv 2023年
作者: Xiao, Yong Liao, Yiwei Li, Yingyu Shi, Guangming Poor, H. Vincent Saad, Walid Debbah, Mérouane Bennis, Mehdi The School of Electronic Information and Communications The Huazhong University of Science and Technology Wuhan430074 China The Peng Cheng Laboratory Guangdong Shenzhen518055 China Guangdong Guangzhou510555 China The School of Mech. Eng. and Elect. Inform. The China University of Geosciences Wuhan430074 China The School of Artificial Intelligence The Xidian University Shaanxi Xi’an710071 China The Department of Electrical and Computer Engineering Princeton University PrincetonNJ08544 United States The Department of Electrical and Computer Engineering Virginia Tech BlacksburgVA24061 United States Cyber Security Systems and Applied AI Research Center Lebanese American University Beirut Lebanon Khalifa University of Science and Technology P O Box 127788 Abu Dhabi United Arab Emirates CentraleSupelec University Paris-Saclay Gif-sur-Yvette91192 France The University of Oulu Oulu90014 Finland
—Semantic-aware communication is a novel paradigm that draws inspiration from human communication focusing on the delivery of the meaning of messages. It has attracted significant interest recently due to its potenti... 详细信息
来源: 评论
DIAS: A Dataset and Benchmark for Intracranial Artery Segmentation in DSA sequences
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wentao Tian, Tong Wang, Lemeng Xu, Weijin Li, Lei Li, Haoyuan Zhao, Wenyi Tian, Siyu Pan, Xipeng Deng, Yiming Gao, Feng Yang, Huihua Wang, Xin Su, Ruisheng School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Structural Analysis Optimization and CAE Software for Industrial Equipment School of Aeronautics and Astronautics Dalian University of Technology Dalian China Department of Interventional Neuroradiology Beijing Tiantan Hospital Capital Medical University Beijing China Ultrasonic Department The Fourth Hospital of Hebei Medical University Hebei Tumor Hospital Shijiazhuang China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Department of Radiology The Netherlands Cancer Institute Amsterdam Netherlands Department of Radiology & Nuclear Medicine Erasmus MC University Medical Center Rotterdam Netherlands Medical Image Analysis group Department of Biomedical Engineering Eindhoven University of Technology Eindhoven Netherlands
The automated segmentation of Intracranial Arteries (IA) in Digital Subtraction Angiography (DSA) plays a crucial role in the quantification of vascular morphology, significantly contributing to computer-assisted stro... 详细信息
来源: 评论
Practical Iterative Quantum Consensus Protocol with Sharding Construction
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年
作者: Ying, Chenhao Du, Yuxuan Zhang, Weiting Jiang, Xikun Wang, Gang Jin, Haiming Li, Jie Luo, Yuan Tao, Dacheng Shanghai Jiao Tong University Department of Computer Science Shanghai China Zhejiang University Shanghai Jiao Tong University State Key Laboratory of Blockchain and Data Security Blockchain Advanced Research Center Jiangsu Wuxi214101 China Nanyang Technological University College of Computing&Data Science Singapore Beijing Jiaotong University School of Electronic and Information Engineering Beijing China University of Copenhagen Department of Computer Science Denmark Northeastern University School of Computer Science and Engineering Shenyang China Shanghai Key Laboratory of Trusted Data Circulation and Governance Web3 China
With the development of quantum blockchain, the quantum consensus protocols have garnered increasing attention, which play a crucial role in driving the implementation of quantum blockchains. However, existing protoco... 详细信息
来源: 评论
Event extraction by associating event types and argument roles
arXiv
收藏 引用
arXiv 2021年
作者: Li, Qian Guo, Shu Wu, Jia Li, Jianxin Sheng, Jiawei Wang, Lihong Dong, Xiaohan Peng, Hao Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Department of Computing Macquarie University Sydney Australia Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Event extraction (EE), which acquires structural event knowledge from texts, can be divided into two sub-tasks: event type classification and element extraction (namely identifying triggers and arguments under differe... 详细信息
来源: 评论
In-situ data scheduling optimization based on rainbow DQN for IIoT
收藏 引用
Future Generation computer Systems 2026年 174卷
作者: Peiying Zhang Siyi Li Lizhuang Tan Neeraj Kumar Jian Wang Kai Liu Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao 266580 China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao 266580 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250014 China Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Patiala 147004 India Department of Computer Science University of Economics and Human Sciences Warszawa 01-043 Poland Department of Networks and Communications College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Dammam 31441 Saudi Arabia College of Science China University of Petroleum (East China) Qingdao 266580 China Beijing National Research Center for Information Science and Technology Tsinghua University Beijing 100084 China State Key Laboratory of Space Network and Communications Tsinghua University Beijing 100084 China
In industrial systems, in-situ computing refers to a mode of local or proximate data processing within the cloud–edge-terminal architecture. In the Industrial Internet of Things (IIoT) environment, servers are typica...
来源: 评论
Transferring knowledge distillation for multilingual social event detection
arXiv
收藏 引用
arXiv 2021年
作者: Ren, Jiaqian Peng, Hao Jiang, Lei Wu, Jia Tong, Yongxin Wang, Lihong Bai, Xu Wang, Bo Yang, Qiang Institute of Information Engineering Chinese Academy of Sciences The School of Cyber Security University of Chinese Academy of Sciences Beijing100041 China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The School of Cyber Science and Technology Beihang University Beijing100083 China Institute of Information Engineering Chinese Academy of Sciences Beijing100041 China The Department of Computing Macquarie University Sydney Australia The State Key Laboratory of Software Development Environment The School of Computer Science and Engineering Beihang University Beijing100083 China The National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China The Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong AI Group WeBank Co. Ltd. China
Recently published graph neural networks (GNNs) show promising performance at social event detection tasks. However, most studies are oriented toward monolingual data in languages with abundant training samples. This ... 详细信息
来源: 评论
Proof-of-GoS: An Efficient GoS-Based Consensus Algorithm for IOT
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Gao, Guangyong Guo, Chongtao Wan, Xinyu Xia, Zhihua Shi, Yunqing Nanjing University of Information Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China Jiangsu Yuchi Blockchain Technology Research Institute Nanjing210044 China Jinan University College of Cyber Security Guangzhou510632 China New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ07102-1982 United States
With the advancement of 5G networks, the deployment of Internet of Things (IoT) technology has seen significant growth. Blockchain technology, recognized for its strong security features, is increasingly utilized with... 详细信息
来源: 评论
DynaComm: Accelerating distributed CNN training between edges and clouds through dynamic communication scheduling
arXiv
收藏 引用
arXiv 2021年
作者: Cai, Shangming Wang, Dongsheng Wang, Haixia Lyu, Yongqiang Xu, Guangquan Zheng, Xi Vasilakos, Athanasios V. Department of Computer Science and Technology Tsinghua University Beijing100084 China Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518066 China Big Data School Qingdao Huanghai University Qingdao266427 China College of Intelligence and Computing Tianjin University Tianjin300350 China Department of Computing Macquarie University SydneyNSW2109 Australia College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China School of Electrical and Data Engineering University of Technology Sydney Australia Department of Computer Science Electrical and Space Engineering Lulea University of Technology Lulea97187 Sweden
To reduce uploading bandwidth and address privacy concerns, deep learning at the network edge has been an emerging topic. Typically, edge devices collaboratively train a shared model using real-time generated data thr... 详细信息
来源: 评论
LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF
收藏 引用
science China(information sciences) 2018年 第5期61卷 291-305页
作者: Huige WANG Kefei CHEN Baodong QIN Ziyuan HU Department of Network Engineering Anhui Science and Technology University Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Mathematics Hangzhou Normal University Westone Cryptologic Research Center National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications State Key Laboratory of Cryptology
Original public-key encryption is viewed as a tool to encrypt point-to-point *** data is aimed at a particular user,where a sender encrypts a message x under a specified public key P *** this case,only the owner of th... 详细信息
来源: 评论
Probabilistic margins for instance reweighting in adversarial training  21
Probabilistic margins for instance reweighting in adversaria...
收藏 引用
Proceedings of the 35th International Conference on Neural information Processing Systems
作者: Qizhou Wang Feng Liu Bo Han Tongliang Liu Chen Gong Gang Niu Mingyuan Zhou Masashi Sugiyama Department of Computer Science Hong Kong Baptist University DeSI Lab Australian Artificial Intelligence Institute University of Technology Sydney TML Lab School of Computer Science Faculty of Engineering The University of Sydney PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of MoE and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology RIKEN Center for Advanced Intelligence Project (AIP) McCombs School of Business The University of Texas at Austin RIKEN Center for Advanced Intelligence Project (AIP) and Graduate School of Frontier Sciences The University of Tokyo
Reweighting adversarial data during training has been recently shown to improve adversarial robustness, where data closer to the current decision boundaries are regarded as more critical and given larger weights. Howe...
来源: 评论