咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 323 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 680 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 361 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 123 篇 信息与通信工程
    • 82 篇 电气工程
    • 71 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 30 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 186 篇 理学
    • 94 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 120 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 41 篇 医学
    • 35 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 33 篇 法学
    • 17 篇 社会学
    • 16 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 19 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 cryptography
  • 13 篇 information secu...
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 9 篇 reliability
  • 9 篇 wireless sensor ...
  • 9 篇 predictive model...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 14 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...

语言

  • 618 篇 英文
  • 56 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
680 条 记 录,以下是471-480 订阅
排序:
An Asymmetric Controlled Bidirectional Quantum State Transmission Protocol
收藏 引用
computers, Materials & Continua 2019年 第4期59卷 215-227页
作者: Yiru Sun Yuling Chen Haseeb Ahmad Zhanhong Wei GuiZhou University Sate Key Laboratory of Public Big DataGuizhou550025China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Department of Computer Science National Textile University Faisalabad37610Pakistan College of Information Engineering Beijing Institute of Petrochemical TechnologyBeijing102617China
In this paper,we propose an asymmetric controlled bidirectional transmission *** the protocol,by using the thirteen-qubit entangled state as the quantum channel,Alice can realize the transmission of a two-qubit equato... 详细信息
来源: 评论
WSSS4LUAD: Grand Challenge on Weakly-supervised Tissue Semantic Segmentation for Lung Adenocarcinoma
arXiv
收藏 引用
arXiv 2022年
作者: Han, Chu Pan, Xipeng Yan, Lixu Lin, Huan Li, Bingbing Yao, Su Lv, Shanshan Shi, Zhenwei Mai, Jinhai Lin, Jiatai Zhao, Bingchao Xu, Zeyan Wang, Zhizhen Wang, Yumeng Zhang, Yuan Wang, Huihui Zhu, Chao Lin, Chunhui Mao, Lijian Wu, Min Duan, Luwen Zhu, Jingsong Hu, Dong Fang, Zijie Chen, Yang Zhang, Yongbing Li, Yi Zou, Yiwen Yu, Yiduo Li, Xiaomeng Li, Haiming Cui, Yanfen Han, Guoqiang Xu, Yan Xu, Jun Yang, Huihua Li, Chunming Liu, Zhenbing Lu, Cheng Chen, Xin Liang, Changhong Zhang, Qingling Liu, Zaiyi The Department of Radiology Guangdong Provincial People's Hospital Guangdong Academy of Medical Sciences Guangzhou510080 China Guangdong Prov. Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application Guangdong Provincial People's Hospital Guangdong Academy of Medical Sciences Guangzhou510080 China The Department of Pathology Guangdong Provincial People's Hospital Guangdong Academy of Medical Sciences Guangzhou510080 China The School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi541004 China The Department of Pathology Guangdong Provicial People's Hospital Ganzhou Hospital Ganzhou China The College of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China The School of Computer Science and Engineering South China University of Technology Guangzhou510640 China The Institute for AI in Medicine School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing210044 China The School of Biological Science and Medical Engineering State Key Laboratory of Software Development Environment Key Laboratory of Biomechanics and Mechanobiology of Ministry of Education Research Institute of Beihang University in Shenzhen Beijing Advanced Innovation Center for Biomedical Engineering Beihang University Beijing100191 China The Department of Radiology Guangzhou First People's Hospital Hospital of South China University of Technology Guangzhou510180 China The Zhejiang Dahua Technology Co. Ltd Zhejiang310053 China The School of Biomedical Engineering University of Science and Technology of China Hefei230022 China The Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen China Electronic and Computer Engineering & Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong Hong Kong The School of Automation Science and Engineering Xi'An Jiaotong University Xian710049 Chi
Lung cancer is the leading cause of cancer death worldwide, and adenocarcinoma (LUAD) is the most common subtype. Exploiting the potential value of the histopathology images can promote precision medicine in oncology.... 详细信息
来源: 评论
Wireless underground sensor networks
收藏 引用
International Journal of Performability engineering 2019年 第11期15卷 3042-3051页
作者: Sardar, Muhammad Sohail Xuefen, Wan Yi, Yang Kausar, Farzana Akbar, Mohammad Wasim Hebei IoT Monitoring Engineering Technology Research Center North China Institute of Science and Technology Langfang065201 China College of Information Science and Technology Donghua University Shanghai201600 China Department of Computer Science and Technology North China Institute of Science and Technology Langfang065000 China Information Security Department Dubai Electricity and Water Authority Dubai00000 United Arab Emirates Pra Health Sciences EdinburghEH93GJ United Kingdom
With the development of sensing networks and Internet of things, wireless sensor networks have been applied to different fields of our society. With the perceived sensing demands for soil, mining lanes, etc., wireless... 详细信息
来源: 评论
Improved impossible differential cryptanalysis of large-block Rijndael
收藏 引用
science China(information sciences) 2019年 第3期62卷 5-18页
作者: Ya LIU Yifan SHI Dawu GU Bo DAI Fengyu ZHAO Wei LI Zhiqiang LIU Zhiqiang ZENG Engineering Research Center of Optical Instrument and System Ministry of Education Shanghai Key Lab of Modern Optical System University of Shanghai for Science and Technology State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University School of Computer Science and Technology Donghua University Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Science and Technology on Information Assurance Laboratory
Rijndael is a substitution-permutation network(SPN) block cipher for the AES development process. Its block and key sizes range from 128 to 256 bits in steps of 32 bits, which can be denoted by Rijndael-b-k, where b... 详细信息
来源: 评论
Transportation,germs,culture:a dynamic graph model of COVID-19 outbreak
收藏 引用
Quantitative Biology 2020年 第3期8卷 238-244页
作者: Xiaofei Yang Tun Xu Peng Jia Han Xia Li Guo Lei Zhang Kai Ye School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi'an Jiaotong UniversityXi'an 710049China MOE Key Lab for Intelligent Networks&Networks Security Faculty of Electronic and Information EngineeringXi'an Jiaotong UniversityXi'an 710049China School of Automation Science and Engineering Faculty of Electronic and Information EngineeringXi'an Jiaotong UniversityXi'an 710049China Hugobiotech Co. Ltd.Beijing 102600China The School of Life Science and Technology Xi'an Jiaotong UniversityXi'an 710049China China-Australia Joint Research Center for Infectious Diseases School of Public HealthXi'an Jiaotong University Health Science CenterXi'an 710061China Melbourne Sexual Health Centre Alfred HealthMelbourneVIC 3004Australia Central Clinical School Faculty of MedicineNursing and Health SciencesMonash UniversityMelbourneVIC 3004Australia Department of Epidemiology and Biostatistics College of Public HealthZhengzhou UniversityZhengzhou 450001China Genome Institute the First Affiliated Hospital of Xi'an Jiaotong UniversityXi'an 710061China
Backgrounds Various models have been applied to predict the trend of the epidemic since the outbreak of ***:In this study,we designed a dynamic graph model,not for precisely predicting the number of infected cases,but... 详细信息
来源: 评论
A Survey on Deep Learning Event Extraction: Approaches and Applications
arXiv
收藏 引用
arXiv 2021年
作者: Li, Qian Li, Jianxin Sheng, Jiawei Cui, Shiyao Wu, Jia Hei, Yiming Peng, Hao Guo, Shu Wang, Lihong Beheshti, Amin Yu, Philip S. The School of Computer Science and Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The Institute of Information Engineering Chinese Academy of Sciences Beijing100083 China The School of Cyber Security University of Chinese Academy of Sciences Beijing100083 China The School of Cyber Science and Technology Beihang University Beijing100083 China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China The School of Computing Macquarie University Sydney Australia The Department of Computer Science University of Illinois at Chicago Chicago60607 United States
Event extraction is a crucial research task for promptly apprehending event information from massive textual data. With the rapid development of deep learning, event extraction based on deep learning technology has be... 详细信息
来源: 评论
Weighted Linear Multiple Kernel Learning for Saliency Detection  2nd
Weighted Linear Multiple Kernel Learning for Saliency Detect...
收藏 引用
2nd EAI International Conference on Robotic Sensor Networks, ROSENET 2018
作者: Zhou, Quan Wu, Jinwen Fan, Yawen Zhang, Suofei Wu, Xiaofu Zheng, Baoyu Jin, Xin Lu, Huimin Latecki, Longin Jan National Engineering Research Center of Communications and Networking Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China College of Information Engineering China University of Geosciences Wuhan China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing China National Engineering Research Center of Communications and Networking Nanjing University of Posts and Telecommunications Nanjing China Department of Cyber Security Beijing Electronic Science and Technology Institute Beijing China CETC Big Data Research Institute Co. Ltd. Guizhou Guiyang China Department of Mechanical and Control Engineering Kyushu Institute of Technology Kitakyushu Japan Department of Computer and Information Sciences Temple University PhiladelphiaPA United States
This paper presents a novel saliency detection method based on weighted linear multiple kernel learning (WLMKL), which is able to adaptively combine different contrast measurements in a supervised manner. Three common... 详细信息
来源: 评论
An Efficient Pairing-Free Certificateless Signcryption Without Secure Channel Communication During Secret Key Issuance
收藏 引用
Procedia computer science 2020年 171卷 110-119页
作者: Arijit Karati Chun-I Fan Jheng-Jia Huang Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung-80424 Taiwan Intelligent Electronic Commerce Research Center National Sun Yat-sen University Kaohsiung-80424 Taiwan Information Security Research Center National Sun Yat-sen University Kaohsiung-80424 Taiwan Telecom Technology Center Kaohsiung-82151 Taiwan
Signcryption is one of the recent public key paradigms that satisfies both the requirement of authenticity and confidentiality of messages between parties. However, most of all the existing schemes use secure channel ... 详细信息
来源: 评论
Investigating Bi-level optimization for learning and vision from a unified perspective: A survey and beyond
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Risheng Gao, Jiaxin Zhang, Jin Meng, Deyu Lin, Zhouchen DUT-RU International School of Information Science & Engineering Dalian University of Technology Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian116024 China Department of Mathematics Southern University of Science and Technology National Center for Applied Mathematics Shenzhen China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an Shaanxi China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Cooperative Medianet Innovation Center Shanghai Jiao Tong University Shanghai200240 China
Bi-Level Optimization (BLO) is originated from the area of economic game theory and then introduced into the optimization community. BLO is able to handle problems with a hierarchical structure, involving two levels o... 详细信息
来源: 评论
Unbalanced incomplete multi-view clustering via the scheme of view evolution: Weak views are meat;strong views do eat
arXiv
收藏 引用
arXiv 2020年
作者: Fang, Xiang Hu, Yuchong Zhou, Pan Wu, Dapeng Oliver The School of Computer Science and Technology Key Laboratory of Information Storage System Ministry of Education of China Huazhong University of Science and Technology Wuhan430074 China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China The Department of Electrical and Computer Engineering University of Florida GainesvilleFL32611 United States
Incomplete multi-view clustering is an important technique to deal with real-world incomplete multi-view data. Previous methods assume that all views have the same incompleteness, i.e., balanced incompleteness. Howeve... 详细信息
来源: 评论