咨询与建议

限定检索结果

文献类型

  • 1,881 篇 期刊文献
  • 1,737 篇 会议
  • 1 册 图书

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,546 篇 工学
    • 1,741 篇 计算机科学与技术...
    • 1,369 篇 软件工程
    • 605 篇 信息与通信工程
    • 361 篇 电气工程
    • 332 篇 控制科学与工程
    • 300 篇 电子科学与技术(可...
    • 223 篇 生物工程
    • 190 篇 机械工程
    • 148 篇 网络空间安全
    • 146 篇 光学工程
    • 132 篇 生物医学工程(可授...
    • 122 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 100 篇 安全科学与工程
    • 97 篇 交通运输工程
    • 67 篇 建筑学
    • 64 篇 化学工程与技术
  • 1,262 篇 理学
    • 679 篇 数学
    • 338 篇 物理学
    • 248 篇 生物学
    • 218 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 641 篇 管理学
    • 411 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 71 篇 feature extracti...
  • 64 篇 semantics
  • 59 篇 cryptography
  • 57 篇 security
  • 54 篇 computer science
  • 54 篇 blockchain
  • 54 篇 training
  • 53 篇 deep learning
  • 53 篇 laboratories
  • 52 篇 computational mo...
  • 51 篇 optimization
  • 47 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 33 篇 computer archite...
  • 33 篇 protocols
  • 33 篇 data models

机构

  • 147 篇 department of co...
  • 72 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 46 篇 key laboratory o...
  • 42 篇 hubei province k...
  • 40 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 31 篇 peng cheng labor...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...
  • 29 篇 school of cyber ...

作者

  • 31 篇 han zhu
  • 27 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hu shengshan
  • 15 篇 hai jin
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin
  • 13 篇 ding yong
  • 13 篇 pan xipeng

语言

  • 3,360 篇 英文
  • 160 篇 其他
  • 103 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3619 条 记 录,以下是1-10 订阅
排序:
Robust tube-based MPC with smooth computation for dexterous robot manipulation
收藏 引用
science China(information sciences) 2024年 第11期67卷 252-268页
作者: Yu LUO Tianying JI Fuchun SUN Qie SIMA Huaping LIU Mingxuan JING Jianwei ZHANG Department of Computer Science and Technology Tsinghua University Science & Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences Department of Informatics University of Hamburg
Dexterous robot manipulation has shone in complex industrial scenarios, where multiple manipulators, or fingers, cooperate to grasp and manipulate objects. When encountering multi-objective optimization with system co... 详细信息
来源: 评论
Feature Distillation GAN: An Adversarial Example Defense Method Based on Feature Reconstruction  2nd
Feature Distillation GAN: An Adversarial Example Defense Met...
收藏 引用
2nd International Conference on Network Simulation and Evaluation, NSE 2023
作者: Liu, Ruiqi Li, Hu Wang, Dongxia Zhao, Chongyang Li, Boyu National Key Laboratory of Science and Technology On Information System Security Beijing China
Purifying and reconstructing adversarial examples into benign ones by generative models is a class of defense methods to eliminate adversarial perturbations. These methods do not make assumptions on adversarial attack... 详细信息
来源: 评论
Unsupervised Meteorological Downscaling Based on Dual Learning and Subgrid-scale Auxiliary information
收藏 引用
Advances in Atmospheric sciences 2025年 第1期42卷 53-66页
作者: Jing HU Jialing MU Xiaomeng HUANG Xi WU Department of Computer Science Chengdu University of Information TechnologyChengdu 610225China Department of Earth System Science Ministry of Education Key Laboratory for Earth System ModelingInstitute for Global Change StudiesTsinghua UniversityBeijing 100084China
Climate downscaling is used to transform large-scale meteorological data into small-scale data with enhanced detail,which finds wide applications in climate modeling,numerical weather forecasting,and renewable *** dee... 详细信息
来源: 评论
m2Vib: 2D Vibration Measurement Using a Single mmWave Radar  30
m2Vib: 2D Vibration Measurement Using a Single mmWave Radar
收藏 引用
30th IEEE International Conference on Parallel and Distributed systems, ICPADS 2024
作者: Wang, Haolin Xu, Wei Li, Zezhao Yang, Yanni Huang, Zhijian Shandong University School of Computer Science and Technology Qingdao China National Key Laboratory of Science and Technology on Information System Security China
Two-dimensional vibration measurement is essential for monitoring structure and machine health, especially providing more information than those 1D solutions. However, most existing 2D vibration monitoring methods req... 详细信息
来源: 评论
THL: Fast Targeted High Utility Itemset Mining within Length Consideration
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2025年 第1期10卷 541-558页
作者: Xu, Peiming Jiang, Yixin Kuang, Xiaoyun Luo, Yu Chen, Jiahui Guangdong Provincial Key Laboratory of Power System Network Security CSG Guangzhou510000 China School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China
High utility itemset mining is a research topic of the pattern mining domain, which has been widely applied in reality during the past decade. Although most high utility itemset mining algorithms show significant exec... 详细信息
来源: 评论
CRP2-VCS: Contrast-Oriented Region-based Progressive Probabilistic Visual Cryptography Schemes
收藏 引用
IEEE Transactions on Circuits and systems for Video technology 2025年 第6期35卷 5501-5517页
作者: Wu, Xiaotian Song, Bofan Fang, Jia Yan, WeiQi Peng, Qing-Yu Jinan University Guangdong Key Laboratory of Data Security and Privacy Preserving College of Cyber Security College of Information Science and Technology Guangzhou China Auckland University of Technology Department of Computer and Information Systems Auckland New Zealand Jinan University Sino-French Joint Laboratory for Astrometry Dynamics and Space Science Guangzhou China
Most visual cryptography schemes (VCSs) are condition-oriented which implies their designs focus on satisfying the contrast and security conditions in VCS. In this paper, we explore a new architecture of VCS: contrast... 详细信息
来源: 评论
Collaborative Service Provisioning for UAV-Assisted Mobile Edge Computing
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1504-1514页
作者: Yuben QU Zhenhua WEI Zhen QIN Tao WU Jinghao MA Haipeng DAI Chao DONG The Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Colllege of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Xi'an Research Institute of High Technology Department of Information and Communication Noncommissioned Officer Academy of PAP National University of Defense Technology Department of Computer Science and Technology Nanjing University
Unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC), as a way of coping with delaysensitive and computing-intensive tasks, is considered to be a key technology to solving the challenges of terrestrial MEC... 详细信息
来源: 评论
Test Suite Generation Based on Context-Adapted Structural Coverage for Testing DNN  24
Test Suite Generation Based on Context-Adapted Structural Co...
收藏 引用
24th Asia-Pacific Network Operations and Management Symposium, APNOMS 2023
作者: Kong, Wei Du, Qianjin Cao, Huayang Li, Hu Wang, Tong Tian, Jianwen Kuang, Xiaohui National Key Laboratory of Science and Technology on Information System Security Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Deep learning (DL) introduces a novel data-driven programming paradigm, where the system logic is constructed through data training. However, this approach poses challenges in terms of system analysis and defect detec... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 657-671页
作者: Hao WANG Jinwei WANG Xuelong HU Bingtao HU Qilin YIN Xiangyang LUO Bin MA Jinsheng SUN Department of Automation Nanjing University of Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Department of Computer and Software Nanjing University of Information Science and Technology School of Management Nanjing University of Posts and Telecommunications Department of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing Qilu University of Technology
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio... 详细信息
来源: 评论