咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是91-100 订阅
排序:
Joint Entity and Relation Extraction Based on Prompt Learning and Multi-channel Heterogeneous Graph Enhancement  22
Joint Entity and Relation Extraction Based on Prompt Learnin...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Lv, Haiqing Han, Xiaohui Wang, Peipei Zuo, Wenbo Guo, Jing Xu, Lijuan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China Quan Cheng Laboratory Jinan China Jinan China
Joint extraction of entity and relation is crucial in information extraction, aiming to extract all relation triples from unstructured text. However, current joint extraction methods face two main issues. Firstly, the... 详细信息
来源: 评论
Large circuit models: opportunities and challenges
收藏 引用
science China(information sciences) 2024年 第10期67卷 25-66页
作者: Lei CHEN Yiqi CHEN Zhufei CHU Wenji FANG Tsung-Yi HO Ru HUANG Yu HUANG Sadaf KHAN Min LI Xingquan LI Yu LI Yun LIANG Jinwei LIU Yi LIU Yibo LIN Guojie LUO Hongyang PAN Zhengyuan SHI Guangyu SUN Dimitrios TSARAS Runsheng WANG Ziyi WANG Xinming WEI Zhiyao XIE Qiang XU Chenhao XUE Junchi YAN Jun YANG Bei YU Mingxuan YUAN Evangeline F.Y.YOUNG Xuan ZENG Haoyi ZHANG Zuodong ZHANG Yuxiang ZHAO Hui-Ling ZHEN Ziyang ZHENG Binwu ZHU Keren ZHU Sunan ZOU Huawei Noah’s Ark Lab School of Integrated Circuits Peking University Faculty of Electrical Engineering and Computer Science Ningbo University Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Department of Computer Science and Engineering The Chinese University of Hong Kong School of Integrated Circuits Southeast University Huawei HiSilicon Peng Cheng Laboratory School of Computer Science Peking University School of Microelectronics State Key Laboratory of Integrated Chips and System Fudan University School of Artificial Intelligence Shanghai Jiao Tong University
Within the electronic design automation(EDA) domain, artificial intelligence(AI)-driven solutions have emerged as formidable tools, yet they typically augment rather than redefine existing methodologies. These solutio... 详细信息
来源: 评论
An Efficient and Privacy-Preserving Load Monitoring and Billing Scheme in Smart Grid  9
An Efficient and Privacy-Preserving Load Monitoring and Bill...
收藏 引用
9th IEEE International Conference on Data science in Cyberspace, DSC 2024
作者: Ding, Yong Yuan, Enchang Yang, Changsong Liang, Hai Wang, Huiyong Peng, Xinyong Guilin University of Electronic Technology Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin541004 China Guangxi Zhuang Autonomous Region Information Center Guangxi Key Laboratory of Digital Infrastructure Nanning530000 China Guilin University of Electronic Technology School of Mathematics and Computing Science Guilin541004 China
The smart grid is widely recognized as a highly efficient solution for mitigating carbon emissions and addressing energy crises. Within this framework, the collection of metering data from users is crucial for improvi... 详细信息
来源: 评论
Multi‐granularity re‐ranking for visible‐infrared person re‐identification
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第3期8卷 770-779页
作者: Yadi Wang Hongyun Zhang Duoqian Miao Witold Pedrycz Department of Computer Science and Technology Tongji UniversityShanghaiChina Key Laboratory of Embedded System and Service Computing Ministry of EducationShanghaiChina Department of Electrical and Computer Engineering University of AlbertaEdmontonAlbertaCanada System Research Institute Polish Academy of SciencesWarsawPoland
Visible‐infrared person re‐identification(VI‐ReID)is a supplementary task of single‐modality re‐identification,which makes up for the defect of conventional re‐identification under insufficient *** is more chall... 详细信息
来源: 评论
Recent Progress in Reinforcement Learning and Adaptive Dynamic Programming for Advanced Control Applications
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第1期11卷 18-36页
作者: Ding Wang Ning Gao Derong Liu Jinna Li Frank L.Lewis IEEE the Faculty of Information Technology Beijing Key Laboratory of Computational Intelligence and Intelligent SystemBeijing Laboratory of Smart Environmental Protectionand Beijing Institute of Artificial IntelligenceBeijing University of TechnologyBeijing 100124China the School of System Design and Intelligent Manufacturing Southern University of Science and TechnologyShenzhen 518055China the Department of Electrical and Computer Engineering University of Illinois at ChicagoChicago IL 60607 USA the School of Information and Control Engineering Liaoning Petrochemical UniversityFushun 113001China the UTA Research Institute the University of Texas at ArlingtonArlington TX 76118 USA
Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and ... 详细信息
来源: 评论
TMAS:A transaction misbehavior analysis scheme for blockchain
收藏 引用
Blockchain(Research and Applications) 2024年 第3期5卷 42-52页
作者: Shiyong Huang Xiaohan Hao Yani Sun Chenhuang Wu Huimin Li Wei Ren Kim-Kwang Raymond Choo School of Computer Science China University of GeosciencesWuhan430074China Artificial Intelligence Thrust Information HubHong Kong University of Science and TechnologyGuangzhou511400China Yunnan Key Laboratory of Blockchain Application Technology Yunnan Innovation Institute of Beihang UniversityKunming650233China Fujian Key Laboratory of Financial Information Processing Putian UniversityPutian351100China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX 78249-0631USA
Blockchain-based cryptocurrencies,such as Bitcoins,are increasingly ***,the decentralized and anonymous nature of these currencies can also be(ab)used for nefarious activities such as money laundering,thus reinforcing... 详细信息
来源: 评论
An Improved YOLOv5s-Based Smoke Detection system for Outdoor Parking Lots
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 3333-3349页
作者: Ruobing Zuo Xiaohan Huang Xuguo Jiao Zhenyong Zhang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Information and Control Engineering Qingdao University of TechnologyQingdao266520China State Key Laboratory of Industrial Control Technology College of Control Science and EngineeringZhejiang UniversityHangzhou310027China Key Laboratory of Computing Power Network and Information Security Ministry of EducationQilu University of Technology(Shandong Academy of Sciences)Jinan250353China Text Computing&Cognitive Intelligence Engineering Research Center of National Education Ministry Guizhou UniversityGuiyang550025China
In the rapidly evolving urban landscape,outdoor parking lots have become an indispensable part of the city’s transportation *** growth of parking lots has raised the likelihood of spontaneous vehicle combus-tion,a si... 详细信息
来源: 评论
Minimum Path Cost Multi-path Routing Algorithm with No Intersecting Links in Quantum key Distribution Networks  6
Minimum Path Cost Multi-path Routing Algorithm with No Inter...
收藏 引用
2023 IEEE 6th International Conference on information systems and computer Aided Education, ICISCAE 2023
作者: Miao, Minghui Fang, Shuo Wu, Weijie Yuan, Xiaotong Bi, Lin Key Laboratory of Network and Information Security in Jilin Province Changchun China Changchun University of Science and Technology School of Computer Science and Technology Jilin Changchun China
Quantum key distribution (QKD) provides information-theoretic security based on quantum mechanics, and as quantum key distribution becomes increasingly practical, questions of how to employ it effectively over largesc... 详细信息
来源: 评论
Exploring Global and Local information for Anomaly Detection with Normal Samples
Exploring Global and Local Information for Anomaly Detection...
收藏 引用
2023 IEEE International Conference on systems, Man, and Cybernetics, SMC 2023
作者: Xu, Fan Wang, Nan Zhao, Xibin School of Computer Science and Technology University of Science and Technology of China Hefei230026 China School of Software Beijing Jiaotong University Beijing100044 China Key Laboratory for Information System Security Beijing100084 China
Anomaly detection aims to detect data that do not conform to regular patterns, and such data is also called outliers. The anomalies to be detected are often tiny in proportion, containing crucial information, and are ...
来源: 评论
Simultaneous segmentation and classification of colon cancer polyp images using a dual branch multi-task learning network
收藏 引用
Mathematical Biosciences and Engineering 2024年 第2期21卷 2024-2049页
作者: Li, Chenqian Liu, Jun Tang, Jinshan School of Computer Science and Technology Wuhan University of Science and Technology Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan430065 China Department of Health Administration and Policy College of Public Health George Mason University FairfaxVA22030 United States
Accurate classification and segmentation of polyps are two important tasks in the diagnosis and treatment of colorectal cancers. Existing models perform segmentation and classification separately and do not fully make... 详细信息
来源: 评论