咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是991-1000 订阅
排序:
IVSign: Interpretable Vulnerability Signature via Code Embedding and Static Analysis
IVSign: Interpretable Vulnerability Signature via Code Embed...
收藏 引用
International Conference on Dependable systems and Networks Workshops (DSN-W)
作者: Ao Ding Gaolei Li Xiaoyu Yi Yuchen Liu School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security China Department of Computer Science North Carolina State University USA
Software vulnerability detection is evolving from pattern-driven methods to data-driven methods to be more automatic and intelligent due to the emergence of deep learning. However, false positives and coarse-grained d...
来源: 评论
A-FAR: Research on Anti-obscuring Face Recognition Based on Improved FaceNet Model
A-FAR: Research on Anti-obscuring Face Recognition Based on ...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Biaokai Zhu Yangyang Zhang Lu Li Yuhong He Yiting Song Xiafei Li Ruiting Yin Jie Song Ping Li Sanman Liu Jumin Zhao Cyber Security Department Shanxi Police College Taiyuan University of Technology Taiyuan China Cyber Security Department Shanxi Police College Taiyuan China Intelligent Policing Key Laboratory of Sichuan Province Sichuan Police College Luzhou China School of Computer Science and Technology Anhui University Hefei China College of Information and Computer Taiyuan University of Technology Jinzhong China
Face recognition and cloud computing are the current hot research areas, in real life, face image acquisition is often affected by various factors, such as occlusion, lighting and facial posture, many application scen...
来源: 评论
Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units  7th
Halftone Image Steganography Based on Maximizing Visual Sim...
收藏 引用
7th International Conference on Artificial Intelligence and security, ICAIS 2021
作者: Yin, Xiaolin Yu, Mujian Chen, Lili Wang, Ke Lu, Wei School of Computer Science and Engineering Guangdong Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Guangdong Science and Technology Innovation Monitoring and Research Center Guangzhou510033 China
Steganography focuses on imperceptibility of both the human eyes but also to potential analyzers. Based on the human visual system (HVS) of halftone image, most previous visual quality measurements for multi-tone imag... 详细信息
来源: 评论
Bidirectionally Guided Large Language Models for Consumer-Centric Personalized Recommendation
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Yu, Linfang Xiao, Peng Xu, Liqun Kumari, Saru Alenazi, Mohammed J.F. Industrial Research Institute Chengdu610213 China University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Chengdu University of Technology School of Computer and Network Security Chengdu China Industrial Research Institute Chengdu610213 China Chaudhary Charan Singh University Department of Mathematics Uttar Pradesh Meerut250004 India Department of Computer Engineering Riyadh11451 Saudi Arabia
With the increasing abundance of consumer electronics, consumers are facing the challenge of information overload, making personalized recommendation systems (RSs) crucial for enhancing consumer experience and promoti... 详细信息
来源: 评论
Generating Personalized Imputations for Patient Health Status Prediction in Electronic Health Records
Generating Personalized Imputations for Patient Health Statu...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yang Liu Weiyu Zhang Jiasheng Si Zhao Li Xueping Peng Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Evay Info Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia
Electronic health records (EHRs) play a crucial role in the development of personalized treatment plans for patients. However, EHRs are often highly incomplete, posing significant challenges for predictive modeling. W... 详细信息
来源: 评论
Contrastive Learning-Based Generic Audio-to-Lyrics Alignment
Contrastive Learning-Based Generic Audio-to-Lyrics Alignment
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Zhenkun Jin Shuai Huang Xin Nie Xinlei Zhou Yuanyuan Yi Gefei Zhou Wuhan Business UIniversity Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on BigData Security Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Journalism and Information Communication Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
In this research, we tackled the complex task of aligning audio and lyrics content automatically. This task entails the precise matching of lyrics with the corresponding audio segments in songs, necessitating the coor...
来源: 评论
Cloud Based AIVR Training system for Emergency Rescue
Cloud Based AIVR Training System for Emergency Rescue
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Meiya Dong Biaokai Zhu Jumin Zhao Jie Song School of Computer Science Peking University Beijing China Suzhou Industrial Technology Institute of Zhejiang University Suzhou China Cyber Security Shanxi Police College City Country College of Information and Optical Engineering Taiyuan University of Technology Taiyuan China Cyber security Intelligent Policing Key Laboratory of Sichuan Province Luzhou China
This paper mainly discusses the current situation and existing problems of training exercises in emergency medicial scenarios, as well as the importance and necessity of developing an AI training system for emergency ... 详细信息
来源: 评论
EeCA: A Novel Approach for Energy Conservation in MEC via NDN-Based Content Caching
EeCA: A Novel Approach for Energy Conservation in MEC via ND...
收藏 引用
Asia-Pacific Network Operations and Management Symposium (APNOMS)
作者: Jiaxin Xu Huiling Shi Haoxiang Chu Wei Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
In the context of escalating demands on wireless networks owing to the widespread application of 5G and the Internet of Things (IoT), enhancing network performance and user experience through the convergence of Multi-...
来源: 评论
Approximate state estimation with large-scale sensor networks under event-based sensor scheduling strategy
Approximate state estimation with large-scale sensor network...
收藏 引用
IEEE Conference on Decision and Control
作者: Xinhui Liu Meiqi Cheng Dawei Shi Ling Shi MIIT Key Laboratory of Servo Motion System Drive and Control School of Automation Beijing Institute of Technology Beijing China Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Kowloon Hong Kong China
In this paper, we investigate the issues of real-time sensor scheduling and state estimator design within large-scale sensor network systems. Specifically, data redundancy sometimes occurs in large-scale sensor arrays... 详细信息
来源: 评论
Identity Based Linkable Ring Signature with Logarithmic Size  17th
Identity Based Linkable Ring Signature with Logarithmic Size
收藏 引用
17th International Conference on information security and Cryptology, Inscrypt 2021
作者: Nassurdine, Mohamed Zhang, Huang Zhang, Fangguo School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China School of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China
Anonymity is an inevitable and sensitive matter of concern, especially in the age where people are willing to use digital devices and Internet to deal with almost all things in their work and daily life. To support an... 详细信息
来源: 评论