咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是1001-1010 订阅
排序:
New Approach for Efficient Malicious Multiparty Private Set Intersection
SSRN
收藏 引用
SSRN 2023年
作者: Lv, Siyi Wei, Yu Jia, Jingyu Li, Xinhao Liu, Zheli Chen, Xiaofeng Guo, Liang College of Cyber Science The College of Computer Science Key Laboratory of Data and Intelligent System Security Ministry of Education Nankai University Tianjin China Department of Computer Science Purdue University United States School of Cyber Engineering Xidian University Xi’an China Huawei Technology Co. Ltd Shenzhen China
The Multiparty Private Set Intersection (MPSI) protocol allows untrusted parties to compute the intersection of their sets without revealing any additional information. However, existing solutions face challenges in t... 详细信息
来源: 评论
A residual attention-based privacy-preserving biometrics model of transcriptome prediction from genome
A residual attention-based privacy-preserving biometrics mod...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Cheng Tian Song Liu Jinbao Li Guangchen Wang Luyue Kong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Medicine Shandong Medical College Jinan China
Transcriptome prediction from genetic variation data is an important task in the privacy-preserving and biometrics field, which can better protect genomic data and achieve biometric recognition through transcriptome. ... 详细信息
来源: 评论
Vulnerable Region-Aware Greybox Fuzzing
收藏 引用
Journal of computer science & technology 2021年 第5期36卷 1212-1228页
作者: Ling-Yun Situ Zhi-Qiang Zuo Le Guan Lin-Zhang Wang Xuan-Dong Li Jin Shi Peng Liu State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China School of Information Management Nanjing UniversityNanjing 210023China Department of Computer Science University of GeorgiaAthensGA 30602U.S.A. College of Information Sciences and Technology Pennsylvania State UniversityState CollegePA 16802U.S.A
Fuzzing is known to be one of the most effective techniques to uncover security vulnerabilities of large-scale software *** fuzzing,it is crucial to distribute the fuzzing resource appropriately so as to achieve the b... 详细信息
来源: 评论
A transactional-behavior-based hierarchical gated network for credit card fraud detection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年
作者: Xie, Yu Zhou, MengChu Liu, Guanjun Wei, Lifei Zhu, Honghao De Meo, Pasquale College of Information Engineering Shanghai Maritime University Shanghai201306 China School of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou310018 China Helen and John C. Hartmann Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science Tongji University Shanghai201804 China College of Computer Science and Information Engineering Bengbu University Bengbu233030 China Department of Ancient and Modern Civilizations University of Messina Messina98166 Italy
The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system, as well as to enforce customer confidence in digital payment systems. Historically, credit... 详细信息
来源: 评论
Generative AI-Enhanced Cooperative MEC of UAVs and Ground Stations for Unmanned Surface Vehicles
Generative AI-Enhanced Cooperative MEC of UAVs and Ground St...
收藏 引用
Annual Conference on information sciences and systems (CISS)
作者: Jiahao You Ziye Jia Chao Dong Qihui Wu Zhu Han The Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics Nanjing China National Mobile Communications Research Laboratory Southeast University Nanjing China Department of Electrical and Computer Engineering University of Houston Houston TX USA Department of Computer Science and Engineering Kyung Hee University Seoul South Korea
The increasing deployment of unmanned surface vehicles (USVs) require computational support and coverage in applications such as maritime search and rescue. Unmanned aerial vehicles (UAVs) can offer low-cost, flexible... 详细信息
来源: 评论
Practitioners’ Expectations on Log Anomaly Detection
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Xiaoxue Li, Yishu Keung, Jacky Yu, Xiao Zou, Huiqi Yang, Zhen Sarro, Federica Barr, Earl T. Department of Electronic Engineering and Computer Science Hong Kong Metropolitan University Hong Kong Department of Computer Science City University of Hong Kong Hong Kong State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Department of Computer Science Johns Hopkins University Baltimore United States School of Computer Science and Technology Shandong University Shandong China Department of Computer Science University College London London United Kingdom
Log anomaly detection has become a common practice for software engineers to analyze software system behavior. Despite significant research efforts in log anomaly detection over the past decade, it remains unclear wha...
来源: 评论
AoI-aware Incentive Mechanism for Mobile Crowdsensing using Stackelberg Game
AoI-aware Incentive Mechanism for Mobile Crowdsensing using ...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Mingjun Xiao Yin Xu Jinrui Zhou Jie Wu Sheng Zhang Jun Zheng School of Computer Science and Technology University of Science and Technology of China China Suzhou Institute for Advanced Research University of Science and Technology of China China Department of Computer and Information Sciences Temple Universityy State Key Laboratory for Novel Software Technology Nanjing University China
Mobile CrowdSensing (MCS) is a mobile computing paradigm, through which a platform can coordinate a crowd of workers to accomplish large-scale data collection tasks using their mobile devices. information freshness ha...
来源: 评论
Hybrid Data-Free Knowledge Distillation
arXiv
收藏 引用
arXiv 2024年
作者: Tang, Jialiang Chen, Shuo Gong, Chen School of Computer Science and Engineering Nanjing University of Science and Technology China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education China Jiangsu Key Laboratory of Image and Video Understanding for Social Security China Center for Advanced Intelligence Project RIKEN Japan Department of Automation Institute of Image Processing and Pattern Recognition Shanghai Jiao Tong University China
Data-free knowledge distillation aims to learn a compact student network from a pre-trained large teacher network without using the original training data of the teacher network. Existing collection-based and generati... 详细信息
来源: 评论
FTG: Score-based black-box watermarking by fragile trigger generation for deep model integrity verification
收藏 引用
Journal of information and Intelligence 2024年 第1期2卷 28-41页
作者: Heng Yin Zhaoxia Yin Zhenzhe Gao Hang Su Xinpeng Zhang Bin Luo Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui UniversityHefei 230000China Shanghai key Laboratory of Multidimensional Information Processing East China Normal UniversityShanghai 200241China School of Communication and Electronic Engineering East China Normal UniversityShanghai 200241China Department of Computer Science and Technology Tsinghua UniversityBeijing 100000China School of Computer Science and Technology Fudan UniversityShanghai 200241China
Deep neural networks(DNNs)are widely used in real-world applications,thanks to their exceptional performance in image ***,their vulnerability to attacks,such as Trojan and data poison,can compromise the integrity and ... 详细信息
来源: 评论
Polygon search algorithm for ultra-compact multifunctional integrated photonics design
收藏 引用
Photonics Research 2024年 第7期12卷 1527-1541页
作者: TE DU ZHENG PENG PEIXIN HUANG ZHAOJIAN ZHANG HANSI MA XINPENG JIANG JIE HUANG MINGYU LUO HONGXIN ZOU JUNBO YANG Center of Material Science College of ScienceNational University of Defense TechnologyChangsha 410073China Institute for Quantum Science and Technology College of ScienceNational University of Defense TechnologyChangsha 410073China College of Computer National University of Defense TechnologyChangsha 410073China College of Systems Engineering National University of Defense TechnologyChangsha 410073China Defense Innovation Institute Academy of Military SciencesBeijing 100071China Photonics Research Institute Department of Electrical and Electronic EngineeringThe Hong Kong Polytechnic UniversityHong Kong 999077China Hunan Key Laboratory of Mechanism and Technology of Quantum Information Changsha 410073China
Ultra-compact multifunctional integrated photonic modules have great practical significance to photonic integrated circuits (PICs).However,the design effect and efficiency of the existing mainstream inverse design alg... 详细信息
来源: 评论