咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是1011-1020 订阅
排序:
Recent advances in wireless epicortical and intracortical neuronal recording systems
收藏 引用
science China(information sciences) 2022年 第4期65卷 5-22页
作者: Bowen JI Zekai LIANG Xichen YUAN Honglai XU Minghao WANG Erwei YIN Zhejun GUO Longchun WANG Yuhao ZHOU Huicheng FENG Honglong CHANG Jingquan LIU Unmanned System Research Institute Northwestern Polytechnical University Ministry of Education Key Laboratory of Micro and Nano Systems for Aerospace School of Mechanical EngineeringNorthwestern Polytechnical University Collaborative Innovation Center of Northwestern Polytechnical University NEURACLE TECH (China) Co. Ltd. College of Electronics and Information Hangzhou Dianzi University Defense Innovation Institute Academy of Military Sciences (AMS) Tianjin Artificial Intelligence Innovation Center (TAIIC) National Key Laboratory of Science and Technology on Micro/Nano Fabrication Department of Micro/Nano ElectronicsShanghai Jiao Tong University
An implantable brain-computer interface(BCI) has proven to be effective in the field of sensory and motor function restoration and in the treatment of neurological disorders. Using a BCI recording system,we can transf... 详细信息
来源: 评论
DFCM: A Distributed Floor Control Mechanism in PoC
收藏 引用
Chinese Journal of Electronics 2023年 第4期20卷 739-746页
作者: LIAO Jianxin LIU Haipeng LI Tonghong WANG Jingyu ZHU Xiaomin State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China EBUPT Information Technology Co. Ltd. Beijing China Department of Computer Science Technical University of Madrid Spain
With the fast progress of Collaborative multimedia application (CMA) running on overlay network, Push to talk over cellular (PoC) attracts significant interest in the field of mobile cellular communications. PoC is an... 详细信息
来源: 评论
A Software-Defined Reconfigurable Battery system Prototype
A Software-Defined Reconfigurable Battery System Prototype
收藏 引用
Asia-Pacific Conference on Communications
作者: Siyu Jin Baochang Liu Yanglin Zhou Junrui Liang Song Ci Department of Electrical Engineering Tsinghua University Beijing China School of Information Science and Technology ShanghaiTech University Shanghai China State Key Laboratory of Power System Operation and Control Tsinghua University Beijing China
In the energy internet era, distributed energy storage systems will be widely used in various industrial, commercial, and residential scenarios. However, the modeling of energy flow and the digital flow of information... 详细信息
来源: 评论
Lung Detection Based on YOLOv3  6th
Lung Detection Based on YOLOv3
收藏 引用
6th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2019
作者: Zhao, Qingda Zhang, Fuquan Ma, Linjuan Traditional Chinese Medicine Department of Chinese PLA General Hospital Beijing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350117 China School of Computer Science and Technology Beijing Institute of Technology Beijing China
Lung detection is attached much importance to in medical imaging to improve the efficiency and accuracy of the doctor’s work. Recently, it has become very popular among the researchers to explore deep medical technol... 详细信息
来源: 评论
The Weapon Target Assignment in Adversarial Environments  1
收藏 引用
2nd International Conference on Cognitive Computation and systems, ICCCS 2023
作者: Gao, Rui Zheng, Shaoqiu Wang, Kai Zhang, Longlong Zhu, Zhiyuan Yuan, Xiaohu College of Electronic and Information Engineering Southwest University Chongqing400715 China Key Lab of Information System Requirement Nanjing Research Institute of Electronics Engineering Nanjing210007 China Department of Computer Science and Technology Tsinghua University Beijing100084 China
In context of the current weapon target assignment (WTA) problem, consideration of target capability is often disregarded. To address this issue, we propose an optimized model for weapon target assignment in complex e... 详细信息
来源: 评论
Cross-heterogeneous Domain Authentication Scheme Based on Blockchain
收藏 引用
Journal of Artificial Intelligence and technology 2021年 第2期1卷 92-100页
作者: Jing Liu Yixin Liu Yingxu Lai Rongchen Li Siyu Wu Sami Mian College of Computer Science Faculty of Information TechnologyBeijing University of TechnologyBeijing 100124China Shaanxi Key Laboratory of Network and System Security Xi’an 710071China Science and Technology on Information Assurance Laboratory Beijing 100072China Engineering Research Center of Intelligent Perception and Autonomous Control Ministry of EducationBeijing 100124China Fan Gongxiu Honors College Beijing University of TechnologyBeijing 100124China University of Pittsburgh PittsburghPA 15260USA
With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their *** organizations use public key inf... 详细信息
来源: 评论
Ensemble Learning-based Traffic Classification with Small-Scale Datasets for Wireless Networks
Ensemble Learning-based Traffic Classification with Small-Sc...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Xiaorong Wang Wenting Wei Xiaoshan Yu Danyang Zheng Neeraj Kuma Lei Liu State Key Laboratory of Integrated Service Networks Xidian University Xi'an China School of Computing and Artificial Intelligence Southwest Jiaotong University China Department of Computer Science and Engineering Thapar Institute of Engineering and Technology India Guangzhou Institute of Technology Xidian University Xi'an China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications Xi'an China
Traffic classification is an essential part of intelligent network management in Fifth generation (5G) networks, from quality of service guarantees to security monitoring. With the evolution of diverse services and ap... 详细信息
来源: 评论
Traffic Pattern Sharing for Federated Traffic Flow Prediction with Personalization
Traffic Pattern Sharing for Federated Traffic Flow Predictio...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Hang Zhou Wentao Yu Sheng Wan Yongxin Tong Tianlong Gu Chen Gong School of Computer Science and Engineering Nanjing University of Science and Technology China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education China Jiangsu Key Laboratory of Image and Video Understanding for Social Security China SKLSDE Beihang University China Engineering Research Center of Trustworthy AI (Ministry of Education) Jinan University China
Accurate Traffic Flow Prediction (TFP) is crucial for enhancing the efficiency and safety of transportation systems, so it has attracted intensive researches by exploiting spatial-temporal dependencies within road net... 详细信息
来源: 评论
Research on Optimization and Scheduling of MPTCP Data Networks in GNSS Network Reference Stations
Research on Optimization and Scheduling of MPTCP Data Networ...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Fengqi Hao Yuxin Wang Hoiio Kong Dexin Ma Xiyuan Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Data Science City University of Macau Macau China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Communication College Qingdao Agricultural University Qingdao China
The Global Navigation Satellite system Network Reference Stations (GNSS-NRS) are pivotal in modern po-sitioning and navigation applications. However, GNSS-NRS face significant communication challenges, including insta... 详细信息
来源: 评论
CSCL-DTI: predicting drug-target interaction through cross-view and self-supervised contrastive learning
CSCL-DTI: predicting drug-target interaction through cross-v...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xuan Lin Xi Zhang Zu-Guo Yu Yahui Long Xiangxiang Zeng Philip S. Yu College of Computer Science Xiangtan University China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University China Singapore Immunology Network (SIgN) Agency for Science Technology and Research (A*STAR) Singapore College of Information Science and Engineering Hunan University China Department of Computer Science University of Illinois Chicago USA
Accurately predicting drug-target interactions (DTI) is a critical step in drug discovery. Existing methods of DTI prediction primarily employ Simplified Molecular-Input Line-Entry system (SMILES) sequences or molecul... 详细信息
来源: 评论