咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是1041-1050 订阅
排序:
Survey of Spectral Amplitude Coding Optical Code Division Multiple Access Families
收藏 引用
Journal of Lightwave technology 2025年
作者: Ullah, Rahat Ullah, Sibghat Ali, Aitizaz Jianxin, Ren Alwageed, Hathal Salamah Yaya, Mao Qi, Zhipeng Yu, Yongyi Imtiaz, Waqas A. Khan, Maqbool School of Physics and Optoelectronics Nanjing University of Information Science and Technology China Jiangsu Key Laboratory for Optoelectronic Detection of Atmosphere and Ocean Nanjing University of Information Science Technology Nanjing210044 China Jiangsu International Joint Laboratory on Meteorological Photonics and Optoelectronic Detection Nanjing University of Information Science Technology Nanjing210044 China School of Electronics Science and Technology Southeast University China School of Technology NSF Group Asia Pacific University Malaysia Saudi Arabia College of Computer Science Jouf University Saudi Arabia Electrical Engineering Department University of Engineering and Technology Peshawar Pakistan Pak-Austra Fachhochschule Haripur Pakistan
Quest for high capacity communication have led the research community to explore a plethora of technologies. Among these, optical code division multiple access (OCDMA) technique stands tall with support for high data ... 详细信息
来源: 评论
Design and Implementation of Takeaway Ordering Recommendation system Based on Python and Flask  1
收藏 引用
2nd International Conference on Applied Intelligence, ICAI 2024
作者: Cao, Junjie Yu, Wendong Wei, Hongwei Yuan, Lin Li, Zhujun Shandong Jinan250353 China Shandong Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Shandong Jinan250353 China Shandong Tianyi Information Technology Co. Ltd. Shandong Jinan250101 China Jinan Springs Patent and Trademark Office Shandong Jinan250014 China
With the rapid development of the economy, people are getting busier and busier, and it is difficult to find time to cook, so ordering takeout or dining at restaurants has become the norm. In the 2020 work report, the... 详细信息
来源: 评论
Robust Adversarial Defenses in Federated Learning: Exploring the Impact of Data Heterogeneity
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 6005-6018页
作者: Li, Qian Wu, Di Zhou, Dawei Lin, Chenhao Liu, Shuai Wang, Cong Shen, Chao Xi’an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an 710049 China Xi’an Jiaotong University School of Computer Science and Technology Xi’an 710049 China Xidian University Xi’an 710071 China Xi’an Jiaotong University School of Software Xi’an 710049 China City University of Hong Kong Department of Computer Science Hong Kong
Federated Learning (FL) enables geographically distributed clients to collaboratively train machine learning models by exchanging local model parameters while preserving data privacy. In practice, FL faces two critica... 详细信息
来源: 评论
A method of fundamental matrix estimation based on nsga-ii and improved quasi-affine transform
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2021年 第2期6卷 313-327页
作者: Fan, Yi-Kai Liu, Shi-Jian Kong, Ling-Ping Pan, Jeng-Shyang College of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China VSB-Technical University of Ostrava Czech Republic Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China Department of Information Management Chaoyang University of Technology Taiwan
The fundamental matrix is the mainstream solution to computer vision problems such as 3D reconstruction, real-time location and map building. Accuracy and efficiency are two main measurement indexes in fundamental mat... 详细信息
来源: 评论
A new quantum machine learning algorithm: split hidden quantum Markov model inspired by quantum conditional master equation
arXiv
收藏 引用
arXiv 2023年
作者: Li, Xiao-Yu Zhu, Qin-Sheng Hu, Yong Wu, Hao Yang, Guo-Wu Yu, Lian-Hui Chen, Geng School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China School of Physics University of Electronic Science and Technology of China Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610103 China Institute of Electronics and Information Industry Technology of Kash Kash 844000 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu610054 China
The Hidden Quantum Markov Model (HQMM) has significant potential for analyzing time-series data and studying stochastic processes in the quantum domain as an upgrading option with potential advantages over classical M... 详细信息
来源: 评论
Tree-based Search Graph for Approximate Nearest Neighbor Search
arXiv
收藏 引用
arXiv 2022年
作者: Fan, Xiaobin Wang, Xiaoping Lu, Kai Xue, Lei Zhao, Jinjing Hunan University Changsha410082 China National University of Defense Technology Changsha410073 China National Key Laboratory of Science and Technology on Information System Security Beijing China
Nearest neighbor search supports important applications in many domains, such as database, machine learning, computer vision. Since the computational cost for accurate search is too high, the community turned to the r... 详细信息
来源: 评论
NLOS/LOS Classification by Constructing Indirect Environment Interaction From GNSS Receiver Measurements Using a Transformer-Based Deep Learning Model
NLOS/LOS Classification by Constructing Indirect Environment...
收藏 引用
2023 International Technical Meeting of The Institute of Navigation, ITM 2023
作者: Li, Zhenni Zeng, Kungan Wang, Lujia Kan, Xie Yuan, Rong Xie, Shengli School of Automation Guangdong University of Technology Guangzhou510006 China Guangdong-HongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangzhou510006 China School of Software and Engineering Sun Yat-sen University Hong Kong Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong Techtotop Microelectronics Technology Co. Ltd Guangzhou510006 China Guangdong Key Laboratory of IoT Information Technology Guangzhou510006 China
The blockage of the direct signal by high-rise buildings degrades the positioning performance of the global navigation satellite system (GNSS) in urban canyons. Traditional methods usually distinguish the line-of-sigh... 详细信息
来源: 评论
Mixed Motivation Driven Social Multi-Agent Reinforcement Learning for Autonomous Driving
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第6期12卷 1272-1282页
作者: Long Chen Peng Deng Lingxi Li Xuemin Hu State Key Laboratory of Multimodal Artificial Intelligence Systems and the State Key Laboratory of Management and Control for Complex Systems Chinese Academy of Sciences Beijing WAYTOUS Inc. Beijing Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ) Shenzhen Institute of Artificial Intelligence and Robotics Xi'an Jiaotong University Xi'an China School of Computer Science and Information Engineering Hubei University Wuhan China Purdue School of Engineering and Technology Indiana University-Purdue University Indianapolis Indianapolis IN USA School of Artificial Intelligence Hubei University Wuhan Key Laboratory of Intelligent Sensing System and Security (Hubei University) Ministry of Education Wuhan China
Despite great achievement has been made in autonomous driving technologies, autonomous vehicles (AVs) still exhibit limitations in intelligence and lack social coordination, which is primarily attributed to their reli... 详细信息
来源: 评论
Membership information Leakage in Well-Generalized Auto Speech Recognition systems
Membership Information Leakage in Well-Generalized Auto Spee...
收藏 引用
Data science and Network security (ICDSNS), International Conference on
作者: Honglei Li Xinlong Zhao School of Cyberspace Security (School of Cryptology) Hainan University Haikou China Key Laboratory of Internet Information Retrieval of Hainan Province Haikou China School of computer science and technology Hainan University Haikou China
Membership inference attack (MIA) attempts to determine whether a particular data sample has participated in the training process of the target model, and is regarded as basic form of privacy breach in machine learnin...
来源: 评论
Robust Imagined Speech Production from Electrocorticography with Adaptive Frequency Enhancement
Robust Imagined Speech Production from Electrocorticography ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xu Xu Chong Fu Junxin Chen Gwanggil Jeon David Camacho School of Computer Science and Engineering Northeastern University Shenyang China School of Software Dalian University of Technology Dalian China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China College of Information Technology Incheon National University Incheon Korea Department of Computer Systems Engineering Universidad Politécnica de Madrid Madrid Spain
Imagined speech production with electrocorticography (ECoG) plays a crucial role in brain-computer interface system. A challenging issue is the great variation underlying the frequency bands of the ECoG signals’ enco... 详细信息
来源: 评论