咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是1061-1070 订阅
排序:
Abstraction-Based Synthesis of Controllers for Approximate Opacity
Abstraction-Based Synthesis of Controllers for Approximate O...
收藏 引用
IEEE Conference on Decision and Control
作者: Junyao Hou Siyuan Liu Xiang Yin Majid Zamani Department of Automation Key Laboratory of System Control and Information Processing Shanghai Jiao Tong University Shanghai China Division of Decision and Control Systems KTH Royal Institute of Technology Stockholm Sweden Department of Computer Science University of Colorado Boulder CO USA Department of Computer Science LMU Munich Munich Germany
Opacity is an important information-flow security property which characterizes the plausible deniability of certain “secret behaviors” in dynamical systems. In this paper, we study the problem of synthesizing contro...
来源: 评论
Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors  16th
Blockchain-Based Efficient Public Integrity Auditing for Clo...
收藏 引用
16th International Conference on information security and Cryptology, Inscrypt 2020
作者: Li, Shanshan Xu, Chunxiang Zhang, Yuan Yang, Anjia Wen, Xinsheng Chen, Kefei School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China College of Cyber Security Jinan University Guangzhou China Department of Mathematics Hangzhou Normal University Hangzhou China Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics Nanjing China
Public integrity auditing enables a user to delegate a third-party auditor (TPA) to periodically audit the integrity of the outsourced data. Whereas, the security of public auditing schemes relies on the trustworthine... 详细信息
来源: 评论
Device-to-Device Communications aided Integrated Sensing and Communication Networks: A Joint Design of Bandwidth and Power Allocations
Device-to-Device Communications aided Integrated Sensing and...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Chenglong Dou Ning Huang Yuan Wu Liping Qian Tony Q.S. Quek State Key Laboratory of Internet of Things for Smart City University of Macau China Department of Computer and Information Science University of Macau China Zhuhai UM Science and Technology Research Institute Zhuhai China College of Information Engineering Zhejiang University of Technology Hangzhou China Singapore University of Technology and Design Singapore
Integrated sensing and communication (ISAC) networks constitute a crucial paradigm for facilitating numerous advanced services in future wireless networks. This paper investigates the joint bandwidth and power allocat... 详细信息
来源: 评论
A Risk-Averse Just-In-Time Scheme for Learning-Based Operation of Microgrids With Coupled Electricity-Hydrogen-Ammonia Under Uncertainties
收藏 引用
IEEE Transactions on Sustainable Energy 2025年
作者: Li, Longyan Ning, Chao Pan, Guangsheng Zhang, Leiqi Gu, Wei Zhao, Liang Du, Wenli Shahidehpour, Mohammad Shanghai Jiao Tong University Department of Automation Shanghai200240 China Ministry of Education of China Key Laboratory of System Control and Information Processing Shanghai200240 China School of Electrical Engineering Southeast University Nanjing210096 China Zhejiang Key Laboratory of Distributed Generations and Microgrid Technology State Grid Zhejiang Electric Power Research Institute Hangzhou310014 China Key Laboratory of Smart Manufacturing in Energy Chemical Process Ministry of Education East China University of Science and Technology China Department of Electrical and Computer Engineering Illinois Institute of Technology ChicagoIL60616 United States
This paper proposes a Risk-Averse Just-In-Time (RAJIT) operation scheme for Ammonia-Hydrogen-based Micro-Grids (AHMGs) to boost electricity-hydrogen-ammonia coupling under uncertainties. First, an off-grid AHMG model ... 详细信息
来源: 评论
Seamless Decision-Making in the Big Data Era: A Modular Approach to Integrating IoT, Cloud Computing, and Data Lakes
Seamless Decision-Making in the Big Data Era: A Modular Appr...
收藏 引用
International Conference on Electrical, Communication, and computer Engineering (ICECCE)
作者: Mohamed Zemmouri Fatma Zohra Laalam Okba Kazar Yassine Himeur Adel Oulefki Chahrazad Toumi Wathiq Mansoor Shadi Attala Artificial Intelligence and Information Technologies Laboratory Faculty of New Information and Communication Technologies Kasdi Merbah Ouargla University Ouargla Algeria Department of Computer Science - LINFI Laboratory Mohamed Khider University Biskra Algeria Department of Information Systems and Security - College of Information Technology United Arab Emirate University Abu Dhabi United Arab Emirates College of Engineering and Information Technology University of Dubai Dubai UAE Department of Computer Science University of Sharjah Sharjah United Arab Emirates
The integration of big data with cutting-edge technologies like IoT and Cloud Computing has profoundly influenced various aspects of modern life, including everyday service processes. To facilitate data-driven decisio...
来源: 评论
Towards Task Sampler Learning for Meta-Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Jingyao Qiang, Wenwen Su, Xingzhe Zheng, Changwen Sun, Fuchun Xiong, Hui National Key Laboratory of Space Integrated Information System Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Thrust of Artificial Intelligence Hong Kong University of Science and Technology Guangzhou China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong
Meta-learning aims to learn general knowledge with diverse training tasks conducted from limited data, and then transfer it to new tasks. It is commonly believed that increasing task diversity will enhance the general... 详细信息
来源: 评论
QuerySOD: A Small Object Detection Algorithm Based on Sparse Convolutional Network and Query Mechanism
QuerySOD: A Small Object Detection Algorithm Based on Sparse...
收藏 引用
IEEE/RSJ International Conference on Intelligent Robots and systems (IROS)
作者: Zhengcai Cao Junnian Li Jie Niu MengChu Zhou State Key Laboratory of Robotics and Systems Harbin Institute of Technology Harbin China College of Information Science and Technology Beijing University of Chemical Technology Beijing China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
Although remarkable advances have been achieved in generic object detection, small object detection (SOD) remains challenging owing to small objects’ information loss and noisy representation caused by their non-unif... 详细信息
来源: 评论
Mechanical Vibration Signal Compression Based on Speech Codecs for Intelligent Manufacturing
SSRN
收藏 引用
SSRN 2023年
作者: Tang, Lili Tian, Hui Chang, Chin-Chen Huang, Hui College of Mechanical Engineering and Automation Huaqiao University Xiamen361021 China College of Computer Science and Technology Huaqiao University Xiamen361021 China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Xiamen361021 China Department of Information Engineering and Computer Science Feng Chia University Taichung40724 Taiwan
How to effectively compress mechanical signals so that they can support remote and real-time health monitoring is a hot issue in the context of intelligent manufacturing. Therefore, this paper presents a novel mechani... 详细信息
来源: 评论
Fuzzy Logic and Deep learning Techniques for Covid-19 Detection  23
Fuzzy Logic and Deep learning Techniques for Covid-19 Detect...
收藏 引用
23rd International Arab Conference on information technology, ACIT 2022
作者: Hassani, Belkis Akram, Khelili Mohamed Okba, Kazar Sihem, Slatnia Harous, Saad Athamena, Belkacem Houhamdi, Zina Smart Computer Science Laboratory Department of Computer Science Biskra Algeria University of Mohamed Khider Biskra Algeria College of Information Technology United Arab Emirate University Department of Information Systems and Security United Arab Emirates College of Computing and Informat Ics Department of Computer Science AL Ain United Arab Emirates University of Sharjah AL Ain United Arab Emirates College of Business Al Ain University Al Ain United Arab Emirates University of Al Ain Al Ain United Arab Emirates
With the development of ICT and its adoption in various domains, it gained remarkable intention in the healthcare sector which introduce the telemedicine term. The coronavirus pandemic has created several challenges f... 详细信息
来源: 评论
Diffusion-Driven Semantic Communication for Generative Models with Bandwidth Constraints
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Guo, Lei Chen, Wei Sun, Yuxuan Ai, Bo Pappas, Nikolaos Quek, Tony State Key Laboratory of Advanced Rail Autonomous Operation Beijing Jiaotong University China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China Department of Computer and Information Science Linköping University Linköping Sweden Singapore University of Technology and Design Singapore Singapore
Diffusion models have been extensively utilized in AI-generated content (AIGC) in recent years, thanks to the superior generation capabilities. Combining with semantic communications, diffusion models are used for tas... 详细信息
来源: 评论