咨询与建议

限定检索结果

文献类型

  • 1,952 篇 期刊文献
  • 1,814 篇 会议
  • 1 册 图书

馆藏范围

  • 3,767 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,641 篇 工学
    • 1,809 篇 计算机科学与技术...
    • 1,409 篇 软件工程
    • 633 篇 信息与通信工程
    • 410 篇 电气工程
    • 361 篇 控制科学与工程
    • 318 篇 电子科学与技术(可...
    • 226 篇 生物工程
    • 199 篇 机械工程
    • 160 篇 网络空间安全
    • 149 篇 光学工程
    • 136 篇 生物医学工程(可授...
    • 129 篇 仪器科学与技术
    • 110 篇 动力工程及工程热...
    • 108 篇 安全科学与工程
    • 105 篇 交通运输工程
    • 71 篇 建筑学
    • 66 篇 化学工程与技术
    • 65 篇 土木工程
  • 1,282 篇 理学
    • 688 篇 数学
    • 349 篇 物理学
    • 250 篇 生物学
    • 220 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 67 篇 化学
  • 660 篇 管理学
    • 426 篇 管理科学与工程(可...
    • 259 篇 图书情报与档案管...
    • 158 篇 工商管理
  • 145 篇 法学
    • 92 篇 社会学
  • 136 篇 医学
    • 119 篇 临床医学
    • 100 篇 基础医学(可授医学...
  • 58 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 92 篇 feature extracti...
  • 72 篇 federated learni...
  • 68 篇 semantics
  • 68 篇 security
  • 63 篇 deep learning
  • 63 篇 optimization
  • 63 篇 computational mo...
  • 62 篇 training
  • 61 篇 accuracy
  • 61 篇 cryptography
  • 56 篇 blockchain
  • 54 篇 computer science
  • 53 篇 laboratories
  • 51 篇 privacy
  • 48 篇 authentication
  • 39 篇 servers
  • 39 篇 data models
  • 39 篇 robustness
  • 38 篇 data mining
  • 37 篇 protocols

机构

  • 149 篇 department of co...
  • 77 篇 key laboratory o...
  • 75 篇 national key lab...
  • 66 篇 school of softwa...
  • 62 篇 shandong provinc...
  • 57 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 48 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 37 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 31 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 hai jin
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 14 篇 xin wang
  • 13 篇 wu yuan
  • 13 篇 ming gu

语言

  • 3,124 篇 英文
  • 550 篇 其他
  • 104 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3767 条 记 录,以下是1111-1120 订阅
排序:
Membership information Leakage in Well-Generalized Auto Speech Recognition systems
Membership Information Leakage in Well-Generalized Auto Spee...
收藏 引用
Data science and Network security (ICDSNS), International Conference on
作者: Honglei Li Xinlong Zhao School of Cyberspace Security (School of Cryptology) Hainan University Haikou China Key Laboratory of Internet Information Retrieval of Hainan Province Haikou China School of computer science and technology Hainan University Haikou China
Membership inference attack (MIA) attempts to determine whether a particular data sample has participated in the training process of the target model, and is regarded as basic form of privacy breach in machine learnin...
来源: 评论
Robust Imagined Speech Production from Electrocorticography with Adaptive Frequency Enhancement
Robust Imagined Speech Production from Electrocorticography ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xu Xu Chong Fu Junxin Chen Gwanggil Jeon David Camacho School of Computer Science and Engineering Northeastern University Shenyang China School of Software Dalian University of Technology Dalian China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China College of Information Technology Incheon National University Incheon Korea Department of Computer Systems Engineering Universidad Politécnica de Madrid Madrid Spain
Imagined speech production with electrocorticography (ECoG) plays a crucial role in brain-computer interface system. A challenging issue is the great variation underlying the frequency bands of the ECoG signals’ enco... 详细信息
来源: 评论
Syn-BERT: Bi-level Synonymous Data Augmented Self-supervised Embedding-based information Retrieval with BERT
Syn-BERT: Bi-level Synonymous Data Augmented Self-supervised...
收藏 引用
Pattern Recognition and Machine Learning (PRML), IEEE International Conference on
作者: Zhaojian Yu Tianlin Huang Rong Chen Haosheng Chen Shuyuan Lin College of Cyber Security Jinan University Guangzhou China School of Mathematics and Computer Science Quanzhou Normal University Quanzhou China Information Engineering College Xizang Minzu University Shanyang China Chongqing Key Laboratory of Image Cognition College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China
information retrieval, which seeks to locate the most relevant documents from a document pool given a user query, is critical in a wide range of applications. However, current embedding-based retrieval models require ... 详细信息
来源: 评论
Effectiveness Evaluation for Clinical Depression Detection Using Deep Learning Based Synthetic House-Tree-Person Test
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Chen, Zhuolong Yin, Xiaoqing Yang, Fan Li, Xiaofan Zhao, Zixuan Li, Xueying Liu, Jianghu Zhao, Yubin Xu, Cheng-Zhong Zheng, Fangfang Lin, Yong Sun Yat-Sen University School of Microelectronics Science and Technology 0000 China The Fifth Affiliated Hospital of Sun Yat-Sen University Department of Psychiatry 0000 China The Fifth Affiliated Hospital of Sun Yat-Sen University Pediatrics Department 0000 China Jinan University School of Intelligent System Science and Engineering 0000 China University of Macau State Key Laboratory of IoTSC Department of Computer and Information Science Macau0000 China
Depression is one of the most common mood disorders and the number of patients increases significantly in recent years. Due to the lack of biomarkers, conversation between patients and psychiatrists is still the main ... 详细信息
来源: 评论
A Lightweight Privacy-Preserving Data Sharing Scheme Supporting Intelligent Pricing in Smart Grid
A Lightweight Privacy-Preserving Data Sharing Scheme Support...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Xinyang Li Yujue Wang Yong Ding Yijie Zhou Changsong Yang Zhenwei Guo Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Hangzhou Innovation Institute of Beihang University Hangzhou China Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong China Guangxi Radio and Television Nanning China
Smart grid is the future direction of the traditional power system, with characteristics such as high efficiency and stability. Intelligent pricing, as part of the functionality of smart grids, relies on collecting a ... 详细信息
来源: 评论
MineLoRa: Markov Transition Fields and Adaptive Neural Networks for LoRa Device Radio Frequency Fingerprint Identification
MineLoRa: Markov Transition Fields and Adaptive Neural Netwo...
收藏 引用
Artificial Intelligence of Things and systems (AIoTSys), International Conference on
作者: Biaokai Zhu Yupeng Jia Zhonghao Wang Jiawei Wen Xinle Liu Shijia Zhao Qiongyue Xu Jie Song Ping Li Sanman Liu Feng Li Jumin Zhao Shanxi Police College Taiyuan University of Technology Taiyuan China Cyber Security Department Shanxi Police College Taiyuan China Intelligent Policing Key Laboratory of Sichuan Province Sichuan Police College Luzhou China School of Computer Science and Technology Anhui University Hefei China Taiyuan University of Technology Taiyuan China College of Information and Computer Taiyuan University of Technology Jinzhong China
With the development of LPWAN technology, LoRa, one of the typical representatives, is widely used in various communication scenarios. At the same time, it is also faced with problems such as difficulty in identifying... 详细信息
来源: 评论
Integrated high-performance error correction for continuous-variable quantum key distribution
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Chuang Li, Yang Ma, Li Yang, Jie Huang, Wei Sun, Ao Wang, Heng Luo, Yujie Li, Yong Chen, Ziyang Lau, Francis C.M. Zhang, Yichen Yu, Song Guo, Hong Xu, Bingjie National Key Laboratory of Security Communication Institute of Southwestern Communication Chengdu610041 China College of Computer Science Chongqing University Chongqing400044 China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Center for Quantum Information Technology Peking University Beijing100871 China Department of Electronic and Information Engineering Hong Kong Polytechnic University Hong Kong State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China
An integrated error-correction scheme with high throughput, low frame errors rate (FER) and high reconciliation efficiency under low signal to noise ratio (SNR) is one of the major bottlenecks to realize high-performa... 详细信息
来源: 评论
A biosensing system using a multiparameter nonlinear dynamic analysis of cardiomyocyte beating for drug-induced arrhythmia recognition
收藏 引用
Microsystems & Nanoengineering 2022年 第3期8卷 277-290页
作者: Hao Wang Yue Wu Quchao Zou Wenjian Yang Zhongyuan Xu Hao Dong Zhjing Zhu Depeng Wang Tanxing Wang Ning Hu Diming Zhang State Key Laboratory of Optoelectronic Materials and Technologies Guangdong Province Key Laboratory of Display Material and TechnologySchool of Electronics and Information TechnologySun Yat-sen UniversityGuangzhou 510006China Research Center for Itelligent Sensing Systems Zhejiang LabHangzhou 311121China ZJU-Hangzhou Global Scientific and Technological Innovation Center Department of ChemistryThe Second Affiliated Hospital Zhejiang University School of MedicineDepartment of Clinical Medical EngineeringZhejiang UniversityHangzhou 310058China Key Laboratory of Novel Target and Drug Study for Neural Repair of Zhejang Province School of MedicineSchool of Computer&Computing ScienceZhejiang University City CollegeHangzhou 310015China School of Brain Science and Brain Medicine Zhejiang UniversityHangzhou 310058China College of Energy and Power Engineering Nanjing University of Aeronautics and AstronauticsNanjing 210016China E-LinkCare Meditech Co LtdHangzhou 310011China State Key Laboratory of Transducer Technology Chinese Academy of SciencesShanghai 200050China
Cardiovascular disease is the number one cause of death in ***,cardiotoxicity is one of the most important adverse effects assessed by arrhythmia recognition in drug ***,cell-based techniques developed for arhythmia r... 详细信息
来源: 评论
SDNVD-SCADA: A formalized vulnerability detection platform in SDN-Enabled SCADA system  13th
SDNVD-SCADA: A formalized vulnerability detection platform i...
收藏 引用
13th Conference on Advanced computer Architecture, ACA 2020
作者: Zhao, Jinjing Pang, Ling Lin, Bai National Key Laboratory of Science and Technology on Information System Security Beijing China Beijing Institute of System Engineering Beijing China
After the Stunex event in 2010, the security problems of SCADA reveal to the public, which abstract more and more researchers to design new security firms to address the security problems of SCADA. Especially, after t... 详细信息
来源: 评论
StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network
StinAttack: A Lightweight and Effective Adversarial Attack S...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: Shangyuan Zhuang Jiyan Sun Hangsheng Zhang Xiaohui Kuang Ling Pang Haitao Liu Yinlong Liu School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China Computer Network Information Center Chinese Academy of Sciences Beijing China
Effective adversarial attacks simulation is essential for the deployment of ensemble Intrusion Detection systems (en- semble IDSs) in Satellite-Terrestrial Integrated Network (STIN). This is because it can automatical... 详细信息
来源: 评论