咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是111-120 订阅
排序:
Personalized Federated Learning for Heterogeneous Residential Load Forecasting
收藏 引用
Big Data Mining and Analytics 2023年 第4期6卷 421-432页
作者: Xiaodong Qu Chengcheng Guan Gang Xie Zhiyi Tian Keshav Sood Chaoli Sun Lei Cui the Shanxi Key Laboratory of Advanced Control and Equipment Intelligence Taiyuan University of Science and TechnologyTaiyuan 030024China the Faculty of Engineering and Information Technology University of Technology SydneyUltimo 2007Australia the Centre for Cyber Security Research and Innovation Deakin UniversityMelbourne 3125Australia the School of Computer Science and Technology Taiyuan University of Science and TechnologyTaiyuan 030024China
Accurate load forecasting is critical for electricity production,transmission,and *** learning(DL)model has replaced other classical models as the most popular prediction ***,the deep prediction model requires users t... 详细信息
来源: 评论
A Reversible Data Hiding in Encryption Domain for JPEG Image Based on Controllable Ciphertext Range of Paillier Homomorphic Encryption Algorithm  21st
A Reversible Data Hiding in Encryption Domain for JPEG Ima...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Ma, Bin Zhao, Chunxin Ma, Ruihe Xian, Yongjin Wang, Chunpeng Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Economics Jilin University Changchun130015 China
With the rapid advancement of cloud computing, significant security concerns regarding data storage have been continuously raised. When the encrypted images are stored in the cloud, reversible data hiding in encrypted... 详细信息
来源: 评论
Position Measurement Based Slave Torque Feedback Control for Teleoperation systems With Time-Varying Communication Delays
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 388-402页
作者: Xian Yang Jing Yan Changchun Hua Xinping Guan the Institute of Information Science and Engineering Yanshan University the Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004China IEEE the Institute of Electrical Engineering Yanshan UniversityQinhuangdao 066004China the Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Bilateral teleoperation system is referred to as a promising technology to extend human actions and intelligence to manipulating objects *** the tracking control of teleoperation systems,velocity measurements are nece... 详细信息
来源: 评论
Cloud Data Deduplication Scheme Based on Blockchain
Cloud Data Deduplication Scheme Based on Blockchain
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Shi, Pengliang Hao, Dongning Cyber Security and Computer Science Hebei University Key Laboratory on High Trusted Information System Baoding China International College of Hebei University Baoding China
To address the problem of untrustworthiness among entities faced in the process of data deduplication in cloud storage environment, this paper proposes a cloud data deduplication scheme based on blockchain. Firstly, t... 详细信息
来源: 评论
A New Perspective of Deep Learning Testing Framework: Human-computer Interaction Based Neural Network Testing
A New Perspective of Deep Learning Testing Framework: Human-...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Wei Kong Hu Li Qianjin Du Huayang Cao Xiaohui Kuang National Key Laboratory of Science and Technology on Information System Security Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Deep learning models have revolutionized various domains but have also raised concerns regarding their security and reliability. Adversarial attacks and coverage-based testing have been extensively studied to assess a... 详细信息
来源: 评论
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
收藏 引用
IEEE Transactions on Intelligent Transportation systems 2024年 第9期25卷 12528-12537页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Tariq, Tayyaba Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
Vehicular network technology has made substantial advancements in recent years in the field of Intelligent Transportation systems. Vehicular Cloud Computing (VCC) has emerged as a novel paradigm with a substantial inc... 详细信息
来源: 评论
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
收藏 引用
science China(information sciences) 2023年 第3期66卷 289-290页
作者: Axin XIANG Hongfeng GAO Youliang TIAN Liang WAN College of Computer Science and Technology Guizhou University Institute of Cryptography and Data Security Guizhou University Network and Information Management Center Guizhou University State Key Laboratory of Public Big Data Guizhou University Institute of Computer Software and Theory Guizhou University
Dear editor, key security is of great practical significance and demand to guarantee the security of digital assets in the blockchain system. At present, users prefer to escrow their assets on centralized institutions...
来源: 评论
A Study on Semi-Supervised Semantic Segmentation of Ship Flame Images  29
A Study on Semi-Supervised Semantic Segmentation of Ship Fla...
收藏 引用
29th IEEE International Conference on Parallel and Distributed systems, ICPADS 2023
作者: Wan, Junwei Chen, Yaojie Zheng, Xuecong Wuhan University of Science and Technology Department of Computer Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China
In addressing the challenges of limited semantic labeling data and imprecise segmentation regions prevalent in the semantic segmentation of ship flame images, this study introduces a semi-supervised semantic segmentat... 详细信息
来源: 评论
OFDM-structure based waveform designs for integrated sensing and communication
收藏 引用
science China(information sciences) 2025年 第5期68卷 267-284页
作者: Jiaqi LIU Ping YANG Ke JIANG Jiarong ZHAO Wei XIANG Jianping WEI Ruixiang DUAN Saviour ZAMMIT Tony Q.S.QUEK National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China School of Computing Engineering and Mathematical Sciences La Trobe University Meituan Academy of Robotics Department of Communications and Computer Engineering University of Malta Information Systems Technology and Design Pillar Singapore University of Technology and Design
The future sixth-generation(6G) paradigm aims to seamlessly integrate communication and environmental sensing capabilities into a single radio signal, promising improved efficiency and cost-effectiveness through simul... 详细信息
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论