咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是121-130 订阅
排序:
FairCoRe: Fairness-Aware Recommendation Through Counterfactual Representation Learning
收藏 引用
IEEE Transactions on Knowledge and Data Engineering 2025年 第7期37卷 4049-4062页
作者: Bin, Chenzhong Liu, Wenqiang Zhang, Feng Chang, Liang Gu, Tianlong Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China Guilin University of Electronic Technology School of Business Guilin541004 China Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guilin541004 China Jinan University College of Cyber Security Engineering Research Center of Trustworthy AI Ministry of Education Guangzhou510632 China
Eliminating bias from data representations is crucial to ensure fairness in recommendation. Existing studies primarily focus on weakening the correlation between data representations and sensitive attributes, yet may ... 详细信息
来源: 评论
An end-to-end instance segmentation method based on improved ConvNeXt V2
收藏 引用
International Journal of Wireless and Mobile Computing 2024年 第4期26卷 384-392页
作者: Wang, Wenlu Sun, Ying Xu, Manman Bai, Dongxu Huang, Li Zou, Chunlong Chen, Baojia Tang, Dalai Key Laboratory of Metallurgical Equipment and Control Technology of Ministry of Education Wuhan University of Science and Technology Hubei Wuhan China Research Centre for Biomimetic Robot and Intelligent Measurement and Control Wuhan University of Science and Technology Hubei Wuhan China Hubei Key Laboratory of Mechanical Transmission and Manufacturing Engineering Wuhan University of Science and Technology Hubei Wuhan China College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology Hubei Wuhan China College of Mechanical Engineering Hubei University of Automotive Technology Hubei Shiyan China Hubei Key Laboratory of Hydroelectric Machinery Design and Maintenance China Three Gorges University Hubei Yichang China School of Computer Information Management Inner Mongolia University of Finance and Economics Hohhot China
In order to improve the efficiency of indoor mobile robots in locating and segmenting environmental instances, an instance segmentation method based on RTMDet is proposed. Firstly, the more powerful ConvNeXt V2 is use... 详细信息
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Liu, Yajun Li, Ru Li, Aimin Fei, Rong Guo, Xie Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ... 详细信息
来源: 评论
GHTO: Improving Byzantine Robustness in Distributed Machine Learning Through Gradient Heterogeneity Twofold Optimization  6
GHTO: Improving Byzantine Robustness in Distributed Machine ...
收藏 引用
6th International Conference on Frontier Technologies of information and computer, ICFTIC 2024
作者: Li, Caiyun Yang, Ming Cao, Jian Wu, Xiaoming He, Yunpeng Wang, Xin Jinan250014 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China Shandong Evayinfo Technology Co. Ltd Jinan250101 China
Heterogeneous datasets induce local gradient variance and global gradient variance in distributed learning, collectively referred to as gradient heterogeneity. Gradient heterogeneity increases the system's vulnera... 详细信息
来源: 评论
Fuzzing DBMS via NNLM  7
Fuzzing DBMS via NNLM
收藏 引用
7th IEEE International Conference on Data science in Cyberspace, DSC 2022
作者: Li, Yabin Nie, Yuanping Kuang, Xiaohui Beijing University of Posts and Telecommunications School of Computer Science Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Vulnerabilities in database management system (DBMS) can cause serious security problems affecting hundreds of millions of software systems. Fuzzing is an effective vulnerability mining technology, but few studies uti... 详细信息
来源: 评论
Spiderweb Protector: Biomimetic Defense Against Targeted Attacks on Graph Neural Networks  21
Spiderweb Protector: Biomimetic Defense Against Targeted Att...
收藏 引用
21st International computer Conference on Wavelet Active Media technology and information Processing, ICCWAMTIP 2024
作者: Zhou, Zeyu Huang, Yuanyuan Wang, Yongli Li, Siyu Lu, Jiazhong He, Peilin Chengdu University of Information Technology Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China Dazhou Key Laboratory Government Data Security Dazhou635000 China University of Pittsburgh Department of Informatics and Networked Systems Pittsburgh15260 United States
Graph Neural Networks (GNNs) have emerged as powerful tools across diverse applications, including social networks, bioinformatics, and recommendation systems. However, their susceptibility to adversarial attacks, par... 详细信息
来源: 评论
Adaptive Granulation for Efficient Classification on Noise Labeled Images  9
Adaptive Granulation for Efficient Classification on Noise L...
收藏 引用
9th IEEE International Conference on Computational Intelligence and Applications, ICCIA 2024
作者: Cai, Kecan Zhang, Hongyun Miao, Duoqian Tongji University Department of Computer Science and Technology Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China
Current semi-supervised learning-based sample selection methods for noisy label image classification typically utilize all clean and noisy samples for model training. However, not all noisy samples contribute positive... 详细信息
来源: 评论
DapperFL: Domain Adaptive Federated Learning with Model Fusion Pruning for Edge Devices  38
DapperFL: Domain Adaptive Federated Learning with Model Fusi...
收藏 引用
38th Conference on Neural information Processing systems, NeurIPS 2024
作者: Jia, Yongzhe Zhang, Xuyun Hu, Hongsheng Choo, Kim-Kwang Raymond Qi, Lianyong Xu, Xiaolong Beheshti, Amin Dou, Wanchun State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China School of Computing Macquarie University Australia School of Information and Physical Sciences University of Newcastle Australia Department of Information Systems and Cyber Security University of Texas San Antonio United States College of Computer Science and Technology China University of Petroleum [East China China School of Computer and Software Nanjing University of Information Science and Technology China
Federated learning (FL) has emerged as a prominent machine learning paradigm in edge computing environments, enabling edge devices to collaboratively optimize a global model without sharing their private data. However...
来源: 评论
Sharing of Encrypted Lock keys in the Blockchain-Based Renting House system from Time- and Identity-Based Proxy Reencryption
收藏 引用
China Communications 2022年 第5期19卷 164-177页
作者: Zhiwei Wang Liping Qian Danwei Chen Guozi sun School of Computer Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210023China Guangxi Key Laboratory of Cryptography and Information Security Department of Computer SciencesGuilin University of Electronic TechnologyGuilin 541004China
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain *** CPA secure TIPRE ... 详细信息
来源: 评论
EPRFL:An Efficient Privacy-Preserving and Robust Federated Learning Scheme for Fog Computing
收藏 引用
China Communications 2025年 第4期22卷 202-222页
作者: Ke Zhijie Xie Yong Syed Hamad Shirazi Li Haifeng School of Computer Technology and Application Qinghai UniversityXining 810016China School of Computer and Information Science Qinghai Institute of TechnologyXining 810016China Guangdong Key Laboratory of Blockchain Security Guangzhou UniversityGuangzhou 510006China Department of Information Technology Hazara UniversityBaffa 21110Pakistan Qinghai Provincial Key Laboratory of Big Data in Finance and Artificial Intelligence Application Technology Xining 810016China
Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple *** combined with Fog Computing,FL offers enhanced capabilities for machine learnin... 详细信息
来源: 评论