咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是131-140 订阅
排序:
Stackelberg Game-Based Pricing and Offloading for the DVFS-Enabled MEC systems
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2502-2515页
作者: Mei, Jing Zeng, Cuibin Tong, Zhao Yang, Zhibang Li, Keqin Hunan Normal University College of Information Science and Engineering Changsha410081 China Changsha University in Changsha Hunan Province Key Laboratory of Industrial Internet Technology and Security Hunan 410022 China Hunan University College of Information Science and Engineering Changsha410012 China National Supercomputing Center Hunan Changsha410082 China State University of New York Department of Computer Science New YorkNY12561 United States
Due to the limited computing resources of both mobile devices (MDs) and the mobile edge computing (MEC) server, devising reasonable strategies for MD task offloading, MEC server resource pricing, and resource allocati... 详细信息
来源: 评论
A robust and automatic method for the recognition of speech category in online learning discourse
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第12期15卷 3913-3924页
作者: Jiang, Dazhi He, Zhihui Chen, Yifei Xu, Linyan Lin, Jiali Guangdong Provincial Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510399 China Department of Computer Science Shantou University Shantou515063 China Department of Management Economics and Industrial Engineering Politecnico di Milano MI Milan20156 Italy School of Business Shantou University Shantou515063 China
It is a rapid and irresistible developing trend that the traditional classroom learning mode is transformed into an online learning mode. In the online learning process, it is important to achieve effective voice sepa... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural information Processing systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage
收藏 引用
Frontiers of computer science 2022年 第6期16卷 103-121页
作者: Qingqing GAN Joseph K.LIU Xiaoming WANG Xingliang YUAN Shi-Feng SUN Daxin HUANG Cong ZUO Jianfeng WANG Guangzhou Key Laboratory of Multilingual Intelligent Processing School of Information Science and Technology/School of Cyber SecurityGuangdong University of Foreign StudiesGuangzhou510006China Department of Computer Science Jinan UniversityGuangzhou510632China Faculty of Information Technology Monash UniversityClayton3168Australia State Key Laboratory of Integrated Service Networks(ISN) Xidian UniversityXi’an710071China
Searchable symmetric encryption(SSE)has been introduced for secure outsourcing the encrypted database to cloud storage,while maintaining searchable *** various SSE schemes,most of them assume the server is honest but ... 详细信息
来源: 评论
An Effective Lung Cancer Diagnosis Model Using Pre-Trained CNNs
收藏 引用
computer Modeling in Engineering & sciences 2025年 第4期143卷 1129-1155页
作者: Majdi Rawashdeh Muath A.Obaidat Meryem Abouali Dhia Eddine Salhi Kutub Thakur Department of Business Information Technology Princess Sumaya University for TechnologyAmman11941Jordan Department of Computer Engineering Al Yamamah UniversityRiyadh11512Saudi Arabia Department of Computer Science John Jay College and the Graduate CenterThe City University of New YorkNew YorkNY 10019USA Department of Computer Science John Jay College at the City University of NewYorkNewYorkNY 10019USA LIMOSE Laboratory Department of Computer ScienceM’hamed Bougara UniversityBoumerdes35000Algeria Department of Professional Security Studies New Jersey City UniversityJersey CityNJ 07305USA
Cancer is a formidable andmultifaceted disease driven by genetic aberrations and metabolic *** 19% of cancer-related deaths worldwide are attributable to lung and colon cancer,which is also the top cause of death *** ... 详细信息
来源: 评论
Research on Metaverse security and Forensics
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 799-825页
作者: Guangjun Liang Jianfang Xin Qun Wang Xueli Ni Xiangmin Guo Pu Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina School of Intelligent Engineering Nanjing Institute of Railway TechnologyNanjingChina
As a subversive concept,the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic,industrial,and investment ***,while the metaverse brings unprecedente... 详细信息
来源: 评论
Towards Privacy-Preserving and Practical Vaccine Supply Chain based on Blockchain  18
Towards Privacy-Preserving and Practical Vaccine Supply Chai...
收藏 引用
18th Asia Joint Conference on information security, AsiaJCIS 2023
作者: Wen, Baodong Wang, Yujue Ding, Yong Liang, Hai Yang, Changsong Luo, Decun Hangzhou Innovation Institute of Beihang University Hangzhou China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin China Pengcheng Laboratory Cyberspace Security Research Center Shenzhen China
Vaccines play a vital role in safeguarding people's health and improving their well-being. With the increase in the variety and number of infectious diseases, the importance of vaccination cannot be underestimated... 详细信息
来源: 评论
Malicious Traffic Detection with Noise Labels Based on Cross-Modal Consistency
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2024年 第2期6卷 148-151页
作者: Yuan, Qingjun Niu, Weina Wang, Yongjuan Gou, Gaopeng Lu, Bin Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518110 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
To train robust malicious traffic identification models under noisy labeled datasets, a number of learning with noise labels approaches have been introduced, among which parallel training methods have been proved to b... 详细信息
来源: 评论
m2Vib: 2D Vibration Measurement Using a Single mmWave Radar
m2Vib: 2D Vibration Measurement Using a Single mmWave Radar
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Haolin Wang Wei Xu Zezhao Li Yanni Yang Zhijian Huang School of Computer Science and Technology Shandong University Qingdao China National Key Laboratory of Science and Technology on Information System Security China
Two-dimensional vibration measurement is essential for monitoring structure and machine health, especially providing more information than those 1D solutions. However, most existing 2D vibration monitoring methods req... 详细信息
来源: 评论
BHJO: A Novel Hybrid Metaheuristic Algorithm Combining the Beluga Whale, Honey Badger, and Jellyfish Search Optimizers for Solving Engineering Design Problems
收藏 引用
computer Modeling in Engineering & sciences 2024年 第10期141卷 219-265页
作者: Farouq Zitouni Saad Harous Abdulaziz S.Almazyad Ali Wagdy Mohamed Guojiang Xiong Fatima Zohra Khechiba Khadidja  Kherchouche Department of Computer Science and Information Technology Kasdi Merbah UniversityP.O.Box 30000OuarglaAlgeria Department of Computer Science College of Computing and InformaticsUniversity of SharjahP.O.Box 27272SharjahUnited Arab Emirates Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11937Jordan Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China
Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization *** approach aims to leverage the strengths of mult... 详细信息
来源: 评论