咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是141-150 订阅
排序:
Block-based fine-grained and publicly verifiable data deletion for cloud storage: Block-based fine-grained and publicly verifiable..: C. Yang et al.
收藏 引用
Soft Computing 2024年 第21期28卷 12491-12506页
作者: Yang, Changsong Liu, Yueling Ding, Yong Wu, Yongqiang Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China Lion Rock Labs of Cyberspace Security Institute of Cyberspace Technology HKCT Institute for Higher Education 999077 Hong Kong Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin541004 China School of Computer Guangdong University of Science & Technology Dongguan523083 China South China Technical Support Department Topsec Network Technology Inc. Guangzhou510000 China
One of the most important services provided by cloud service providers (CSPs), cloud storage is economically attractive and can provide on-demand data storage service to resource-constrained tenants in the manner of p... 详细信息
来源: 评论
Efficient Private Circuits with Precomputation
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded systems 2023年 第2期2023卷 286-309页
作者: Wang, Weijia Ji, Fanjie Zhang, Juelin Yu, Yu School of Cyber Science and Technology Shandong University Qingdao China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Qingdao China Quan Cheng Shandong Laboratory Jinan China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Shanghai Qi Zhi Institute Shanghai China Shanghai Key Laboratory of Privacy-Preserving Computation Shanghai China
At CHES 2022, Wang et al. described a new paradigm for masked implementations using private circuits, where most intermediates can be precomputed before the input shares are accessed, significantly accelerating the on... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural information Processing systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Distributed acoustic sensing signal event recognition and localization based on improved YOLOv7
Distributed acoustic sensing signal event recognition and lo...
收藏 引用
2023 International Congress on Ultrasonics, ICU Beijing 2023
作者: Zhang, Hongyu Wang, Chang Zhang, Faxiang Jiang, Shaodong Sun, Zhihui Wang, Xiaodong Duan, Zhenhui Gao, Fengxia Liu, Zhaoying Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The distributed acoustic sensing (DAS) system based on phase-sensitive optical time domain reflection (Φ -OTDR) technology is widely used in pipeline safety monitoring, perimeter security, structure monitoring, etc. ... 详细信息
来源: 评论
React Agent-Based Question Answering Method for Biology in National College Entrance Examination  24
React Agent-Based Question Answering Method for Biology in N...
收藏 引用
5th International Symposium on Artificial Intelligence for Medicine science, ISAIMS 2024
作者: Chen, Yulin Luo, Jing Tu, Xinhui College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Hubei Wuhan China College of Computer Science Central China Normal University Hubei Wuhan China
Recent advancements in large language models have led to significant improvements in various natural language processing tasks, including automated question answering. However, these models still struggle with providi... 详细信息
来源: 评论
Mal-lightDet: A light method to detect malicious encrypted traffic based on machine learning  23
Mal-lightDet: A light method to detect malicious encrypted t...
收藏 引用
2023 4th International Conference on Control, Robotics and Intelligent system, CCRIS 2023
作者: Liu, Xu Liu, Zhang Zhao, Xiaojing Ren, Zhengwei School of Computer Science and Technology Changchun University of Science and Technology China Jilin Province Key Laboratory of Network and Information Security China School of Artificial Intelligence Changchun University of Science and Technology Changchun China
Encryption not only protects the network security and privacy, but also encrypts attackers' malicious traffic to evade detection. Thus, how to detect malicious encrypted traffic is critical for network security. F... 详细信息
来源: 评论
A English Pronunciation Error Detection and Quality Evaluation Model Based on English Text  4
A English Pronunciation Error Detection and Quality Evaluati...
收藏 引用
4th International Symposium on computer Engineering and Intelligent Communications, ISCEIC 2023
作者: Guo, Qingkai Huang, Guimin Lin, Jianxing Zhou, Ya Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China
In English learning, speaking practice is crucial, but traditional classroom teaching can hardly meet the needs of most learners. In this paper, we investigate and improve the two essential techniques of pronunciation... 详细信息
来源: 评论
MTRNet: An Efficient Hybrid Network Model for Surface Defect Detection of Sheet Metal  36
MTRNet: An Efficient Hybrid Network Model for Surface Defect...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Hao, Huijuan Zhu, Sijian Chen, Yu Yi, Changle Zhao, Hongge Feng, Yue Yang, Rong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Addressing the challenges posed by the insufficient computational power of low-spec devices to achieve the inference efficiency of prevailing deep learning models, alongside the variability in type and shape within in... 详细信息
来源: 评论
GPT-4 enhanced multimodal grounding for autonomous driving:Leveraging cross-modal attention with large language models
收藏 引用
Communications in Transportation Research 2024年 第1期4卷 5-23页
作者: Haicheng Liao Huanming Shen Zhenning Li Chengyue Wang Guofa Li Yiming Bie Chengzhong Xu State Key Laboratory of Internet of Things for Smart City and Department of Computer and Information Science University of MacaoMacao SAR999078China Department of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu610000China State Key Laboratory of Internet of Things for Smart City and Departments of Civil and Environmental Engineering and Computer and Information Science University of MacaoMacao SAR999078China State Key Laboratory of Internet of Things for Smart City and Departments of Civil and Environmental Engineering University of MacaoMacao SAR999078China College of Mechanical and Vehicle Engineering Chongqing UniversityChongqing400030China School of Transportation Jilin UniversityChangchun130000China
In the field of autonomous vehicles(AVs),accurately discerning commander intent and executing linguistic commands within a visual context presents a significant *** paper introduces a sophisticated encoder-decoder fra... 详细信息
来源: 评论
Verifiable Secure Aggregation Protocol Under Federated Learning  1st
Verifiable Secure Aggregation Protocol Under Federated Learn...
收藏 引用
1st International Conference on Artificial Intelligence security and Privacy, AIS and P 2023
作者: Xu, Peiming Zheng, Meiling Xu, Lingling Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute CSG Guangzhou China School of Computer Science and Engineering South China University of Technology Guangzhou China
Federated learning is a new machine learning paradigm used for collaborative training models among multiple devices. In federated learning, multiple clients participate in model training locally and use decentralized ... 详细信息
来源: 评论