咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是161-170 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
An efficient data aggregation scheme with local differential privacy in smart grid
收藏 引用
Digital Communications and Networks 2022年 第3期8卷 333-342页
作者: Na Gai Kaiping Xue Bin Zhu Jiayu Yang Jianqing Liu Debiao He School of Cyber Science and Technology University of Science and Technology of ChinaHefeiAnhui230027China Department of Electronic Engineering and Information Science University of Science and Technology of ChinaHefeiAnhui230027China Department of Electrical and Computer Engineering University of Alabama in HuntsvilleHuntsvilleAL35899USA Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education School of Cyber Science and EngineeringWuhan UniversityWuhanBeihu430072China
By integrating the traditional power grid with information and communication technology, smart grid achieves dependable, efficient, and flexible grid data processing. The smart meters deployed on the user side of the ... 详细信息
来源: 评论
Non-Line-of-Sight Multipath Classification Method for BDS Using Convolutional Sparse Autoencoder with LSTM
收藏 引用
Tsinghua science and technology 2025年 第1期30卷 68-86页
作者: Yahang Qin Zhenni Li Shengli Xie Bo Li Ming Liu Victor Kuzin School of Automation Guangdong University of Technologyand also with Guangdong-Hong Kong-Macao Joint Laboratory for Smart Discrete ManufacturingGuangzhou 510006China School of Automation Guangdong University of TechnologyGuangdong Key Laboratory of IoT Information TechnologyGuangzhou 510006China 111 Center for Intelligent Batch Manufacturing Based on IoT Technology Key Laboratory of Intelligent Information Processing and System Integration of IoTMinistry of EducationGuangzhou 510006China Department of Electronic and Computer Engineering Hong Kong University of Science and TechnologHong Kong 999077China Academician of Russian Engineering Academy Moscow Moscow 125009Russia
Multipath signal recognition is crucial to the ability to provide high-precision absolute-position services by the BeiDou Navigation Satellite system(BDS).However,most existing approaches to this issue involve supervi... 详细信息
来源: 评论
Vision based intelligent traffic light management system using Faster R‐CNN
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 932-947页
作者: Syed Konain Abbas Muhammad Usman Ghani Khan Jia Zhu Raheem Sarwar Naif R.Aljohani Ibrahim A.Hameed Muhammad Umair Hassan Department of Computer Science and Engineering University of Engineering and TechnologyLahorePakistan Zhejiang Key Laboratory of Intelligent Education Technology and Application Zhejiang Normal UniversityJinhuaChina OTHEM Manchester Metropolitan UniversityManchesterUK Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia Department of ICT and Natural Sciences Norwegian University of Science and Technology(NTNU)ÅlesundNorway
Transportation systems primarily depend on vehicular flow on roads. Developed coun-tries have shifted towards automated signal control, which manages and updates signal synchronisation automatically. In contrast, traf... 详细信息
来源: 评论
Fair Incentive Allocation for Secure Data Sharing in Blockchain systems: A Shapley Value Based Mechanism  3rd
Fair Incentive Allocation for Secure Data Sharing in Block...
收藏 引用
3rd International Conference on Autonomous Unmanned systems, ICAUS 2023
作者: Yang, Ming Feng, Honglin Wang, Xin Jiao, Xuguo Wu, Xiaoming Qin, Shuwei Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Information and Control Engineering Qingdao University of Technology Qingdao China State Key Laboratory of Industrial Control Technology College of Control Science and Engineering Zhejiang University Hangzhou China Department of Public Security of Shandong Province Shandong Intelligent Public Security Joint Innovation Center Jinan China
In the contemporary era of information technology, the exponential surge in data has rendered colossal potential value, which would be fully unlocked through data circulation and sharing. However, when the data contai... 详细信息
来源: 评论
information security Evaluation by information Flow Analysis Based on Stochastic Petri Nets
Information Security Evaluation by Information Flow Analysis...
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: Tu, Hanqian Xiang, Dongming Lin, Wang Liu, Guanjun Zhejiang Sci-Tech University Department of Computer Science and Technology Hangzhou310018 China Shanghai Electronic Transactions and Information Service Collaborative Innovation Center Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science Shanghai201804 China
The Petri-net-based information flow analysis offers an effective approach for detecting information leakage by the concept of non-interference. Although the related studies propose efficient solutions, they lack quan... 详细信息
来源: 评论
Performance Analysis of Intelligent Reflecting Surface Assisted Wireless Communication system
收藏 引用
computer Modeling in Engineering & sciences 2023年 第10期137卷 775-787页
作者: Weiqiang Tan Quanquan Zhou Weijie Tan Longcheng Yang Chunguo Li School of Computer Science and Cyber Engineering Guangzhou UniversityGuangzhou510006China Key Laboratory of Advanced Manufacturing Technology Ministry of EducationGuizhou UniversityGuiyang550025China Sichuan Key Laboratory of Indoor Space Layout Optimization and Security Guarantee Chengdu Normal UniversityChengdu611130China School of Information Science and Engineering Southeast UniversityNanjing210096China
In this paper,we investigate the end-to-end performance of intelligent reflecting surface(IRS)-assisted wireless communication *** consider a system in which an IRS is deployed on a uniform planar array(UPA)configurat... 详细信息
来源: 评论
Intelligent Contract Timestamp Vulnerability Detection Based on key Control Flow Graph  36
Intelligent Contract Timestamp Vulnerability Detection Based...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Quan, Qing Yu Zeng, Cheng Wang, Yi Feng Wang, Jiao Ran School of Computer Science and Information Engineering Hubei University Wuhan China School of Artificial Intelligence Hubei University Wuhan China Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education Wuhan China
The extensive application of smart contract technology in the blockchain domain has positioned it as a key component of the digital economy. However, as the application scope of smart contracts expands, security issue... 详细信息
来源: 评论
Multi-View Incongruity Learning for Multimodal Sarcasm Detection  31
Multi-View Incongruity Learning for Multimodal Sarcasm Detec...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Guo, Diandian Cao, Cong Yuan, Fangfang Liu, Yanbing Zeng, Guangjie Yu, Xiaoyan Peng, Hao Yu, Philip S. Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science University of Illinois Chicago United States
Multimodal sarcasm detection (MSD) is essential for various downstream tasks. Existing MSD methods tend to rely on spurious correlations. These methods often mistakenly prioritize non-essential features yet still make... 详细信息
来源: 评论
First wetland mapping at 10-m spatial resolution in South America using multi-source and multi-feature remote sensing data
收藏 引用
science China Earth sciences 2024年 第10期67卷 3252-3269页
作者: Weiwei SUN Gang YANG Yuling HUANG Dehua MAO Ke HUANG Lin ZHU Xiangchao MENG Tian FENG Chao CHEN Yong GE Department of Geography and Spatial Information Techniques Ningbo UniversityNingbo 315211China State Key Laboratory of Resources and Environmental Information System Institute of Geographic Sciences&Natural Resources ResearchChinese Academy of SciencesBeijing 100101China Natural Resources and Planning Bureau Shanghai Pudong New DistrictShanghai 200100China Key Laboratory of Wetland Ecology and Environment Northeast Institute of Geography and AgroecologyChinese Academy of SciencesChangchun 130102China Faculty of Electrical Engineering and Computer Science Ningbo UniversityNingbo 315211China School of Geography Science and Geomatics Engineering Suzhou University of Science and TechnologySuzhou 215009China
Wetland degradation has been accelerating in recent years globally. Accurate information on the geographic distribution and categories of wetlands is essential for their conservation and management. Despite being the ... 详细信息
来源: 评论