咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是181-190 订阅
排序:
Multi-Classification Segmentation Method of Gastric Cancer Pathological Images Based on Deep Learning
Multi-Classification Segmentation Method of Gastric Cancer P...
收藏 引用
2024 lEEE International Conference on Advanced information, Mechanical Engineering, Robotics and Automation, AIMERA 2024
作者: Zhou, Hehu Pan, Jingshan Na, Li Ding, Qingyan Zhou, Chengjun Du, Wantong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China The Second Hospital of Shandong University Department of Pathology Jinan China
Gastric cancer is a serious health threat, and pathological imaging is important in detecting it. These images can assist doctors in accurately determining the location of the cancer, thereby providing an important re... 详细信息
来源: 评论
IoT-Assisted Blockchain-Based Car Rental system Supporting Traceability  28th
IoT-Assisted Blockchain-Based Car Rental System Supporting T...
收藏 引用
28th International Conference on Database systems for Advanced Applications, DASFAA 2023
作者: Chen, Lipan Wang, Yujue Ding, Yong Liang, Hai Yang, Changsong Wang, Huiyong Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Hangzhou Innovation Institute Beihang University Hangzhou China Cyberspace Security Research Center Pengcheng Laboratory Shenzhen China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China
The majority of existing car rental systems rely on a centralized database to manage the data. Although these centralized architectures could make the system design and operation costs are reduced, there are many secu... 详细信息
来源: 评论
From laboratory to Field:Unsupervised Domain Adaptation for Plant Disease Recognition in the Wild
收藏 引用
Plant Phenomics 2023年 第2期5卷 195-208页
作者: Xinlu Wu Xijian Fan Peng Luo Sruti Das Choudhury Tardi Tjahjadi Chunhua Hu College of Information Science and Technology Nanjing Forestry UniversityNanjing 210037China Institute of Forest Resource Information Techniques Chinese Academy of ForestryBeijing 100091China Key Laboratory of Forestry Remote Sensing and Information System National Forestry and Grassland AdministrationBeijing 100091China Department of Computer Science and Engineering University of Nebraska-LincolnLincolnNE 68588USA School of Engineering University of WarwickCoventry CV47ALUK
Plant disease recognition is of vital importance to monitor plant development and predicting crop ***,due to data degradation caused by different conditions of image acquisition,e.g.,laboratory *** environment,machine... 详细信息
来源: 评论
Meta-Heuristic Based Multipath Joint Routing and Scheduling of Time-Triggered Traffic for Time-Sensitive Networking in IIoT  2
Meta-Heuristic Based Multipath Joint Routing and Scheduling ...
收藏 引用
2nd International Conference on Green Communication, Network, and Internet of Things, CNIoT 2022
作者: Chen, Chen Li, Zhong The College of Information Science and Technology Donghua University Shanghai201620 China The Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science Tongji University Shanghai201804 China
Time-Sensitive networking (TSN) meets the needs of industrial internet of things (IIoT). It solves the challenges of deterministic transmission and reliable communication of time sensitive data streams. Traffic schedu... 详细信息
来源: 评论
Video key concept extraction using Convolution Neural Network  3
Video key concept extraction using Convolution Neural Networ...
收藏 引用
3rd IEEE International Conference on AI in Cybersecurity, ICAIC 2024
作者: Sardar, Tanvir H Amin Hazarika, Ruhul Pandey, Bishwajeet Guru Prasad, M.S. Mahmudul Hassan, Sk Dodmane, Radhakrishna Gohel, Hardik Dept. of Computer Science & Engg Bengaluru India Manipal Institute of Technology Department of Information Technology Bengaluru India Astana It University Department of Intelligent System and Cyber Security Kazakhstan Dept. of Computer Science & Engg. Dehradun India VIT-AP School of Computer Science and Engineering India Nmam Institute of Technology Department of Computer Science & Engg. Nitte India University of Houston Department of Cse Victoria United States
Objectives: This work aims to develop an automated video summarising methodology and timestamping that uses natural language processing (NLP) tools to extract significant video ***: The methodology comprises extractin... 详细信息
来源: 评论
BMSAD: Behavior Feature and Multi-Scenario -Based Sybil Attack Detection Method in Vehicular Networks  3
BMSAD: Behavior Feature and Multi-Scenario -Based Sybil Atta...
收藏 引用
3rd International Seminar on Artificial Intelligence, Networking, and information technology, AINIT 2022
作者: Luo, Jie Li, Zhong College of Information Science and Technology Donghua University Shanghai201620 China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science Tongji University Shanghai201804 China
Vehicular networks improve traffic safety and efficiency by wireless communications among vehicles and infrastructures. However, security has always been a challenge to vehicular networks, which may cause severe harm ... 详细信息
来源: 评论
Privacy-Preserving Electricity Theft Detection Based on Blockchain
收藏 引用
IEEE Transactions on Smart Grid 2023年 第5期14卷 4047-4059页
作者: Zhao, Zhiqiang Liu, Yining Zeng, Zhixin Chen, Zhixiong Zhou, Huiyu Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China Fujian Key Laboratory of Financial Information Processing The Key Laboratory of Applied Mathematics of Fujian Province University Putian University Putian351100 China University of Leicester School of Computing and Mathematical Sciences LeicesterLE1 7RH United Kingdom
In most electricity theft detection schemes, consumers' power consumption data is directly input into the detection center. Although it is valid in detecting the theft of consumers, the privacy of all consumers is... 详细信息
来源: 评论
PpNNT: Multiparty Privacy-Preserving Neural Network Training system
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第1期5卷 370-383页
作者: Feng, Qi He, Debiao Shen, Jian Luo, Min Choo, Kim-Kwang Raymond Wuhan University School of Cyber Science and Engineering Wuhan430072 China Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China School of Information Science and Technology Zhejiang Sci-Tech University Hangzhou310018 China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai201204 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
By leveraging smart devices [e.g., industrial Internet of Things (IIoT)] and real-time data analytics, organizations, such as production plants can benefit from increased productivity, reduced costs, enhanced self-mon... 详细信息
来源: 评论
Resource Allocation for MEC in Ultra-dense Networks
收藏 引用
Journal of computers (Taiwan) 2025年 第1期36卷 143-162页
作者: Ma, Huan Li, Shuyun Wang, Zhihui Dou, Xubing Zhang, Xinchang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Normal University Jinan China
In the complex context of 5G ultra-dense networks, the unprecedented growth in traffic and computing demand has made the interaction between edge devices and edge servers extremely intricate due to the time-varying na... 详细信息
来源: 评论
Simulating Bluetooth virus propagation on the real map via infectious attenuation algorithm and discrete dynamical system
收藏 引用
Iran Journal of computer science 2024年 第4期7卷 755-776页
作者: Zhu, Qingyi Wan, Wentao Gan, Chengquan Fan, Ziqi Yang, Lu-Xing School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing 400065 China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing 400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing 400065 China School of Information Technology Deakin University Melbourne 3125 VIC Australia
In recent years, mobile smart devices have gained popularity globally due to their convenience and efficiency. However, this popularity has also attracted the attention of virus creators, resulting in a significant co... 详细信息
来源: 评论