咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是191-200 订阅
排序:
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature  1
收藏 引用
18th EAI International Conference on security and Privacy in Communication Networks, SecureComm 2022
作者: Ma, Ziqiang Li, Shuaigang Lin, Jingqiang Cai, Quanwei Fan, Shuqin Zhang, Fan Luo, Bo School of Information Engineering Ningxia University Yinchuan China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Science and Technology of China Hefei China State Key Laboratory of Cryptology Beijing China School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Hangzhou310027 China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou310027 China Department of Electrical Engineering and Computer Science University of Kansas Lawrence United States
In the resource-constrained environment such as the Internet of Things, the windowed Non-Adjacent-Form (wNAF) representation is usually used to improve the calculation speed of the scalar multiplication of ECDSA. This... 详细信息
来源: 评论
Dual Branch PnP Based Network for Monocular 6D Pose Estimation
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3243-3256页
作者: Jia-Yu Liang Hong-Bo Zhang Qing Lei Ji-Xiang Du Tian-Liang Lin Department of Computer Science and Technology Huaqiao UniversityXiamen361000China Xiamen Key Laboratory of Computer Vision and Pattern Recognition Huaqiao UniversityXiamen361000China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao UniversityXiamen361000China College of Mechanical Engineering and Automation Xiamen361000China
Monocular 6D pose estimation is a functional task in the field of com-puter vision and *** recent years,2D-3D correspondence-based methods have achieved improved performance in multiview and depth data-based ***,for m... 详细信息
来源: 评论
A timestamp-based covert data transmission method in Industrial Control system  7
A timestamp-based covert data transmission method in Industr...
收藏 引用
7th IEEE International Conference on Data science in Cyberspace, DSC 2022
作者: Lu, Jie Ding, Yong Li, Zhenyu Wang, Chunhui Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin China Cyberspace Security Research Center Pengcheng Laboratory Shenzhen China
Covert channels are data transmission methods that bypass the detection of security mechanisms and pose a serious threat to critical infrastructure. Meanwhile, it is also an effective way to ensure the secure transmis... 详细信息
来源: 评论
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detection
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detect...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wang, Guangjin Wang, Bao Xu, Fuyong Zhu, Zhenfang Wang, Peipei Wang, Ru Liu, Peiyu School of Information Science and Engineering Shandong Normal University Jinan China School of Information Science and Electrical Engineering Shandong Jiao Tong University Jinan China Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Multimodal sarcasm detection aims to identify whether utterances express sarcastic intentions contrary to their literal meaning based on multimodal information. However, existing methods fail to explore the model'... 详细信息
来源: 评论
Domain-Invariant Similarity Activation Map Contrastive Learning for Retrieval-Based Long-Term Visual Localization
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第2期9卷 313-328页
作者: Hanjiang Hu Hesheng Wang Zhe Liu Weidong Chen Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China IEEE Department of Automation Institute of Medical RoboticsKey Laboratory of System Control and Information Processing of Ministry of EducationKey Laboratory of Marine Intelligent Equipment and System of Ministry of EducationShanghai Jiao Tong UniversityShanghai 200240China Department of Computer Science and Technology University of CambridgeCambridge CB30FDUnited Kingdom
Visual localization is a crucial component in the application of mobile robot and autonomous *** retrieval is an efficient and effective technique in image-based localization *** to the drastic variability of environm... 详细信息
来源: 评论
Challenges and future directions of secure federated learning:a survey
收藏 引用
Frontiers of computer science 2022年 第5期16卷 173-180页
作者: Kaiyue ZHANG Xuan SONG Chenhan ZHANG Shui YU Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Faculty of Engineering and Information Technology University of Technology SydneySydney 2007Australia SUSTech-UTokyo Joint Research Center on Super Smart City Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China
Federated learning came into being with the increasing concern of privacy security,as people’s sensitive information is being exposed under the era of big *** is an algorithm that does not collect users’raw data,but... 详细信息
来源: 评论
Smart Contract Vulnerability Detection Based on Mixed Channel Attention  36
Smart Contract Vulnerability Detection Based on Mixed Channe...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Wang, Jiao Ran Zeng, Cheng Ba, Kai Yang Quan, Qing Yu Wang, Yi Feng School of Computer Science and Information Engineering Hubei University Wuhan China School of Artificial Intelligence Hubei University Wuhan China School of Cyberspace Security Hubei University Wuhan China Key Laboratory of Intelligence Sensing System and Security Hubei University Ministry of Education Wuhan China
As blockchain technology progresses, the deployment of smart contracts has become increasingly prevalent. Despite their growing popularity, smart contracts introduce substantial security risks and vulnerabilities. Pre... 详细信息
来源: 评论
Formal Model of ATM Based on Object Constraint Language (OCL)  10
Formal Model of ATM Based on Object Constraint Language (OCL...
收藏 引用
10th International Conference on Engineering and Emerging Technologies, ICEET 2024
作者: Ahmed, Irfan Naseer, Sadia Umm - E - Habiba Mahmood, Jabar Chaudhry, Shehzad Ashraf Batool, Khadija University of Sialkot Department of Computer Science Sialkot Pakistan School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University State Key Laboratory of Blockchain Hangzhou China College of Engineering Abu Dhabi University Department of Computer Science and Information Technology Abu Dhabi United Arab Emirates Gujranwala Pakistan
Formal methods (FM) are innovative methods which employ mathematical notations to specify explicit and precise requirements. This paper presents a formal model of an automated teller machine (ATM) using Object Constra... 详细信息
来源: 评论
Data-Driven Active Power Dispatch for Wind Farms  13
Data-Driven Active Power Dispatch for Wind Farms
收藏 引用
13th IEEE Data Driven Control and Learning systems Conference, DDCLS 2024
作者: Jiao, Xuguo Zhang, Daoyuan Wang, Xin Ma, Zhaoxing Zhang, Zhenyong Liu, Wenfeng School of Information and Control Engineering Qingdao University of Technology Qingdao266520 China College of Control Science and Engineering Zhejiang University State Key Laboratory of Industrial Control Technology Hangzhou310027 China Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China School of Civil Engineering Qingdao University of Technology Qingdao266520 China
Active power dispatch of wind farms plays an important role in power grid scheduling. In this paper, a data-driven active power dispatch strategy for wind farms is proposed, which uses the key point of minimizing the ... 详细信息
来源: 评论
Interference Suppression and Jitter Elimination Ability-Based Adaption Tracking Guidance for Robotic Fishes
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 126-137页
作者: Dongfang Li Jie Huang Rob Law Xin Xu Limin Zhu Edmond Q.Wu IEEE the School of Electrical Engineering and Automation Fuzhou University the Key Laboratory of System Control and Information Processing Ministry of Education the School of Electrical Engineering and Automation Fuzhou University 5G+Industrial Internet Institute Fuzhou University the University of Macau the College of Mechatronics and Automation National University of Defense Technology the School of Mechanical Engineering Shanghai Jiao Tong University the Department of Computer Science and Engineering Shanghai Jiao Tong University
This work presents an adaptive tracking guidance method for robotic fishes. The scheme enables robots to suppress external interference and eliminate motion jitter. An adaptive integral surge line-of-sight guidance ru... 详细信息
来源: 评论