咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是231-240 订阅
排序:
Semi-Supervised Gland Segmentation via Feature-Enhanced Contrastive Learning and Dual-Consistency Strategy
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 第6期29卷 4314-4324页
作者: Yu, Jiejiang Li, Bingbing Pan, Xipeng Shi, Zhenwei Wang, Huadeng Lan, Rushi Luo, Xiaonan Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China Ganzhou Municipal Hospital Department of Pathology Ganzhou341000 China Southern Medical University Department of Radiology Guangdong Provincial People's Hospital Guangdong Academy of Medical Sciences Guangzhou510080 China Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application Guangzhou510080 China
In the field of gland segmentation in histopathology, deep-learning methods have made significant progress. However, most existing methods not only require a large amount of high-quality annotated data but also tend t... 详细信息
来源: 评论
VHASR: A Multimodal Speech Recognition system With Vision Hotwords
VHASR: A Multimodal Speech Recognition System With Vision Ho...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Hu, Jiliang Li, Zuchao Wang, Ping Ai, Haojun Zhang, Lefei Zhao, Hai Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China School of Computer Science Wuhan University Wuhan China School of Information Management Wuhan University Wuhan China Department of Computer Science and Engineering Shanghai Jiao Tong University China
The image-based multimodal automatic speech recognition (ASR) model enhances speech recognition performance by incorporating audio-related image. However, some works suggest that introducing image information to model... 详细信息
来源: 评论
Multi-Scale Feature Extraction with Supervised Contrastive Learning for Vulnerability Detection  36
Multi-Scale Feature Extraction with Supervised Contrastive L...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Zhao, Yahui Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Pengcheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
The capacity of Deep Learning to automatically learn features from source code has facilitated its extensive utilization in detecting software vulnerabilities. However, existing pre-trained models regard code snippets... 详细信息
来源: 评论
A Short-Term Electric Load Forecasting Method Based on the Fusion of Global and Local Features  9
A Short-Term Electric Load Forecasting Method Based on the F...
收藏 引用
9th IEEE International Conference on Data science in Cyberspace, DSC 2024
作者: Gu, Haozhan Tian, Hangwei Wang, Jingchun Li, Yumei Shandong University Of Arts Academy of Fine Arts China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Accurate short-term electric load forecasting is crucial for ensuring the stability and efficiency of the power grid. This study proposes an innovative dual-branch electric load forecasting model that enhances the acc... 详细信息
来源: 评论
Vulnerability Detection Based on Pre-trained Code Language Model and Convolutional Neural Network  36
Vulnerability Detection Based on Pre-trained Code Language M...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Liao, Tingfeng Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Pengcheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
Software vulnerabilities damage the reliability of software systems. Recently, many methods based on deep learning have been proposed for vulnerability detection by learning features from code sequences or various pro... 详细信息
来源: 评论
A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor
收藏 引用
Journal of computer science & technology 2021年 第5期36卷 1022-1036页
作者: Lu-Tan Zhao Rui Hou Kai Wang Yu-Lan Su Pei-Nan Li Dan Meng State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Beijing 100093China School of Cyber Security University of Chinese Academy of SciencesBeijing 100093China Department of Computer Science and Technology Harbin Institute of TechnologyHarbin 150001China
In a modern processor,branch prediction is crucial in effectively exploiting the instruction-level parallelism for high-performance ***,recently exposed vulnerabilities reveal the urgency to improve the security of br... 详细信息
来源: 评论
Fake News Detection Across Multiple Domains Using Fuzzy Association Rules  24th
Fake News Detection Across Multiple Domains Using Fuzzy Asso...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Xiaofeng Zhang, Weisha Huang, Yuanyuan Lu, Hongyu Lu, Jiazhong School of Cybersecurity Xin Gu Industrial College Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China SUGON Industrial Control and Security Center Chengdu610225 China School of Foreign Languages University of Electronic Science and Technology of China Chengdu611731 China
The detection of fake news is not confined to a single domain, and due to domain transfer, the reliance on detection methods specific to a single domain becomes inadequate when dealing with multi-domain issues. When a... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
Rolling Horizon Co-evolution for Snake AI Competition  13th
Rolling Horizon Co-evolution for Snake AI Competition
收藏 引用
13th IFIP TC 12 International Conference on Intelligent information Processing, IIP 2024
作者: Li, Hui Zhou, Jiayi Zhang, Qingquan Research Institute of Trustworthy Autonomous System Southern University of Science and Technology Shenzhen518055 China Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent Computation Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China
The Snake game, a classic in the gaming world, gains new dimensions with the Snake AI competition, where two players controlled by AI algorithms can now compete simultaneously in the same game session. This competitio... 详细信息
来源: 评论