咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是261-270 订阅
排序:
The Immense Impact of Reverse Edges on Large Hierarchical Networks
收藏 引用
Engineering 2024年 第5期36卷 240-249页
作者: Haosen Cao Bin-Bin Hu Xiaoyu Mo Duxin Chen Jianxi Gao Ye Yuan Guanrong Chen Tamás Vicsek Xiaohong Guan Hai-Tao Zhang MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Intelligent Manufacturing Equipment and TechnologySchool of Artificial Intelligence and AutomationHuazhong University of Science and TechnologyWuhan 430074China School of Mechanical and Aerospace Engineering Nanyang Technological UniversitySingapore 639798Singapore Jiangsu Key Laboratory of Networked Collective Intelligence School of MathematicsSoutheast UniversityNanjing 210096China Department of Computer Science Rensselaer Polytechnic InstituteTroyNY 12180USA Department of Electronic Engineering City University of Hong KongHong Kong 999077China Department of Biological Physics Eötvös UniversityBudapest 1117Hungary MOE Key Laboratory for Intelligent Networks and Network Security School of Automation Science and EngineeringXi’an Jiaotong UniversityXi’an 710049China
Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so *** structure o... 详细信息
来源: 评论
Efficient survivable mapping algorithm for logical topology in IP-over-WDM optical networks against node failure
收藏 引用
Journal of Supercomputing 2023年 第5期79卷 5037-5063页
作者: Cheng, Dun-Wei Chang, Jo-Yi Lin, Chen-Yen Lin, Limei Huang, Yanze Thulasiraman, Krishnaiyan Hsieh, Sun-Yuan Department of Computer Science and Information Engineering National Yunlin University of Science and Technology 123 University Road Yunlin64002 Taiwan Department of Computer Science and Information Engineering National Cheng Kung University No. 1 University Road Tainan701 Taiwan College of Mathematics and Informatics and the Key Laboratory of Network Security and Cryptology Fujian Normal University Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Mathematics and Physics Fujian University of Technology Fujian Fuzhou350118 China Department of Computer Science University of Oklahoma 660 Parrington Oval NormanOK73019 United States Department of Computer Science and Information Engineering National Chi Nan University No. 1 Daxue Rd Nantou County Puli Township54561 Taiwan
The survivable mapping problem in an IP-over-WDM network with a logical graph and physical graph is the problem of finding a mapping of a logical network in a physical layer so that any failure in physical topology do... 详细信息
来源: 评论
Static Analysis of Source Code Vulnerability Using Machine Learning Techniques: A Survey  4
Static Analysis of Source Code Vulnerability Using Machine L...
收藏 引用
4th International Conference on Artificial Intelligence and Big Data, ICAIBD 2021
作者: Wang, Jingjing Huang, Minhuan Nie, Yuanping Li, Jin National Key Laboratory of Science and Technology on Information System Security Beijing China
With the rapid increase of practical problem complexity and code scale, the threat of software security is increasingly serious. Consequently, it is crucial to pay attention to the analysis of software source code vul... 详细信息
来源: 评论
Research on Image Captioning Based on Vision-language Pre-trained Models  9
Research on Image Captioning Based on Vision-language Pre-tr...
收藏 引用
9th International Conference on Big Data and information Analytics, BigDIA 2023
作者: Zou, Shiwei Xie, Yuxiang Yan, Jie Wei, Yingmei Luan, Xidao National University of Defense Technology Department of System Engineering Hunan China National University of Defense Technology Key Laboratory of Big Data Department of System Engineering Changsha Hunan China Changsha University Department of Computer Science Hunan China
Image captioning is a vision-language task that targets at describing an image by generating a coherent sentence automatically. This technology allows computers to understand and describe images like humans, enabling ... 详细信息
来源: 评论
Joint Optimization of Transmission and Computation for Multi-source MEC system Based on Deep Reinforcement Learning  20th
Joint Optimization of Transmission and Computation for Mu...
收藏 引用
20th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2024
作者: Zhang, Qi Zhu, Jianhang Gong, Jie School of Computer Science and Engineering Sun Yat-sen University Guangzhou51006 China School of Science and Engineering The Chinese University of Hong Kong Shenzhen Shenzhen518172 China Guangdong Key Laboratory of Information Security and Technology Sun Yat-sen University Guangzhou51006 China
Due to the limitation of computing resources in end nodes, computation tasks in Internet of Things (IoT) can be offloaded to mobile edge servers. To measure the effectiveness and timeliness of data, Age of information... 详细信息
来源: 评论
Differential privacy protection method for trip-oriented shared data
Differential privacy protection method for trip-oriented sha...
收藏 引用
作者: Du, Danlei Luo, Entao Yi, Yang Peng, Tao Li, Xubin Zhang, Shaobo Jiang, Xu Wang, Tian School of Information Engineering Hunan University of Science and Engineering YongZhou China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Department of Computer Science Northeastern Illinois University ChicagoIL United States School of Computer Science and Engineering Guangzhou University Guangzhou China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China School of Computer Science and Engineering Nanjing University of Science and Technology NanJing China Zhuhai China Zhuhai China
While location information sharing technology provides convenience for unmanned driving and journey navigation, user journey information sharing has also become a disaster for privacy information leakage. The traditio... 详细信息
来源: 评论
Intelligent Food Identification system Using Improved YOLOv8  13
Intelligent Food Identification System Using Improved YOLOv8
收藏 引用
13th International Symposium on computer science and Educational technology, ISCSET 2024
作者: Nitiavintokana, Francia Rouf, Md Abdur Yu, Xiaoyu Wu, Haibin Wang, Aili Iwahori, Yuji Harbin University of Science and Technology Heilongjiang Province Key Laboratory of Laser Spectroscopy Technology and Application Harbin China College of Electron and Information University of Electronic Science and Technology of China Zhongshan Institute Zhongshan China Chubu University Department of Computer Science Aichi Japan
The field of computer vision has witnessed significant advances in object detection with real-world applications ranging from autonomous driving to surveillance systems. Due to its importance in a number of areas, suc... 详细信息
来源: 评论
Tuning the number of chiral edge channels in a fixed quantum anomalous Hall system
收藏 引用
Physical Review B 2024年 第20期109卷 L201402-L201402页
作者: Peng Deng Yulei Han Peng Zhang Su Kong Chong Zhenhua Qiao Kang L. Wang Beijing Academy of Quantum Information Sciences Beijing 100193 China Department of Electrical and Computer Engineering University of California Los Angeles California 90095 USA Department of Physics Fuzhou University Fuzhou Fujian 350108 China International Center for Quantum Design of Functional Materials CAS Key Laboratory of Strongly-Coupled Quantum Matter Physics and Department of Physics University of Science and Technology of China Anhui 230026 China Hefei National Laboratory University of Science and Technology of China Hefei 230088 China
Quantum anomalous Hall (QAH) insulators exhibit chiral edge channels characterized by vanishing longitudinal conductance and quantized Hall conductance of Ce2/h, wherein the Chern number C is an integer equal to the n... 详细信息
来源: 评论
Efficient Module-Lattice-based Certificateless Online/Offline Signcryption Scheme for Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Bai, Ye He, Debiao Yang, Zhichao Luo, Min Peng, Cong Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Naval University of Engineering Department of Information Security Wuhan430000 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
The Internet of Medical Things (IoMT) has achieved remote diagnosis and real-time health monitoring through intelligent sensor devices and Internet of Things (IoT) technology, providing great convenience for analyzing... 详细信息
来源: 评论
Contrastive Learning-Based Generic Audio-to-Lyrics Alignment  21
Contrastive Learning-Based Generic Audio-to-Lyrics Alignment
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Jin, Zhenkun Huang, Shuai Nie, Xin Zhou, Xinlei Yi, Yuanyuan Zhou, Gefei Wuhan Business UIniversity Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on BigData Security Wuhan China Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China
In this research, we tackled the complex task of aligning audio and lyrics content automatically. This task entails the precise matching of lyrics with the corresponding audio segments in songs, necessitating the coor... 详细信息
来源: 评论