咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是271-280 订阅
排序:
Interference Coordination technology of Ultra Dense Deployment Based on Clustering Algorithm  5
Interference Coordination Technology of Ultra Dense Deployme...
收藏 引用
5th IEEE International Conference on Power, Intelligent Computing and systems, ICPICS 2023
作者: Wang, Haoyuan Tian, Yue Li, Wenda Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen China University College London Department of Security and Crime Science London United Kingdom
A clustering algorithm based Ultra Dense Deployment is proposed to address the problem of establishing a reasonable interference model and allocating ABS reasonably to minimize interference and maximize throughput in ... 详细信息
来源: 评论
A Mixed Intrusion Detection system utilizing K-means and Extreme Gradient Boosting  2
A Mixed Intrusion Detection System utilizing K-means and Ext...
收藏 引用
2022 2nd International Conference on Communication technology and information technology, ICCTIT 2022
作者: Lv, Haifeng Ji, Xiaoyu Ding, Yong Guangxi Key Laboratory of Machine Vision and Intelligent Control WuZhou University Wuzhou China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Colleges and Universities Key Laboratory of Industry Software Technology Wuzhou University Wuzhou China
The intrusion detection system (IDS) plays an important part because it offers an efficient way to prevent and mitigate cyber attacks. Numerous deep learning methods for intrusion anomaly detection have been developed... 详细信息
来源: 评论
OpenDrift: Online Evolving Fraud Detection for Open-Category and Concept-Drift Transactions
OpenDrift: Online Evolving Fraud Detection for Open-Category...
收藏 引用
2023 IEEE International Conference on Web Services, ICWS 2023
作者: Wang, Cheng Chai, Songyao Zhu, Hangyu Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education China Shanghai Artificial Intelligence Laboratory Shanghai China
The rapid growth of electronic commerce brings convenience to modern life but comes with security risks by various cybercrimes in online payment services. Most existing security methods for fraud detection depend on t... 详细信息
来源: 评论
Adaptive Uniform Performance Control of Strict-Feedback Nonlinear systems With Time-Varying Control Gain
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 451-461页
作者: Kai Zhao Changyun Wen Yongduan Song Frank L.Lewis IEEE the Department of Electrical and Computer Engineering National University of SingaporeSingapore 119077Singapore the School of Electrical and Electronic Engineering Nanyang Technological UniversitySingapore 639798Singapore the State Key Laboratory of Power Transmission Equipment&System Security and New Technology Chongqing Key Laboratory of Intelligent Unmanned SystemsSchool of AutomationChongqing UniversityChongqing 400044China the UTA Research Institute University of Texas at ArlingtonFort WorthTX 76118 USA
In this paper,we present a novel adaptive performance control approach for strict-feedback nonparametric systems with unknown time-varying control coefficients,which mainly includes the following ***,by introducing se... 详细信息
来源: 评论
A Blackbox Fuzzing Based on Automated State Machine Extraction
A Blackbox Fuzzing Based on Automated State Machine Extracti...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Zhaowei Zhang Wenjing Yu Zibin Wang Youlin Xiang National Key Laboratory of Science and Technology on Information System Security Beijing China Shanghai Key Laboratory of Data Science School of Computer Science Fudan University Shanghai China
Currently, protocol fuzzing techniques mainly employ two approaches: greybox fuzzing based on mutation and blackbox fuzzing based on generation. Greybox fuzzing techniques use message exchanges between the protocol se...
来源: 评论
Time Slot Correlation-Based Caching Strategy for information-Centric Satellite Networks  1
收藏 引用
11th EAI International Conference on MOBILe Wireless MiddleWARE, Operating systems and Applications, MOBILWARE 2022
作者: Xu, Rui Di, Xiaoqiang Chen, Jing Cao, Jinhui Luo, Hao Wang, Haowei Qi, Hui He, Xiongwen Lei, Wenping School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China School of Information Engineering Henan Institute of Science and Technology Xinxiang453003 China Jilin Province Key Laboratory of Network and Information Security Changchun University of Science and Technology Changchun130022 China Information Center Changchun University of Science and Technology 130022 Changchun China Beijing Institute of Spacecraft System Engineering Beijing100094 China Beijing Institute of Space Mechanic and Electricity Beijing100094 China
With the successful manufacture of highly stable and high-performance satellite processors, caching on satellites has become possible. information Centric Networking (ICN) is introduced to satellite networks to addres... 详细信息
来源: 评论
CPSNet: Comprehensive Enhancement Representation for Polyp Segmentation Task
CPSNet: Comprehensive Enhancement Representation for Polyp S...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Cai, Jiati Liu, Xiaogang Yang, Hongjie Ding, Yi Zhong, Ting Qin, Zhen Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China Department of Gastroenterology and Hepatology University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Accurately segmenting polyp regions in colonoscopy images is crucial for the diagnosis and intervention of colorectal cancer. However, the task of polyp segmentation remains challenging due to the diverse size and sha... 详细信息
来源: 评论
Design of power supply system for portable aviation inspection equipment  3
Design of power supply system for portable aviation inspecti...
收藏 引用
2023 3rd International Conference on Measurement Control and Instrumentation, MCAI 2023
作者: Yang, Yang Ai, Hao Li, Shibo Xiao, Guokai Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Standard Institute of Emerging Technologies and Innovations Co. Ltd. Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Given that airborne electronic equipment may have a variety of wiring methods and may encounter a set of systems using multiple power supplies, it is necessary to take some measures on the circuit to ensure the normal... 详细信息
来源: 评论
A-FAR: Research on Anti-obscuring Face Recognition Based on Improved FaceNet Model  11
A-FAR: Research on Anti-obscuring Face Recognition Based on ...
收藏 引用
11th International Conference on Advanced Cloud and Big Data, CBD 2023
作者: Zhu, Biaokai Zhang, Yangyang Li, Lu He, Yuhong Song, Yiting Li, Xiafei Yin, Ruiting Song, Jie Li, Ping Liu, Sanman Zhao, Jumin Taiyuan University of Technology Shanxi Police College Cyber Security Department Taiyuan China Shanxi Police College Cyber Security Department Taiyuan China Sichuan Police College Intelligent Policing Key Laboratory of Sichuan Province Luzhou China Anhui University School of Computer Science and Technology Hefei China Taiyuan University of Technology College of Information and Computer Jinzhong China
Face recognition and cloud computing are the current hot research areas, in real life, face image acquisition is often affected by various factors, such as occlusion, lighting and facial posture, many application scen... 详细信息
来源: 评论
Cloud Based AIVR Training system for Emergency Rescue  12
Cloud Based AIVR Training System for Emergency Rescue
收藏 引用
12th International Conference on Advanced Cloud and Big Data, CBD 2024
作者: Dong, Meiya Zhu, Biaokai Zhao, Jumin Song, Jie School of Computer Science Peking University Beijing China Suzhou Industrial Technology Institute Zhejiang University Suzhou China Cyber Security Shanxi Police College China College of Information and Optical Engineering Taiyuan University of Technology Taiyuan China Cyber security Intelligent Policing Key Laboratory of Sichuan Province Luzhou China
This paper mainly discusses the current situation and existing problems of training exercises in emergency medicial scenarios, as well as the importance and necessity of developing an AI training system for emergency ... 详细信息
来源: 评论