咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是281-290 订阅
排序:
Approximate state estimation with large-scale sensor networks under event-based sensor scheduling strategy  63
Approximate state estimation with large-scale sensor network...
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Liu, Xinhui Cheng, Meiqi Shi, Dawei Shi, Ling Beijing Institute of Technology Miit Key Laboratory of Servo Motion System Drive and Control School of Automation Beijing100081 China Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Kowloon Hong Kong
In this paper, we investigate the issues of real-time sensor scheduling and state estimator design within large-scale sensor network systems. Specifically, data redundancy sometimes occurs in large-scale sensor arrays... 详细信息
来源: 评论
Previs-Real:Interactive virtual previsualization system for news shooting rehearsal and evaluation
收藏 引用
虚拟现实与智能硬件(中英文) 2024年 第6期6卷 527-549页
作者: Che QU Shaocong WANG Chao ZHOU Tongchen ZHAO Rui GUO Cheng Wa WONG Chi DENG Bin JI Yuhui WEN Yuanchun SHI Yong-Jin LIU Department of Film and Television Technology Beijing Film AcademyBeijing 100088China Department of Computer Science and Technology MOE-Key Laboratory of Pervasive ComputingTsinghua UniversityBeijing 100084China School of Social Sciences Tsinghua UniversityBeijing 100084China News Production and Broadcasting First Division China Media GroupBeijing 100038China School of Computer and Information Technology Bejing Jiaotong UniversityBejing 100044China Beijing Key Laboratory of Traffic Data Analysis and Mining Beijing Jiaotong UniversityBeijing 100044China
Background In the demanding field of live news broadcasting,the intricate studio production procedures and tight schedules pose significant challenges for physical rehearsals by *** paper explores the design and imple... 详细信息
来源: 评论
Parallel Optimization of Computational Fluid Dynamics Application code_saturne Based on Next Generation Sunway Supercomputer  14
Parallel Optimization of Computational Fluid Dynamics Applic...
收藏 引用
14th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2023
作者: Liu, Anjun Liao, Yin Xu, Xihao Chen, YanYan Zhong, Hongjun Wu, Jianming Kong, Bo Raikov, Alexander Guo, Meng Jinan Institute of Supercomputing Technology Jinan Key Laboratory of High Performance Industrial Software Jinan China Zhejiang Yuansuan Technology Co. Ltd Jinan Supercomputing-Zhejiang Yuansuan Industrial Simulation System Joint Laboratory Hangzhou China Qilu University of Technology Shandong Academy of Sciences Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security China Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Shandong Jinan China
code_saturne is an open-source general large-scale computational fluid dynamics software independently developed by Electricite de France since 1997. Due to its high computing performance, code_saturne has been widely... 详细信息
来源: 评论
DEPA: Determining Exploit Primitives Automatically for Interactive Programs  6
DEPA: Determining Exploit Primitives Automatically for Inter...
收藏 引用
6th International Conference on Electronic information technology and computer Engineering, EITCE 2022
作者: Liu, Jie An, Hang Li, Jin Liang, Hongliang School of Computer Science Beijing University of Posts and Telecommunications Beijing China Codesafe Team of Legendsec Qi'anxin Group Beijing China Nation Key Laboratory of Science and Technology on Information System Security Beijing China
Automated Exploit Generation (AEG) is a well-known difficult task, especially for heap vulnerabilities. The premise of this task is the determination of exploit primitives, and prior research efforts for exploit primi... 详细信息
来源: 评论
Traffic Pattern Sharing for Federated Traffic Flow Prediction with Personalization  24
Traffic Pattern Sharing for Federated Traffic Flow Predictio...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhou, Hang Yu, Wentao Wan, Sheng Tong, Yongxin Gu, Tianlong Gong, Chen School of Computer Science and Engineering Nanjing University of Science and Technology China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education China Jiangsu Key Laboratory of Image and Video Understanding for Social Security China SKLSDE Beihang University China Jinan University Engineering Research Center of Trustworthy AI Ministry of Education China
Accurate Traffic Flow Prediction (TFP) is crucial for enhancing the efficiency and safety of transportation systems, so it has attracted intensive researches by exploiting spatial-temporal dependencies within road net... 详细信息
来源: 评论
Ranking on Heterogeneous Manifold for Multimodal information Retrieval  21
Ranking on Heterogeneous Manifold for Multimodal Information...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Jin, Zhenkun Wan, Xingshi Nie, Xin Zhou, Xinlei Yi, Yuanyuan Zhou, Gefei Wuhan Business University Wuhan Research Institute of Posts and Telecommunications Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Wuhan China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan China Huazhong University of Science and Technology School of Computer Science & Technology Wuhan China
In light of recent advancements in Internet of Multimedia Things (IoMT) and 5G technology, both the variety and quantity of data have been rapidly increasing. Consequently, handling zero-shot cross-modal retrieval (ZS... 详细信息
来源: 评论
Malicious Client Detection with Differential Privacy Constraints Based on Model Update Slicing and K-Means Clustering
Malicious Client Detection with Differential Privacy Constra...
收藏 引用
Frontiers technology of information and computer (ICFTIC), IEEE International Conference on
作者: Mengshi Qi Xin Wang Yunpeng He Ming Yang Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Federated learning (FL) is a decentralized machine learning technique that protects data privacy by trainng models locally on devices and sharing only model updates instead of raw data. However, FL also faces multiple... 详细信息
来源: 评论
Discounted Iterative Adaptive Critic Designs With Novel Stability Analysis for Tracking Control
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第7期9卷 1262-1272页
作者: Mingming Ha Ding Wang Derong Liu School of Automation and Electrical Engineering University of Science and Technology BeijingBeijing 100083China Faculty of Information Technology the Beijing Key Laboratory of Computational Intelligence and Intelligent Systemthe Beijing Laboratory of Smart Environmental Protectionand the Beijing Institute of Artificial IntelligenceBeijing University of TechnologyBeijing 100124China Department of Electrical and Computer Engineering University of Illinois at ChicagoChicago IL 60607 USA IEEE
The core task of tracking control is to make the controlled plant track a desired *** traditional performance index used in previous studies cannot eliminate completely the tracking error as the number of time steps *... 详细信息
来源: 评论
An Assisting Education system of Electronic Building Blocks Based on Deep Learning  24
An Assisting Education System of Electronic Building Blocks ...
收藏 引用
2024 7th International Conference on computer information science and Artificial Intelligence, CISAI 2024
作者: Shi, Zhuo Xu, Ziquan Qiu, Xia He, Haoen Luo, Xiaonan School of Art and Design Guilin University of Electronic Technology Guangxi Guilin China Guangxi Key Laboratory of lmage and Graphic Intelligent Processing Guangxi Guilin China Department of Computer and Information Security University of Guilin Electronic Technology Guangxi Guilin China Department of Guangxi Key Laboratory of Image and Graphic Intelligent Processing University of Guilin Electronic Technology Guangxi Guilin China
It is difficult for children to build electronic building blocks. In order to facilitate users to build building blocks, this paper designs and implements an electronic building block auxiliary system based on machine... 详细信息
来源: 评论
Optical spatiotemporal vortices
收藏 引用
eLight 2023年 第1期3卷 156-168页
作者: Chenhao Wan Andy Chong Qiwen Zhan School of Optical-Electrical and Computer Engineering University of Shanghai for Science and TechnologyShanghai 200093China School of Optical and Electronic Information and Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430074HubeiChina Department of Physics Pusan National UniversityGeumjeong-GuBusan 46241South Korea Zhangjiang Laboratory 100 Haike RoadShanghai 201204China Shanghai Key Lab of Modern Optical System University of Shanghai for Science and TechnologyShanghai 200093China
Spatiotemporal vortices of light,featuring transverse orbital angular momentum(OAM)and energy circulation in the spatiotemporal domain,have received increasing attention *** experimental realization of the controllabl... 详细信息
来源: 评论