咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是291-300 订阅
排序:
Mini-Savi: Realistic Satellite Network Simulation Platform Based on Open-Source Tools
Mini-Savi: Realistic Satellite Network Simulation Platform B...
收藏 引用
Frontiers of computers and Communication Engineering (FCCE), International Conference on
作者: Zhu Tang Jingjing Zhao Hu Li Tianhang Guo Quan Wang Hongyan Chen Baokang Zhao College of Computer National University of Defense Technology Changsha China National Key Laboratory of Science and Technology on Information System Security Beijing China
Recently, mega satellite constellations are very popular for global instant messaging, and inter-satellite links are planned for delay reduction, leading to satellite network architecture finally. Although there are m...
来源: 评论
Low Energy Consumption and Time Deterministic Energy-saving Workflow Task Scheduling Algorithm based on DVFS  9
Low Energy Consumption and Time Deterministic Energy-saving ...
收藏 引用
9th IEEE International Conference on Cyber security and Cloud Computing and 8th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2022
作者: Liu, Xun Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System College of Computer Science and Technology Wuhan China
With the development of streaming media, soft real-time system in today's life could participate in the use of more extensive areas. The use frequency was also increasing. Consequently, modern processors were equi... 详细信息
来源: 评论
GAN-DIRNet:A Novel Deformable Image Registration Approach for Multimodal Histological Images
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 487-506页
作者: Haiyue Li Jing Xie Jing Ke Ye Yuan Xiaoyong Pan Hongyi Xin Hongbin Shen Institute of Image Processing and Pattern Recognition Shanghai Jiao Tong Universityand Key Laboratory of System Control and Information ProcessingMinistry of Education of ChinaShanghai200240China Department of Pathology Ruijin HospitalShanghai Jiao Tong UniversitySchool of MedicineShanghai200025China Department of Computer Science and Engineering Shanghai Jiao Tong UniversityShanghai200240China Global Institute of Future Technology Shanghai Jiao Tong UniversityShanghai200240China
Multi-modal histological image registration tasks pose significant challenges due to tissue staining operations causing partial loss and folding of *** neural network(CNN)and generative adversarial network(GAN)are piv... 详细信息
来源: 评论
Adaptive focusing optical coherence tomography for corneal imaging
收藏 引用
Optics Letters 2025年 第3期50卷 896-899页
作者: Shi, Yejiong He, Bin Yin, Zichen Chen, Zhengyu Hu, Zhangwei Xue, Ruizhi Yang, Panqi Zhang, Xiao Zhang, Ning Meng, Zhe Ying, Yuzhe Jing, Linkai Wang, Guihuai Xue, Ping State Key Laboratory of Low-dimensional Quantum Physics Department of Physics Tsinghua University Beijing China Frontier Science Center for Quantum Information Beijing China Beijing Institute of Technology Beijing China Institute of Forensic Science Ministry of Public Security Beijing China Department of Neurosurgery Beijing Tsinghua Changgung Hospital School of Clinical Medicine Institute of Precision Medicine Tsinghua University Beijing China
Optical coherence tomography (OCT) plays a crucial role in diagnosing corneal diseases due to its capacity to provide high-resolution three-dimensional imaging. However, the convex shape of the cornea and the inherent... 详细信息
来源: 评论
Membership information Leakage in Well-Generalized Auto Speech Recognition systems
Membership Information Leakage in Well-Generalized Auto Spee...
收藏 引用
2023 International Conference on Data science and Network security, ICDSNS 2023
作者: Li, Honglei Zhao, Xinlong School of Cyberspace Security School of Cryptology Hainan University Haikou China Key Laboratory of Internet Information Retrieval of Hainan Province Haikou China School of Computer Science and Technology Hainan University Haikou China
Membership inference attack (MIA) attempts to determine whether a particular data sample has participated in the training process of the target model, and is regarded as basic form of privacy breach in machine learnin... 详细信息
来源: 评论
Vulnerability knowledge extraction method based on joint extraction model  9
Vulnerability knowledge extraction method based on joint ext...
收藏 引用
9th International Conference on Advanced Cloud and Big Data, CBD 2021
作者: Liu, Zhen Di, XiaoQiang Song, Wei Ren, WeiWu Jilin Key Laboratory of Network and Information Security Changchun University of Science and Tecchnology Changchun China School of Computer Science and Technology Changchun University of Science of Technology Changchun China Information Center Changchun University of Science and Technology Changchun China
information extraction is an important semantic processing task to construct network security knowledge graph. Extracting entities and relationships in vulnerability description from public data sets will inevitably l... 详细信息
来源: 评论
Pyramid Pooling-based Local Profiles for Graph Classification
Pyramid Pooling-based Local Profiles for Graph Classificatio...
收藏 引用
2023 IEEE International Conference on systems, Man, and Cybernetics, SMC 2023
作者: Wu, Chengpei Lou, Yang Li, Junli College of Computer Science Sichuan Normal University Chengdu610066 China Key Laboratory of System Control and Information Processing Ministry of Education Shanghai200240 China National Yang Ming Chiao Tung University Department of Computer Science Hsinchu300 Taiwan Graduate School of Information Science and Technology Osaka University Osaka565-0871 Japan
Many natural and engineering systems can be modeled and represented in the forms of graph data, and then studied using graph theory and network analysis tools. Graph representation learning aims at generating lower-di... 详细信息
来源: 评论
MineLoRa: Markov Transition Fields and Adaptive Neural Networks for LoRa Device Radio Frequency Fingerprint Identification
MineLoRa: Markov Transition Fields and Adaptive Neural Netwo...
收藏 引用
2024 International Conference on Artificial Intelligence of Things and systems, AIoTSys 2024
作者: Zhu, Biaokai Jia, Yupeng Wang, Zhonghao Wen, Jiawei Liu, Xinle Zhao, Shijia Xu, Qiongyue Song, Jie Li, Ping Liu, Sanman Li, Feng Zhao, Jumin Shanxi Police College Taiyuan University of Technology Taiyuan China Shanxi Police College Cyber Security Department Taiyuan China Intelligent Policing Key Laboratory of Sichuan Province Sichuan Police College Luzhou China School of Computer Science and Technology Anhui University Hefei China Taiyuan University of Technology Taiyuan China College of Information and Computer Taiyuan University of Technology Jinzhong China
With the development of LPWAN technology, LoRa, one of the typical representatives, is widely used in various communication scenarios. At the same time, it is also faced with problems such as difficulty in identifying... 详细信息
来源: 评论
Unidirectional Identity-Based Proxy Re-Signature with key Insulation in EHR Sharing system
收藏 引用
computer Modeling in Engineering & sciences 2022年 第6期131卷 1497-1513页
作者: Yanan Chen Ting Yao Haiping Ren Zehao Gan School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu610054China Basic Course Teaching Department Jiangxi University of Science and TechnologyNanchang330013China Institute of Electronic and Information Engineering University of Electronic Science and Technology of ChinaDongguan523808China Network and Data Security Key Laboratory of Sichuan Province Unversity of Electronic Science and Technology of ChinaChengdu610054China
The introduction of the electronic medical record(EHR)sharing system has made a great contribution to the management and sharing of healthcare *** referral treatment for patients,the original signature needs to be con... 详细信息
来源: 评论
Energy-efficient and Privacy-preserving Edge Intelligence for 6G-Empowered Intelligent Transportation systems
收藏 引用
IEEE Network 2025年
作者: Zhu, Chenlu Fan, Xiaoxuan Deng, Xianjun Xiao, Ziheng Guo, Tingting Liu, Shenghao Sun, Jiaqi Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Kedao Geographic Information Engineering Co. Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea Republic of
6G-empowered Intelligent Transportation systems (ITS) generate large amounts of data through millions of devices and sensors at the terminal and network edge. Edge intelligence advances the frontier of data-driven art... 详细信息
来源: 评论