咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是351-360 订阅
排序:
Improved WAVE Signature and Apply to Post-quantum Blockchain  8th
Improved WAVE Signature and Apply to Post-quantum Blockcha...
收藏 引用
8th International Symposium on security and Privacy in Social Networks and Big Data, SocialSec 2022
作者: Zhang, Zhuoran Tian, Haibo Zhang, Fangguo School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China
Blockchain has raised public concern due to its public, distributed, and decentration characteristics. This technique has been applied not only in the financial area, but also in e-government, e-health and many other ... 详细信息
来源: 评论
NPIPVis:A visualization system involving NBA visual analysis and integrated learning model prediction
收藏 引用
Virtual Reality & Intelligent Hardware 2022年 第5期4卷 444-458页
作者: Zhuo SHI Mingrui LI Meng WANG Jing SHEN Wei CHEN Xiaonan LUO Department of Art and Design University of Guilin Electronic TechnologyGuilin 541004China Department of Computer and Information Security University of Guilin Electronic TechnologyGuilin 541004China Department of Guangxi Key Laboratory of Image and Graphic Intelligent Processing University of Guilin Electronic TechnologyGuilin 541004China Department of State Key Laboratory of CAD&CG University of ZhejiangHangzhou 310058China
Background Data-driven event analysis has gradually become the backbone of modern competitive sports analysis. Competitive sports data analysis tasks increasingly use computer vision and machine-learning models for in... 详细信息
来源: 评论
Syn-BERT: Bi-level Synonymous Data Augmented Self-supervised Embedding-based information Retrieval with BERT  5
Syn-BERT: Bi-level Synonymous Data Augmented Self-supervised...
收藏 引用
5th IEEE International Conference on Pattern Recognition and Machine Learning, PRML 2024
作者: Yu, Zhaojian Huang, Tianlin Chen, Rong Chen, Haosheng Lin, Shuyuan College of Cyber Security Jinan University Guangzhou510632 China School of Mathematics and Computer Science Quanzhou Normal University Quanzhou362000 China Information Engineering College Xizang Minzu University Shanyang712082 China College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing Key Laboratory of Image Cognition Chongqing400065 China
information retrieval, which seeks to locate the most relevant documents from a document pool given a user query, is critical in a wide range of applications. However, current embedding-based retrieval models require ... 详细信息
来源: 评论
Trajectory Planning of Rechargeable UAVs for AoS Minimization in IoT Networks
Trajectory Planning of Rechargeable UAVs for AoS Minimizatio...
收藏 引用
International Conference on Wireless Communications and Signal Processing (WCSP)
作者: Yunchao Liu Suling Lin Jie Gong Guangdong Key Laboratory of Information Security Technology School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
Freshness of information is a critical issue for real-time Internet of Things (IoT) applications. Unmanned aerial vehicles (UAVs), due to their high flexibility and low cost, are widely deployed in time-sensitive IoT ... 详细信息
来源: 评论
EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2024年 第3期10卷 534-546页
作者: Tian, Jiwei Shen, Chao Wang, Buhong Ren, Chao Xia, Xiaofang Dong, Runze Cheng, Tianhao Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi'an Jiaotong University Xi'an China Air Traffic Control and Navigation College Air Force Engineering University Xi'an China Information and Navigation College Air Force Engineering University Xi'an China School of Electrical and Electronic Engineering Nanyang Technological University Singapore School of Computer Science and Technology Xidian University Xi'an China
Although conventional false data injection attacks can circumvent the detection of bad data detection (BDD) in sustainable power grid cyber physical systems, they are easily detected by well-trained deep learning-base... 详细信息
来源: 评论
Size-Invariance Matters: Rethinking Metrics and Losses for Imbalanced Multi-object Salient Object Detection  41
Size-Invariance Matters: Rethinking Metrics and Losses for I...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Feiran Xu, Qianqian Bao, Shilong Yang, Zhiyong Cong, Runmin Cao, Xiaochun Huang, Qingming Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Science Beijing Jiaotong University Beijing China School of Control Science and Engineering Shandong University Jinan China Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Cyber Science and Tech. Sun Yat-sen University Shenzhen Campus China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores the size-invariance of evaluation metrics in Salient Object Detection (SOD), especially when multiple targets of diverse sizes co-exist in the same image. We observe that current metrics are size-s... 详细信息
来源: 评论
Learning-Based Computation Offloading in Hierarchical MEC system with Energy Harvesting
Learning-Based Computation Offloading in Hierarchical MEC Sy...
收藏 引用
IEEE Conference on Vehicular technology (VTC)
作者: Chufan Jian Jie Gong Guangdong Key Laboratory of Information Security Technology School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
With the prevalence of real-time Internet of Things (IOT) applications, mobile edge computing (MEC) has emerged as a paradigm to ensure low-latency computation. Hierarchical MEC system, which deploy computation resour... 详细信息
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
Improving Code Search with Multi-Modal Momentum Contrastive Learning
Improving Code Search with Multi-Modal Momentum Contrastive ...
收藏 引用
IEEE/ACM International Conference on Program Comprehension (ICPC)
作者: Zejian Shi Yun Xiong Yao Zhang Zhijie Jiang Jinjing Zhao Lei Wang Shanshan Li Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China Peng Cheng Laboratory Shenzhen China School of Computer National University of Defense Technology China National Key Laboratory of Science and Technology on Information System Security China
Contrastive learning has recently been applied to enhancing the BERT-based pre-trained models for code search. However, the existing end-to-end training mechanism cannot sufficiently utilize the pre-trained models due...
来源: 评论
Reputation based Adaptive Federated Learning in Medical Scenarios
Reputation based Adaptive Federated Learning in Medical Scen...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Lianhai Wang Tianrui Liu Yingxiaochun Wang Xinlei Wang Qi Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Federated Learning (FL) is a distributed machine learning paradigm designed to address data silos and protect data privacy. However, in medical scenarios, the heterogeneity in data quality and the non-independent and ... 详细信息
来源: 评论