咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是361-370 订阅
排序:
Prediction-Based Thunderstorm Path Recovery Method Using CNN-BiLSTM
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 1637-1654页
作者: Xu Yang Ling Zhuang Yuqiang Sun Wenjie Zhang School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China Department of Electrical and Computer Engineering University of AlbertaEdmontonAB T6G 2R3Canada CCCC Highway Consultants Co. Ltd.Beijing100101China School of Geographical Sciences Nanjing University of Information Science and TechnologyNanjing210044China State Key Laboratory of Resources and Environmental Information System Institute of Geographic Sciences and Natural Resources ResearchChinese Academy of SciencesBeijing100101China
The loss of three-dimensional atmospheric electric field(3DAEF)data has a negative impact on thunderstorm *** paper proposes a method for thunderstorm point charge path *** on the relation-ship between a point charge ... 详细信息
来源: 评论
Research and Application of Speech Transmission Index in Acoustic Leakage Detection
Research and Application of Speech Transmission Index in Aco...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)
作者: Qiuyun Hao FuQiang Wang Peng Zhang XiaoFeng Ma Jianqiang Zhang Wei Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Acoustic information in confidential premise can be leaked through channels such as walls, pipes, doors and windows. Acoustic leakage level needs to be measured through specific indicators. Acoustic leakage evaluation... 详细信息
来源: 评论
CNN-Enhanced Deep Sparse Representation Network for Polarimetric SAR Image Classification
CNN-Enhanced Deep Sparse Representation Network for Polarime...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Junfei Shi Mengmeng Nie Haiyan Jin Junhuai Li Yuanlin Zhang Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China
Deep learning networks can automatically acquire high-level semantic features for polarimetric SAR image classification, while it involves a blind learning procedure without explicit guidance. In contrast, sparse repr... 详细信息
来源: 评论
E-commerce Scheme Based on Proxy t-out-of-n Oblivious Signature
收藏 引用
International Journal of Network security 2024年 第5期26卷 851-860页
作者: Chen, Jingyu Gong, Linming Ma, Xiangxiang Wang, Daoshun The Shaanxi Key Laboratory of Clothing Intelligence School of Computer Science Xi’an Polytechinic University Xi’an710048 China State and Local Joint Engineering Research Center for Advanced Networking and Intelligent Information Services School of Computer Science Xi’an Polytechnic University Shaanxi Xi’an710048 China Department of Computer Science and Technology Tsinghua University Beijing100084 China No. 58 Shan-gu Road Lintong Xi’an710600 China
With the development of the internet and the demand for online shopping, intelligent online shopping systems have received widespread attention in recent years. However, existing online shopping systems’ security and... 详细信息
来源: 评论
Seamless Decision-Making in the Big Data Era: A Modular Approach to Integrating IoT, Cloud Computing, and Data Lakes  4
Seamless Decision-Making in the Big Data Era: A Modular Appr...
收藏 引用
4th International Conference on Electrical, Communication and computer Engineering, ICECCE 2023
作者: Zemmouri, Mohamed Laalam, Fatma Zohra Kazar, Okba Himeur, Yassine Oulefki, Adel Toumi, Chahrazad Mansoor, Wathiq Attala, Shadi Artificial intelligence and Information Technologies Laboratory Faculty of New Information and Communication Technologies Kasdi Merbah Ouargla University Ouargla30000 Algeria College of Engineering and Information Technology University of Dubai Dubai United Arab Emirates Department of Computer Science University of Sharjah Sharjah United Arab Emirates Mohamed Khider University Department of Computer Science LINFI Laboratory Biskra07000 Algeria United Arab Emirate University Department of Information Systems and Security College of Information Technology Abu Dhabi United Arab Emirates
The integration of big data with cutting-edge technologies like IoT and Cloud Computing has profoundly influenced various aspects of modern life, including everyday service processes. To facilitate data-driven decisio... 详细信息
来源: 评论
SUMI-IFL: An information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints  39
SUMI-IFL: An Information-Theoretic Framework for Image Forge...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao Cao, Xiaochun School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University China State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau Macao School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University China
Image forgery localization (IFL) is a crucial technique for preventing tampered image misuse and protecting social safety. However, due to the rapid development of image tampering technologies, extracting more compreh... 详细信息
来源: 评论
Infringement Detection and Traceability Scheme Based on Ciphertext Feature Extraction
Infringement Detection and Traceability Scheme Based on Ciph...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Lianhai Wang Xinlei Wang Tianrui Liu Yingxiaochun Wang Qi Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The rapid growth of healthcare data transactions has fostered win-win developments in healthcare technology innovation and economic benefits. However, the issue of secondary transactions makes data ownership vulnerabl... 详细信息
来源: 评论
GLCF: A Global-Local Multimodal Coherence Analysis Framework for Talking Face Generation Detection  39
GLCF: A Global-Local Multimodal Coherence Analysis Framework...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Chen, Xiaocan Yin, Qilin Liu, Jiarui Lu, Wei Luo, Xiangyang Zhou, Jiantao School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou 510006 China Alibaba Group Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science Faculty of Science and Technology University of Macau 999078 Macao
Talking face generation (TFG) allows for producing lifelike talking videos of any character using only facial images and accompanying text. Abuse of this technology could pose significant risks to society, creating th... 详细信息
来源: 评论
A Topic-Aware Graph-Based Neural Network for User Interest Summarization and Item Recommendation in Social Media  28th
A Topic-Aware Graph-Based Neural Network for User Interest ...
收藏 引用
28th International Conference on Database systems for Advanced Applications, DASFAA 2023
作者: Chen, Junyang Fan, Ge Gong, Zhiguo Li, Xueliang Leung, Victor C. M. Wang, Mengzhu Yang, Ming College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen China Tencent Inc. Shenzhen China State Key Laboratory of Internet of Things for Smart City Department of Computer Information Science University of Macau China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
User-generated content is daily produced in social media, as such user interest summarization is critical to distill salient information from massive information. While the interested messages (e.g., tags or posts) fr... 详细信息
来源: 评论
Resampling Factor Estimation via Dual-Stream Convolutional Neural Network
收藏 引用
computers, Materials & Continua 2021年 第1期66卷 647-657页
作者: Shangjun Luo Junwei Luo Wei Lu Yanmei Fang Jinhua Zeng Shaopei Shi Yue Zhang School of Data and Computer Science Guangdong Province Key Laboratory of Information Security TechnologyMinistry of Education Key Laboratory of Machine Intelligence and Advanced ComputingSun Yat-sen UniversityGuangzhou510006China Academy of Forensic Science Shanghai200063China College of Information Science and Technology Jinan UniversityGuangzhou510632China Department of Computer Science University of Massachusetts LowellLowellMA 01854USA
The estimation of image resampling factors is an important problem in image *** all the resampling factor estimation methods,spectrumbased methods are one of the most widely used methods and have attracted a lot of re... 详细信息
来源: 评论