咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是371-380 订阅
排序:
Unsupervised Graph-Sequence Anomaly Detection for 5G Core Network Control Plane Traffic  29
Unsupervised Graph-Sequence Anomaly Detection for 5G Core Ne...
收藏 引用
29th IEEE International Conference on Parallel and Distributed systems, ICPADS 2023
作者: Wang, Min Li, Peng Cheng, Zhang Liu, Wenmao Nie, Lei Bao, Haizhou Liu, Qin Zhang, Kai Wuhan University of Science and Technology School of Computer Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System China Nsfocus Technologies Group Co. Ltd China Wuhan University School of Cyber Science and Engineering China
5G Core network (5GC) employs a Service Based Architecture (SBA). This architecture decomposes the control plane into multiple independent Network Functions (NFs). NFs open interfaces to provide services to other NFs,... 详细信息
来源: 评论
Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 929-955页
作者: Lamiaa A.Abou Elazm Walid El-Shafai Sameh Ibrahim Mohamed G.Egila H.Shawkey Mohamed K.H.Elsaid Naglaa F.Soliman Hussah Nasser AlEisa Fathi E.Abd El-Samie Department of Microelectronics Electronics Research InstituteAlnozhaEgypt Department of Electronics and Electrical Communications Engineering Ain Shams UniversityCairoEgypt Department of Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh 11586Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh 11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia
Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric *** of the transmitted data in multi-media systems are susceptible to attacks,which affect the security of... 详细信息
来源: 评论
A Region Enhanced Discrete Multi-Objective Fireworks Algorithm for Low-Carbon Vehicle Routing Problem
收藏 引用
Complex system Modeling and Simulation 2022年 第2期2卷 142-155页
作者: Xiaoning Shen Jiaqi Lu Xuan You Liyan Song Zhongpei Ge Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Jiangsu Key Laboratory of Big Data Analysis TechnologySchool of AutomationNanjing University of Information Science and TechnologyNanjing 210044China School of Automation Nanjing University of Information Science and TechnologyNanjing 210044China Institute of Trustworthy Autonomous Systems and also with the Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent ComputationDepartment of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China
A constrained multi-objective optimization model for the low-carbon vehicle routing problem(VRP)is established.A carbon emission measurement method considering various practical factors is *** minimizes both the total... 详细信息
来源: 评论
Mixed Color Channels (MCC): A Universal Module for Mixed Sample Data Augmentation Methods
Mixed Color Channels (MCC): A Universal Module for Mixed Sam...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Wei, Yang Ma, Jianfeng Jiang, Zhongyuan Xiao, Bin School of Cyber Engineering Xidian University China Shaanxi Key Laboratory of Network and System Security China School of Computer Science and Technology Chongqing University of Posts and Telecommunication China
Color invariance is critical for computer vision systems since it significantly increases the robustness and effectiveness of the system. MSDA approaches (e.g., FMix and CutMix) have attracted considerable attention i... 详细信息
来源: 评论
ECFuzz: Effective Configuration Fuzzing for Large-Scale systems
ECFuzz: Effective Configuration Fuzzing for Large-Scale Syst...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Junqiang Li Senyi Li keyao Li Falin Luo Hongfang Yu Shanshan Li Xiang Li University of Electronic Science and Technology of China Chengdu China National University of Defense Technology Hunan China National Key Laboratory of Science and Technology on Information System Security Beijing China
A large-scale system contains a huge configuration space because of its large number of configuration parameters. This leads to a combination explosion among configuration parameters when exploring the configuration s... 详细信息
来源: 评论
Twitter Bot Detection with Multi-Head Attention and Supervised Contrastive Learning  21
Twitter Bot Detection with Multi-Head Attention and Supervis...
收藏 引用
21st International computer Conference on Wavelet Active Media technology and information Processing, ICCWAMTIP 2024
作者: Qiang, Liu Jiazhong, Lu Yuanyuan, Huang Weisha, Zhang Jun, Lv School of Cybersecurity Xin Gu Industrial College Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China SUGON Industrial Control and Security Center Chengdu610225 China School of Foreign Languages University of Electronic Science and Technology of China Chengdu611731 China Co. Ltd. China
The task of detecting bots on Twitter is an indispensable task for combating social network disinformation, curbing rumors, and managing online public opinion. However, today's social bots often disguise themselve... 详细信息
来源: 评论
Ensuring Minority Group Rights in Social IoT with Fairness-aware Federated Graph Node Classification  21
Ensuring Minority Group Rights in Social IoT with Fairness-a...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Mao, Qinghua Lin, Xi Li, Gaolei Chen, Lixing Liu, Yuchen Qi, Yuxin Li, Jianhua Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering Shanghai China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai China North Carolina State University Department of Computer Science NC United States
Graph neural networks (GNNs) are a powerful tool to predict the categories of IoT nodes for providing diverse high-quality services in the social Internet of Things (SIoT). Intuitively, SIoT could be divided into seve... 详细信息
来源: 评论
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Learning  22
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Lea...
收藏 引用
22nd IEEE International Conference on Industrial Informatics, INDIN 2024
作者: Cao, Weipeng Yao, Xuyang Xu, Zhiwu Pan, Yinghui Sun, Yixuan Li, Dachuan Qiu, Bohua Wei, Muheng Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Stony Brook University New York United States Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China ZhenDui Industry Artificial Intelligence Co. Ltd Shenzhen China Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai China
Realizing Generalized Zero-Shot Learning (GZSL) based on large models is emerging as a prevailing trend. However, most existing methods merely regard large models as black boxes, solely leveraging the features output ... 详细信息
来源: 评论
A Classification Method for ECG Signals Based on Convolutional Neural Network  20
A Classification Method for ECG Signals Based on Convolution...
收藏 引用
20th IEEE International Conference on Mechatronics and Automation, ICMA 2023
作者: Yang, Yuan Guo, Jin Lyu, Fengze Guo, Shuxiang Beijing Institute of Technology The Key Laboratory of Convergence Biomedical Engineering System and Healthcare Technology The Ministry of Industry and Information Technology Beijing100081 China Southern University of Science and Technology The Department of Electronic and Electrical Engineering Guangdong Shenzhen518055 China
Cardiovascular disease is a chronic disease with high incidence, high disability and high mortality, which poses a great threat to the life and health of people all over the world. At present, the incidence and mortal... 详细信息
来源: 评论
Face anti-spoofing based on multi-modal and multi-scale features fusion
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2022年 第6期29卷 73-82页
作者: Kong Chao Ou Weihua Gong Xiaofeng Li Weian Han Jie Yao Yi Xiong Jiahao School of Big Data and Computer Science Guizhou Normal UniversityGuiyang 550025China Special Key Laboratory of Artificial Intelligence and Intelligent Control of Guizhou Province Guizhou Institute of TechnologyGuiyang 550003China Guizhou Science and Technology Information Center Department of Science and Technology of Guizhou ProvinceGuiyang 550002China
Face anti-spoofing is used to assist face recognition system to judge whether the detected face is real face or fake face. In the traditional face anti-spoofing methods, features extracted by hand are used to describe... 详细信息
来源: 评论