咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是31-40 订阅
排序:
Automated object recognition in high-resolution optical remote sensing imagery
收藏 引用
National science Review 2023年 第6期10卷 38-41页
作者: Yazhou Yao Tao Chen Hanbo Bi Xinhao Cai Gensheng Pei Guoye Yang Zhiyuan Yan Xian Sun Xing Xu Hai Zhang School of Computer Science and Engineering Nanjing University of Science and Technology Aerospace Information Research Institute Chinese Academy of Sciences School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Key Laboratory of Network Information System Technology (NIST) Aerospace Information Research Institute Chinese Academy of Sciences Department of Computer Science and Technology Tsinghua University School of Computer Science and Engineering University of Electronic Science and Technology of China Pazhou Laboratory (Huangpu) School of Mathematics Northwest University
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically loc...
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion  10
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Gu, Qiliang Lu, Qin Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
Malware Detection Method Based on TPE Optimized Stacking  3
Malware Detection Method Based on TPE Optimized Stacking
收藏 引用
3rd International Conference on High Performance Computing and Communication Engineering, HPCCE 2023
作者: Zhao, Dongbo Yuan, Zesong Xie, Nannan Jilin Province Key Laboratory of Network and Information Security School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China
Fast detection and categorization of malware are increasingly important for securing hosts and networks. Although many Machine Learning models have been utilized to detect malware, single-model detection may not remai... 详细信息
来源: 评论
MSCACodec: A Low-Rate Neural Speech Codec With Multi-scale Residual Channel Attention  21st
MSCACodec: A Low-Rate Neural Speech Codec With Multi-scale R...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Yu, Xingye Li, Ye Zhang, Peng Lin, Lingxia Cai, Tianyu Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
In the development of modern communication technology, although wideband speech coding provides high-fidelity speech transmission, its high bandwidth requirement limits its application in resource-constrained environm... 详细信息
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
Cross-chain Transaction Tracking Protocol based on Multi-dimensional Digital Watermarking Fingerprints  6
Cross-chain Transaction Tracking Protocol based on Multi-dim...
收藏 引用
6th International Conference on Frontier Technologies of information and computer, ICFTIC 2024
作者: Li, Duanzhen Xu, Shujiang He, Haochen Xue, Hongrui Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Cross-chain technology plays a critical role in the process of interconnecting blockchains. However, all attention has been focused on how to achieve efficient cross-chain interoperability protocols, thus neglecting t... 详细信息
来源: 评论
Code Vulnerability Detection via Nearest Neighbor Mechanism
Code Vulnerability Detection via Nearest Neighbor Mechanism
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Du, Qianjin Kuang, Xiaohui Zhao, Gang Department of Computer Science and Technology Tsinghua University China National Key Laboratory of Science and Technology on Information System Security China
Code vulnerability detection is a fundamental and challenging task in the software security field. Existing research works aim to learn semantic information from the source code by utilizing NLP technologies. However,... 详细信息
来源: 评论
Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing
收藏 引用
computer Modeling in Engineering & sciences 2023年 第10期137卷 345-361页
作者: Yonghao Zhang Yongtang Wu Tao Li Hui Zhou Yuling Chen State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and TechnologyWeifang262700China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin541004China
The data in Mobile Edge Computing(MEC)contains tremendousmarket value,and data sharing canmaximize the usefulness of the ***,certain data is quite sensitive,and sharing it directly may violate *** Federated Learning(V... 详细信息
来源: 评论
HoLens:A visual analytics design for higher-order movement modeling and visualization
收藏 引用
Computational Visual Media 2024年 第6期10卷 1079-1100页
作者: Zezheng Feng Fang Zhu Hongjun Wang Jianing Hao Shuang-Hua Yang Wei Zeng Huamin Qu Department of Computer Science and Engineering The Hong Kong University of Science and TechnologyHong KongChina Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Thrust of Computational Media and Arts(CMA) The Hong Kong University of Science and Technology(Guangzhou)Guangzhou 511458China Department of Computer Science University of ReadingBerkshire RG66AHUK Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Southern University of Science and TechnologyShenzhen 518055China
Higher-order patterns reveal sequential multistep state transitions,which are usually superior to origin-destination analyses that depict only first-order geospatial movement *** methods for higher-order movement mode... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge Computing
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Min Northeastern University School of Computer Science and Engineering The Engineering Research Center of Security Technology of Complex Network System Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University College of Information Science and Engineering State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
Mobile edge computing (MEC) integrated with Network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual Network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论