咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是401-410 订阅
排序:
Contrastive Noise-Guided Invertible Network for Image Steganography
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Zhang, Le Lu, Yao Lu, Guangming Harbin Institute of Technology at Shenzhen Department of Computer Science and Technology Shenzhen518057 China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Harbin Institute of Technology at Shenzhen Department of Computer Science and Technology Shenzhen518057 China
Image steganography aims to produce stego images through hiding secret images in the cover images to achieve covert communication. To simultaneously improve the invisibility and revealing quality of covert communicati... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
An Image Semantic Communication system Based on GAN and Relative Position-Encoding
收藏 引用
IEEE Communications Letters 2025年 第6期29卷 1280-1284页
作者: Zhang, Ziqi Tan, Weijie Li, Chunguo Guizhou University College of Big Data and Information Engineering Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptography Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
In image semantic communication, the complex wireless channel environment leads to the loss of image details and performance degradation during transmission. To address this issue, we propose an image semantic communi... 详细信息
来源: 评论
An Approach to New Bearing Fault Diagnosis Utilizing Deep Transfer Learning
An Approach to New Bearing Fault Diagnosis Utilizing Deep Tr...
收藏 引用
Smart World Congress (SWC), IEEE
作者: HuiJuan Hao Yue Feng HongGe Zhao SiJian Zhu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Jinan China
Bearings, serving as crucial components in mechanical equipment, exert a direct influence on the overall performance of the system. Deep transfer learning has garnered significant attention in the realm of intelligent... 详细信息
来源: 评论
Study on the Effectiveness of New Development Methods in Software Engineering Based on Experiments with AB Testing  24
Study on the Effectiveness of New Development Methods in Sof...
收藏 引用
9th International Conference on Cyber security and information Engineering, ICCSIE 2024
作者: Chen, Lei Zhang, Difeng Li, Simu School of Computer Science and Engineering Wuhan Institute of Technology China Hubei Key Laboratory of Intelligent Robot Wuhan Institution of Technology China School of Electrical and Information Engineering Wuhan Institute of Technology China Economic and Business Department College of Post and Telecommunication of Wuhan Institute of Technology China
This study aims to evaluate the effectiveness of an emerging software engineering development method through AB testing experiments. As a commonly used online experimental method, AB testing is used to compare the per... 详细信息
来源: 评论
PriFFT: Privacy-preserving Federated Fine-tuning of Large Language Models via Function Secret Sharing
arXiv
收藏 引用
arXiv 2025年
作者: You, Zhichao Dong, Xuewen Cheng, Ke Mu, Xutong Fu, Jiaxuan Ma, Shiyang Qu, Qiang Shen, Yulong School of Computer Science & Technology Xidian University Shaanxi Key Laboratory of Network and System Security Xi’an China Shenzhen Institues of Advanced Technology Chinese Academy of Sciences China
Fine-tuning large language models (LLMs) raises privacy concerns due to the risk of exposing sensitive training data. Federated learning (FL) mitigates this risk by keeping training samples on local devices, but recen... 详细信息
来源: 评论
Secure Recursive State Estimation of Networked systems Against Eavesdropping: A Partial-Encryption-Decryption Method
收藏 引用
IEEE Transactions on Automatic Control 2024年 第6期70卷 3681-3694页
作者: Zou, Lei Wang, Zidong Shen, Bo Dong, Hongli Donghua University College of Information Science and Technology Engineering Research Center of Digitalized Textile and Fashion Technology Ministry of Education Shanghai201620 China Brunel University London Department of Computer Science UxbridgeUB8 3PH United Kingdom Northeast Petroleum University Artificial Intelligence Energy Research Institute Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control Daqing163318 China
This paper addresses the problem of secure recursive state estimation for a networked linear system, which may be vulnerable to interception of transmitted measurement data by eavesdroppers. To effectively protect inf... 详细信息
来源: 评论
Model Checking for Probabilistic Multiagent systems
收藏 引用
Journal of computer science & technology 2023年 第5期38卷 1162-1186页
作者: 付辰 Andrea Turrini 黄小炜 宋磊 冯元 张立军 State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China University of Chinese Academy of Sciences Beijing 100049China Institute of Intelligent Software Guangzhou 511455China Department of Computer Science University of LiverpoolLiverpool L693BXU.K Microsoft Research Beijing 100190China Centre for Quantum Software and Information University of Technology SydneySydney 2007Australia
In multiagent systems,agents usually do not have complete information of the whole system,which makes the analysis of such systems *** incompleteness of information is normally modelled by means of accessibility relat... 详细信息
来源: 评论
An Evolutionary-Based Game Model of Honest and Dishonest Sellers  6th
An Evolutionary-Based Game Model of Honest and Dishonest Sel...
收藏 引用
6th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2019
作者: Ji, Shujuan Bao, Chunxiao Sun, Guanguan Department of Computer Science and Engineering Shandong University of Science and Technology Qingdao China Shandong Key Laboratory of Intelligent Mine Information Technology Shandong University of Science and Technology Qingdao China
Many sellers are pursuing rapid profit growth, using the information asymmetry and virtuality of e-commerce platforms to destroy the reputation system of e-commerce platforms. Most of the existing defending strategies... 详细信息
来源: 评论
Electrical resistivity-temperature characteristics enhancement of insulating cross-linked polyethylene composites by incorporating positive temperature coefficient particles with different Curie temperatures
收藏 引用
High Voltage 2023年 第1期8卷 1-11页
作者: Guimin Jiang Yuanxiang Zhou Chenyuan Teng Yunxiao Zhang Xin Huang Lei Xue Luming Zhou The Wind Solar Storage Division of State Key Laboratory of Control and Simulation of Power System and Generation Equipment Xinjiang UniversityUrumqiChina State Key Laboratory of Power System and Generation Equipment Department of Electrical EngineeringTsinghua UniversityBeijingChina College of Information Engineering Zhejiang University of TechnologyHangzhouChina School of Electronics and Computer Science University of SouthamptonSouthamptonUK
Incorporating positive temperature coefficient(PTC)ceramic particles into polymers provides a prospective alternative solution for suppressing severe electric field distortions caused by negative temperature coefficie... 详细信息
来源: 评论