咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是411-420 订阅
排序:
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
Spatio-Temporal Transformer-Based Reinforcement Learning for Robot Crowd Navigation
Spatio-Temporal Transformer-Based Reinforcement Learning for...
收藏 引用
2023 IEEE International Conference on Robotics and Biomimetics, ROBIO 2023
作者: He, Haodong Fu, Hao Wang, Qiang Zhou, Shuai Liu, Wei Chen, Yang Wuhan University of Science and Technology School of Computer Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan430081 China Eng. Res. Center for Metallurgical Automation and Measurement Technology of Ministry of Education Wuhan430081 China
Ensuring robots can move safely and adhere to social norms in dynamic human environments is a crucial step towards robot autonomous decision-making. In existing work, double serial separate modules are generally used ...
来源: 评论
Prediction of exosomal piRNAs based on deep learning for sequence embedding with attention mechanism
Prediction of exosomal piRNAs based on deep learning for seq...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Liu, Yajun Ding, Yulian Li, Aimin Fei, Rong Guo, Xie Wu, Fangxiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China University of Saskatchewan Division of Biomedical Engineering Saskatoon Canada Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
PIWI-interacting RNAs (piRNAs) are a type of small non-coding RNAs which bind with the PIWI proteins to exert biological effects in various regulatory mechanisms. A growing amount of evidence reveals that exosomal piR... 详细信息
来源: 评论
A generalized reliability analysis of 3-ary n-cubes
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
International Conference on Communication Software and Networks, ICCSN
作者: Zefang Bai Guijuan Wang Meijie Ma School of Mathematics and Statistics Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
GLCF: A Global-Local Multimodal Coherence Analysis Framework for Talking Face Generation Detection
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xiaocan Yin, Qilin Liu, Jiarui Lu, Wei Luo, Xiangyang Zhou, Jiantao School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China Alibaba Group Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science Faculty of Science and Technology University of Macau 999078 China
Talking face generation (TFG) allows for producing lifelike talking videos of any character using only facial images and accompanying text. Abuse of this technology could pose significant risks to society, creating th... 详细信息
来源: 评论
Disorder-enhanced layer Hall effect in a magnetic sandwich heterostructure
收藏 引用
Physical Review B 2024年 第11期109卷 115301-115301页
作者: Xiao-Xia Yi Chun-Bo Hua Rui Chen Bin Zhou Department of Physics Hubei University Wuhan 430062 China School of Electronic and Information Engineering Hubei University of Science and Technology Xianning 437100 China Key Laboratory of Intelligent Sensing System and Security of Ministry of Education Hubei University Wuhan 430062 China
The layer Hall effect is a type of Hall effect where electrons on the top and bottom layers deflect in opposite directions. In this paper, we investigate the disorder effects on the layer Hall effect in a magnetic san... 详细信息
来源: 评论
SUMI-IFL: An information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints
arXiv
收藏 引用
arXiv 2024年
作者: Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao Cao, Xiaochun School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University China State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China School of Cyber Science and Technology Sun Yat-sen University Shenzhen Campus China
Image forgery localization (IFL) is a crucial technique for preventing tampered image misuse and protecting social safety. However, due to the rapid development of image tampering technologies, extracting more compreh... 详细信息
来源: 评论
How to Find Simple Conditions for Successful Sequence Reconstruction?
How to Find Simple Conditions for Successful Sequence Recons...
收藏 引用
IEEE (first ITW conference of the year) information Theory Workshop (ITW)
作者: Chen Wang Eitan Yaakobi Yiwei Zhang Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education School of Cyber Science and Technology Shandong University Qingdao Shandong China Department of Computer Science Technion – Israel Institute of Technology Haifa Israel
We study a model in which a codeword $x$ is transmitted through several identical channels, where each channel produces a noisy read of $x$ . The sequence reconstruction problem, proposed by Levenshtein, asks for h... 详细信息
来源: 评论
Two-Stage Robust Optimization Under Decision Dependent Uncertainty
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第7期9卷 1295-1306页
作者: Yunfan Zhang Feng Liu Yifan Su Yue Chen Zhaojian Wang João P.S.Catalão State Key Laboratory of Power System and Generation Equipment the Department of Electrical EngineeringTsinghua UniversityBeijing 100084China Department of Mechanical and Automation Engineering the Chinese University of Hong KongHong Kong SARChina Ministry of Education Key Laboratory of System Control and Information Processing the Department of AutomationShanghai Jiao Tong Universityand also with Shanghai Engineering Research Center of Intelligent Control and ManagementShanghai 200240China Faculty of Engineering of the University of Porto and Institute for Systems and Computer Engineering Technology and Science(INESC TEC)Porto 4200-465Portugal IEEE
In the conventional robust optimization(RO)context,the uncertainty is regarded as residing in a predetermined and fixed uncertainty *** many applications,however,uncertainties are affected by decisions,making the curr... 详细信息
来源: 评论
RoPA: Robust Privacy-Preserving Forward Aggregation for Split Vertical Federated Learning
收藏 引用
IEEE Transactions on Network and Service Management 2025年
作者: Wang, Lingling Zhang, Zhengyin Huang, Mei Gai, Keke Wang, Jingjing Shen, Yulong Qingdao University of Science and Technology School of Information Science and Technology Shandong Qingdao266061 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Xidian University School of Computer Science and Technology China Shaanxi Key Laboratory of Network and System Security Xi’an710071 China
Split Vertical Federated Learning (Split VFL) is an increasingly popular framework for collaborative machine learning on vertically partitioned data. However, it is vulnerable to various attacks, resulting in privacy ... 详细信息
来源: 评论