咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是431-440 订阅
排序:
An Isomerism Learning Model to Solve Time-Varying Problems Through Intelligent Collaboration
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第8期10卷 1772-1774页
作者: Zhihao Hao Guancheng Wang Bob Zhang Leyuan Fang Haisheng Li the Department of Computer and Information Science University of MacaoMacao 999078China the School of Data Science the Chinese University of Hong KongShenzhen 518172 Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen 518000 China Industrial Control Systems Cyber Emergency Response Team Beijing 100040China IEEE the College of Electrical and Information Engineering Hunan UniversityChangsha 410082 the Peng Cheng Laboratory Shenzhen 518000China the Beijing Key Laboratory of Big Data Technology for Food Safety Beijing Technology and Business UniversityBeijing 100048 the School of Computer Science and Engineering Beijing Technology and Business UniversityBeijing 100048China
Dear Editor,This letter deals with a solution for time-varying problems using an intelligent computational(IC)algorithm driven by a novel decentralized machine learning approach called isomerism *** order to meet the ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Data Processing technology for Network Abnormal Traffic Detection  4
Data Processing Technology for Network Abnormal Traffic Dete...
收藏 引用
4th International Conference on Machine Learning and Big Data Analytics for IoT security and Privacy, SPIoT 2023
作者: Wang, Kun Fu, Yu Duan, Xueyuan Xu, Jianqiao Liu, Taotao Department of Information Security Naval University of Engineering Wuhan430033 China School of Mathematics and Information Engineering Xinyang Vocational and Technical College Xinyang464000 China College of Computer and Information Technology Xinyang Normal University Xinyang464000 China Henan Key Laboratory of Analysis and Applications of Education Big Data Xinyang Normal University Xinyang464000 China
At present, the threats to network security are also increasing, among which abnormal traffic detection is the key link to ensure network security. Traditional detection methods based on signature or threshold are oft... 详细信息
来源: 评论
Decoupled Pseudo-Labeling for Semi-Supervised Monocular 3D Object Detection
Decoupled Pseudo-Labeling for Semi-Supervised Monocular 3D O...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Jiacheng Zhang Jiaming Li Xiangru Lin Wei Zhang Xiao Tan Junyu Han Errui Ding Jingdong Wang Guanbin Li School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Department of Computer Vision Technology (VIS) Baidu Inc. China GuangDong Province Key Laboratory of Information Security Technology
We delve into pseudo-labeling for semi-supervised monocular 3D object detection (SSM30D) and discover two primary issues: a misalignment between the prediction quality of 3D and 2D attributes and the tendency of depth... 详细信息
来源: 评论
A Reinforcement Adversarial Framework Targeting Endogenous Functional Safety in ICS: Applied to Tennessee Eastman Process
A Reinforcement Adversarial Framework Targeting Endogenous F...
收藏 引用
International Conference on computer and Automation Engineering, ICCAE
作者: Xinyi Wu Yulong Ding Shuang-Hua Yang Department of Computer Science and Engineering Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Southern University of Science and Technology Shenzhen China Department of Computer Science Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Southern University of Science and Technology University of Reading Berkshire UK
Endogenous Safety and security (ESS) of Industrial Control systems (ICS) has gained great attention with the advent of Industry 4.0. However, with rising cyber threats, most current research has focused mainly on cybe... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
Joint Power Allocation and Task Scheduling for Data Offloading in Non-Geostationary Orbit Satellite Networks
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2882-2896页
作者: He, Lijun Jia, Ziye Wang, Juncheng Lansard, Erick Han, Zhu Yuen, Chau China University of Mining and Technology School of Information and Control Engineering Xuzhou221116 China Xidian University State Key Laboratory of Integrated Services Networks Xi’an710071 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Nanjing211111 China Hong Kong Baptist University Department of Computer Science Kowloon Tsai Hong Kong Nanyang Technological University School of Electrical and Electronics Engineering Jurong West 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
In Non-Geostationary Orbit Satellite Networks (NGOSNs) with a large number of battery-carrying satellites, proper power allocation and task scheduling are crucial to improving data offloading efficiency. In this work,... 详细信息
来源: 评论
LogESP: Enhancing Log Semantic Representation With Word Position for Anomaly Detection
LogESP: Enhancing Log Semantic Representation With Word Posi...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Zhengping Ni Xiaoqiang Di Xu Liu Lianjie Chang Jinqing Li Qiyue Tang School of Computer Science and Technology Changchun University of Science and Technology Changchun China Jilin Province Key Laboratory of Network and Information Security Changchun University of Science and Technology Changchun China Information Center Changchun University of Science and Technology Changchun China
Logs are valuable data for detecting anomalous network behavior. Accurate feature extraction from logs is essential for anomaly detection. However, statistical-based feature extraction methods consider the statistical... 详细信息
来源: 评论
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detection
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detect...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guangjin Wang Bao Wang Fuyong Xu Zhenfang Zhu Peipei Wang Ru Wang Peiyu Liu School of Information Science and Engineering Shandong Normal University Jinan China School of Information Science and Electrical Engineering Shandong Jiao Tong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Multimodal sarcasm detection aims to identify whether utterances express sarcastic intentions contrary to their literal meaning based on multimodal information. However, existing methods fail to explore the model’s &... 详细信息
来源: 评论