咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是461-470 订阅
排序:
Anonymity-Enhanced Sequential Multi-Signer Ring Signature for Secure Medical Data Sharing in IoMT
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 5647-5662页
作者: Gang Xu Xinyu Fan Shiyuan Xu Yibo Cao Xiu-Bo Chen Tao Shang Shui Yu School of Artificial Intelligence and Computer Science North China University of Technology Beijing China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Computer Science The University of Hong Kong Pokfulam Hong Kong School of Cyber Science and Technology Beihang University Beijing China School of Computer Science University of Technology Sydney Sydney NSW Australia
Internet of Medical Things (IoMT) has garnered significant research attention from both academic and medical institutions. However, the sensitive medical data involved in IoMT raises security and privacy concerns. To ... 详细信息
来源: 评论
Fw-fuzz: A code coverage-guided fuzzing framework for network protocols on firmware
Fw-fuzz: A code coverage-guided fuzzing framework for networ...
收藏 引用
作者: Gao, Zicong Dong, Weiyu Chang, Rui Wang, Yisen Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China College of Computer Science and Technology Zhejiang University Hangzhou China
Fuzzing is an effective approach to detect software vulnerabilities utilizing changeable generated inputs. However, fuzzing the network protocol on the firmware of IoT devices is limited by inefficiency of test case g... 详细信息
来源: 评论
Delay-Minimized Resource Allocation in Relay-Assisted NOMA-WPT Industrial IoT Networks
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and Networking 2024年
作者: Wang, Qianru Qian, Li Ping Li, Mingqing Jiang, Wei Wu, Yuan Zhejiang University of Technology Institute of Cyberspace Security Hangzhou310023 China University of Macau State Key Laboratory of Internet of Things for Smart City China University of Macau Department of Computer and Information Science China
The Industrial Internet of Things (IIoT) is a key application of 5th Generation Mobile Communication technology (5G), with latency-sensitive data transmission forming the foundation of IIoT. In this paper, we study th... 详细信息
来源: 评论
A Fully Collusion Resistant Public key Trace and Revoke Scheme with Dynamic Registration and Revocation
收藏 引用
Chinese Journal of Electronics 2023年 第2期18卷 347-354页
作者: Shengli Liu Jian Weng Kefei Chen Xiangxue Li Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai China State Key Laboratory of Information Security Chinese Academy of Sciences Beijing China Department of Computer Science Jinan University Guangzhou China School of Information Security Engineering Shanghai Jiaotong University Shanghai China
We present a new public key trace and revoke scheme, which is suitable for scenarios where users need to join or leave the system frequently. The proposed scheme supports public traceability and dynamic registration a... 详细信息
来源: 评论
From Entanglement Purification Scheduling to Fidelity-Constrained Entanglement Routing
From Entanglement Purification Scheduling to Fidelity-Constr...
收藏 引用
International Conference on Network Protocols
作者: Ziyue Jia Lin Chen School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Provincial Key Laboratory of Information Security Technology Guangzhou China
Recently emerged as a disruptive networking paradigm, quantum networks rely on the mysterious quantum entanglement to teleport qubits without physically transferring quantum particles. However, the state of quantum sy... 详细信息
来源: 评论
Analysis of Eavesdropping Region in Hybrid mmWave-Microwave Wireless systems
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Qu, Qianyue Zhang, Yuanyu Kasahara, Shoji Graduate School of Information Science Nara Institute of Science and Technology Ikoma Japan School of Computer Science and Technology Xidian University Xi’an China Shannxi Key Laboratory of Network and System Security Beijing Sunwise Information Technology Ltd Beijing China
Hybrid communication systems, where millimeter-wave (mmWave) links coexist with microwave links, have been an essential component in the fifth-generation (5G) wireless networks. Nevertheless, the open feature of the w... 详细信息
来源: 评论
Quantum K-Means Model based on Optimization Framework
Quantum K-Means Model based on Optimization Framework
收藏 引用
Image Processing, Electronics and computers (IPEC), Asia-Pacific Conference on
作者: Zexiang Shao Shibin Zhang Sachin Kumar School of Cyberspace Security Chengdu University of Information Technology Chengdu China Sichuan Key Laboratory of Advanced Cryptography and System Security Chengdu China Department of Computer Science and Engineering Ajay Kumar Garg Engineering College India
The Quantum K-means clustering algorithm offers the advantage of quantum parallel computing, but suffers from issues related to cluster center initialization and sensitivity to noisy data due to its similarity with th...
来源: 评论
Towards Privacy-Preserving Cloud Storage:A Blockchain Approach
收藏 引用
computers, Materials & Continua 2021年 第12期69卷 2903-2916页
作者: Jia-Shun Zhang Gang Xu Xiu-Bo Chen Haseeb Ahmad Xin Liu Wen Liu Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Information Science and Technology North China University of TechnologyBeijing100144China Department of Computer Science National Textile UniversityFaisalabad37610Pakistan Inner Mongolia University of Science&Technology School of Information EngineeringBaotou014010China State Key Laboratory of Media Convergence and Communication Communication University of China School of Computer Science and Cybersecurity Communication University of China Key Laboratory of Convergent Media and Intelligent Technology Communication University of China Ministry of EducationBeijing102204China
With the rapid development of cloud computing technology,cloud services have now become a new business model for information *** cloud server provides the IT resources required by customers in a selfservice manner thr... 详细信息
来源: 评论
Optimized Design of a Haptic Unit for Vibrotactile Amplitude Modulation
Optimized Design of a Haptic Unit for Vibrotactile Amplitude...
收藏 引用
2024 IEEE International Conference on Robotics and Biomimetics, ROBIO 2024
作者: Huang, Jingchen Fang, Yun Guo, Weichao Qiao, Zhijian Sheng, Xinjun School of Mechanical Engineering Meta Robotics Institute Shanghai Jiao Tong University State Key Laboratory of Mechanical System and Vibration Shanghai200240 China Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Hong Kong Hong Kong
Communicating information to users is a crucial aspect of human-machine interaction. Vibrotactile feedback encodes information into spatiotemporal vibrations, enabling users to perceive tactile sensations. It offers a... 详细信息
来源: 评论
Age of information Analysis for CR-NOMA Aided Uplink systems with Randomly Arrived Packets
收藏 引用
IEEE Transactions on Communications 2024年
作者: Sun, Yanshi Ye, Yanglin Ding, Zhiguo Zhou, Momiao Liu, Lei Hefei University of Technology School of Computer Science and Information Engineering Hefei230009 China Khalifa University Department of Computer and Information Engineering Abu Dhabi United Arab Emirates Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China
This paper studies the application of cognitive radio inspired non-orthogonal multiple access (CR-NOMA) to reduce age of information (AoI) for uplink transmission. In particular, a time division multiple access (TDMA)... 详细信息
来源: 评论