咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是521-530 订阅
排序:
A Continuous Verification Mechanism for Clients in Federated Unlearning to Defend the Right to be Forgotten
A Continuous Verification Mechanism for Clients in Federated...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Shanshan Chen Jun Liu Yuying Li Yamin Li Yang Yang Gaoyang Liu Chen Wang Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China School of Computer Science and Information Engineering Hubei University Wuhan China Huazhong University of Science and Technology Wuhan China
In Federated Learning (FL), the regulatory need for the "right to be forgotten" requires efficient Federated Unlearning (FU) methods, which enable FL models to unlearn appointed training data. Associating wi... 详细信息
来源: 评论
A Blockchain-Assisted key Generation Electric Health Records Sharing Scheme  8th
A Blockchain-Assisted Key Generation Electric Health Records...
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Zhang, Qiao Chen, Xiubo Ahmad, Haseeb Xu, Gang Yang, Yixian Guizhou Provincial Key Laboratory of Public Big Data GuiZhou University Guiyang Guizhou550025 China State Key Laboratory of Networking and Switching Technology Information Security Center Beijing University of Posts and Telecommunications Beijing100876 China Department of Computer Science National Textile University Faisalabad37610 Pakistan School of Information Science and Technology North China University of Technology Beijing100144 China
Electronic health records (EHRs) contain a large amount of private data of patients. Once these data are compromised during the process of sharing, it may threaten the patients’ privacy. In this paper, a novel blockc... 详细信息
来源: 评论
A Blockchain-Based IoT Data Secure Vickery Auction system  8th
A Blockchain-Based IoT Data Secure Vickery Auction System
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Wang, Haohui Chen, Xiubo Ahmad, Haseeb Xu, Gang Yang, Yixian Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Guizhou Guiyang550025 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China Department of Computer Science National Textile University Faisalabad37610 Pakistan School of Information Science and Technology North China University of Technology Beijing100144 China
Traditional centralized architectures for IoT data suffer from single points of failure in terms of data storage and access control, and IoT data does not fully realize its value as a digital asset. In response to the... 详细信息
来源: 评论
A fully-customized dataflow engine for 3D earthquake simulation with a complex topography
收藏 引用
science China(information sciences) 2022年 第5期65卷 65-80页
作者: Bingwei CHEN Haohuan FU Wayne LUK Guangwen YANG Department of Computer Science and Technology Beijing National Research Center for Information Science and Technology Tsinghua University National Supercomputer Center in Wuxi Ministry of Education Key Laboratory for Earth System Modeling Department of Earth System ScienceTsinghua University Department of Computing Imperial College London
With HPC(high performance computing) evolving into the exascale era, improvements in computing performance and power efficiency have become increasingly more important. Based on our previous work on enabling earthquak... 详细信息
来源: 评论
Optimizing Peak Age of information in Mobile Edge Computing
Optimizing Peak Age of Information in Mobile Edge Computing
收藏 引用
International Teletraffic Congress, ITC
作者: Jianhang Zhu Jie Gong Guangdong Key Laboratory of Information Security Technology School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
Recently, information freshness in real-time monitoring systems has received increasing attention. Age of information (AoI) has emerged as a metric for measuring the information freshness. In many applications, the in... 详细信息
来源: 评论
Few-Shot Camouflaged Object Segmentation
Few-Shot Camouflaged Object Segmentation
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Ziqiu Wang Yuying Li Yang Yang Yamin Li Gaoyang Liu Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China School of Computer Science and Information Engineering Hubei University Wuhan China Huazhong University of Science and Technology Wuhan China
In the domain of computer vision, Camouflaged Object Segmentation (COS) is a crucial task aimed at identifying objects that blend into their surroundings, with applications spanning diverse sectors such as military, m... 详细信息
来源: 评论
Cancelable Speaker Identification system Based on Optical-Like Encryption Algorithms
收藏 引用
computer systems science & Engineering 2022年 第10期43卷 87-102页
作者: Safaa El-Gazar Walid El-Shafai Ghada El-Banby Hesham F.A.Hamed Gerges M.Salama Mohammed Abd-Elnaby Fathi E.Abd El-Samie Department of Electrical Engineering Faculty of EngineeringEgyptian-Russian UniversityCairoEgypt Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Department of Industrial Electronics and Control Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last *** achieves safe access to systems using biometrics instead of the traditional *** utilization of a biometric in it... 详细信息
来源: 评论
DarkSAM: fooling segment anything model to segment nothing  24
DarkSAM: fooling segment anything model to segment nothing
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing systems
作者: Ziqi Zhou Yufei Song Minghui Li Shengshan Hu Xianlong Wang Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Speed Master: Quick or Slow Play to Attack Speaker Recognition  39
Speed Master: Quick or Slow Play to Attack Speaker Recogniti...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Ye, Zhe Zhang, Wenjie Ren, Ying Kang, Xiangui Yan, Diqun Ma, Bin Wang, Shiqi Guangdong Key Lab of Information Security School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China Department of Computer Science City University of Hong Kong Hong Kong
Backdoor attacks pose a significant threat during the model’s training phase. Attackers craft pre-defined triggers to break deep neural networks, ensuring the model accurately classifies clean samples during inferenc... 详细信息
来源: 评论
Elastic Collision Based-Interactive Path Planning system for Vascular Intervention Robots
Elastic Collision Based-Interactive Path Planning System for...
收藏 引用
International Conference on Biomimetic Intelligence and Robotics & Medical Robotics Forum, ICBIR+MRF 2024
作者: Cao, Sheng Guo, Shuxiang Guo, Jian Wang, Jian Wang, Bin Ding, Mingchao Aerospace Center Hospital The Key Laboratory of Convergence Medical Engineering System and Healthcare Technology School of Life Science Ministry of Industry and Information Technology Beijing Institute of Technology Beijing100081 China Shenzhen Institute of Advanced Biomedical Robot Company Limited Guangdong Province Shenzhen518000 China Department of Electronic and Electrical Engineering Southern University of Science and Technology Guangdong Shenzhen518055 China
As population aging intensifies, the incidence of cardiovascular and cerebrovascular diseases has continued to rise. Vascular interventional surgery, known for its minimal trauma, rapid recovery, and clear effectivene... 详细信息
来源: 评论