咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是531-540 订阅
排序:
GraphEye: A Novel Solution for Detecting Vulnerable Functions Based on Graph Attention Network
arXiv
收藏 引用
arXiv 2022年
作者: Zhou, Li Li, Yujun Li, Jin Huang, Minhuan Nie, Yuanping Liu, Yiwei School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China National Key Laboratory of Science and Technology on Information System Security Chengdu China National Key Laboratory of Science and Technology on Information System Security Beijing China
With the continuous extension of the Industrial Internet, cyber incidents caused by software vulnerabilities have been increasing in recent years. However, software vulnerabilities detection is still heavily relying o... 详细信息
来源: 评论
Spiderweb Protector: Biomimetic Defense Against Targeted Attacks on Graph Neural Networks
Spiderweb Protector: Biomimetic Defense Against Targeted Att...
收藏 引用
International Conference on Wavelet Active Media technology and information Processing (ICWAMTIP)
作者: Zeyu Zhou Yuanyuan Huang Yongli Wang Siyu Li Jiazhong Lu Peilin He Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Technology Chengdu China Dazhou key Laboratory of Government data security Dazhou China Department of Informatics and Networked Systems University of Pittsburgh Pittsburgh United States
Graph Neural Networks (GNNs) have emerged as powerful tools across diverse applications, including social networks, bioinformatics, and recommendation systems. However, their susceptibility to adversarial attacks, par... 详细信息
来源: 评论
AI-Enabled Multimedia Semantic Communications
收藏 引用
IEEE Communications Magazine 2025年 第6期63卷 66-73页
作者: Li, Chenxing Duan, Yiping Wang, Liejun Tao, Xiaoming Tsinghua University Department of Electronic Engineering China State Key Laboratory of Space Network China Beijing National Research Center for Information Science and Technology China School of Computer Science and Technology Xinjiang University China
With increasing demand for mobile communication and the development of artificial intelligence, the development of the sixth-generation mobile communication network (6G) will be oriented toward more intelligent and mu... 详细信息
来源: 评论
GraphEye: A Novel Solution for Detecting Vulnerable Functions Based on Graph Attention Network  6
GraphEye: A Novel Solution for Detecting Vulnerable Function...
收藏 引用
6th IEEE International Conference on Data science in Cyberspace, DSC 2021
作者: Zhou, Li Huang, Minhuan Li, Yujun Nie, Yuanping Li, Jin Liu, Yiwei School Of Information And Communication Engineering University Of Electronic Science And Technology Of China Chengdu China National Key Laboratory Of Science And Technology On Information System Security Beijing China School Of Computer Science And Engineering University Of Electronic Science And Technology Of China Chengdu China
With the continuous extension of the Industrial Internet, cyber incidents caused by software vulnerabilities have been increasing in recent years. However, software vulnerabilities detection is still heavily relying o... 详细信息
来源: 评论
Imaging flow cytometry with a real-time throughput beyond 1,000,000 events per second
收藏 引用
Light(science & Applications) 2025年 第4期14卷 931-947页
作者: Jiehua Zhou Liye Mei Mingjie Yu Xiao Ma Dan Hou Zhuo Yin Xun Liu Yan Ding Kaining Yang Ruidong Xiao Xiandan Yuan Yueyun Weng Mengping Long Taobo Hu Jinxuan Hou Yu Xu Liang Tao Sisi Mei Hui Shen Yaxiaer Yalikun Fuling Zhou Liang Wang Du Wang Sheng Liu Cheng Lei The Institute of Technological Sciences Wuhan UniversityWuhan 430072China School of Computer Science Hubei University of TechnologyWuhan 430068China Division of Materials Science Nara Institute of Science and TechnologyTakayama-cho 8916-5Japan School of Science Hubei University of TechnologyWuhan 430068China Department of Pathology Peking University Cancer HospitalBeijing 100142China Department of Breast Surgery Peking University People’s HospitalBeijing 100044China Department of Thyroid and Breast Surgery Zhongnan HospitalWuhan UniversityWuhan 430071China Department of Radiation and Medical Oncology Zhongnan HospitalWuhan UniversityWuhan 430071China People’s Hospital of Anshun City Guizhou Province Anshun 561000China Department of Hematology Zhongnan HospitalWuhan UniversityWuhan 430071China National Engineering Laboratory for Next Generation Internet Access System School of Optics and Electronic InformationHuazhong University of Science and TechnologyWuhan 430074China Suzhou Institute of Wuhan University Suzhou 215000China Shenzhen Institute of Wuhan University Shenzhen 518057China
Imaging flow cytometry(IFC)combines the imaging capabilities of microscopy with the high throughput of flow cytometry,offering a promising solution for high-precision and high-throughput cell analysis in fields such a... 详细信息
来源: 评论
Privacy-Preserving IoT Image Transmission: Multi-Stage SVD Data Embedding and Heatmap Alignment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Du, Kaixin Ma, Bin Yang, Meihong Wang, Xiaoyu Li, Xiaolong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250101 China Beijing Jiaotong University School of Computer and Information Technology Beijing100044 China
The images transmitted by IoT devices, particularly those used for surveillance or sensor data, are vulnerable to malicious screenshots and unauthorized access, leading to potential privacy breaches. To address this, ... 详细信息
来源: 评论
Atomic Smart Contract Interoperability with High Efficiency via Cross-Chain Integrated Execution
arXiv
收藏 引用
arXiv 2025年
作者: Yin, Chaoyue Li, Mingzhe Zhang, Jin Lin, You Wei, Qingsong Goh, Siow Mong Rick Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China Singapore
With the development of Ethereum, numerous blockchains compatible with Ethereum’s execution environment (i.e., Ethereum Virtual Machine, EVM) have emerged. Developers can leverage smart contracts to run various compl... 详细信息
来源: 评论
DenseSplat: Densifying Gaussian Splatting SLAM with Neural Radiance Prior
arXiv
收藏 引用
arXiv 2025年
作者: Li, Mingrui Liu, Shuhong Deng, Tianchen Wang, Hongyu the Department of Computer Science Dalian University of Technology Dalian China the Department of Mechano-informatics Information Science and Technology The University of Tokyo Tokyo Japan Institute of Medical Robotics Department of Automation Shanghai Jiao Tong University Key Laboratory of System Control and Information Processing Ministry of Education China
Gaussian SLAM systems excel in real-time rendering and fine-grained reconstruction compared to NeRF-based systems. However, their reliance on extensive keyframes is impractical for deployment in real-world robotic sys... 详细信息
来源: 评论
Highly Secure Self-homodyne Coherent system Empowered by Quantum Noise Stream Cipher
Highly Secure Self-homodyne Coherent System Empowered by Qua...
收藏 引用
2024 Asia Communications and Photonics Conference, ACP 2024 and International Conference on information Photonics and Optical Communications, IPOC 2024
作者: Du, Haoze Lei, Chao He, Zonglong Zhang, Mingming Lin, Rui Yang, Chen Zhao, Zhiyong Tang, Ming Department of Electrical Engineering Chalmers University of Technology Göteborg41380 Sweden School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan430074 China Department of Microtechnology and Nanoscience Chalmers University of Technology Göteborg41380 Sweden National Engineering Laboratory for Next Generation Internet Access System School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan China State Key Laboratory of Optical Fiber and Cable Manufacture Technology Yangtze Optical Fibre and Cable Joint Stock Limited Company Wuhan430080 China
200Gb/s per spatial channel quantum noise stream cipher (QNSC) is experimentally demonstrated in 3km self-homodyne coherent (SHC) transmission system. A security level of (32761)^20 is obtained with 3dB penalty. ©... 详细信息
来源: 评论
Virtual-Source and Virtual-Swarm-Based Particle Swarm Optimizer for Large-Scale Multi-Source Location via Robot Swarm
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 1-1页
作者: Zhang, JunQi Lin, YuXuan Zhou, MengChu Department of Computer Science and Technology the Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai Electronic Transactions and Information Service Collaborative Innovation Center Tongji University Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
Multi-source location is a significant application in the field of robot swarm and is required to find all sources whose number and distribution are unknown in advance. With few parameters and fast search, Particle Sw... 详细信息
来源: 评论