咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是551-560 订阅
排序:
BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs
收藏 引用
Frontiers of computer science 2023年 第6期17卷 167-169页
作者: Ding BAO Wei REN Yuexin XIANG Weimao LIU Tianqing ZHU Yi REN Kim-Kwang Raymond CHOO School of Computer Science China University of GeosciencesWuhan 430074China Hubei Key Laboratory of Intelligent Geo-Information Processing Wuhan 430074China NSFOCUS Technologies Group Co. Ltd.Beijing 100089China School of Computing Sciences University of East AngliaNorwich NR47TJUK Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX 78249-0631USA
1 Introduction A Bitcoin ledger comprises a sizable number of transaction records,which can be utilized to make it easier to track and analyze the traits and patterns of cryptocurrency-related *** facilitate the visua... 详细信息
来源: 评论
Privacy-Preserving Interactive Semantic Codec Training for IoT-Based Holographic Counterparts
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Xu, Jinpeng Chen, Liang Lin, Limei Wang, Xiaoding Huang, Yanze Xu, Li Piran, Md. Jalil Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of
The use of IoT-based semantic codecs to process complex contextual semantic information in holographic counterparts introduces significant privacy risks, as it may expose sensitive data, thereby increasing the likelih... 详细信息
来源: 评论
TGNN: A GNN-Based Method with Multi-entity Node for Personal Banking Time Prediction  5th
TGNN: A GNN-Based Method with Multi-entity Node for Person...
收藏 引用
5th China Conference on Intelligent Networked Things, CINT 2022
作者: Mo, Zhikang Shao, Qixiang Wu, Likang Yu, Runlong Liu, Qi Xu, Jiexin Song, Hongmei Chen, Enhong Anhui Province Key Laboratory of Big Data Analysis and Application State Key Laboratory of Cognitive Intelligence School of Computer Science and Techonology University of Science and Technology of China Hefei China Department of Information Technology China Merchant Bank Shenzhen China
The offline business of banks is deeply involved in bank clients’ financial lives and directly affects the satisfaction of clients. For offline banking scenarios, accurate prediction of clients’ banking time is esse... 详细信息
来源: 评论
Graph Sampling based Fairness-aware Recommendation over Sensitive Attribute Removal
Graph Sampling based Fairness-aware Recommendation over Sens...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Shenghao Liu Guoyang Wu Xianjun Deng Hongwei Lu Bang Wang Laurence Yang James J. Park Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Smart Internet Technology School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea
Discrimination against different user groups has received growing attention in the recommendation field. To address this problem, existing works typically remove sensitive attributes that may cause discrimination thro...
来源: 评论
Industrial Control Protocol Type Inference Using Transformer and Rule-based Re-Clustering
Industrial Control Protocol Type Inference Using Transformer...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Yuhuan Liu Yulong Ding Jie Jiang Bin Xiao Shuang-Hua Yang Department of Computing The Hong Kong Polytechnic University Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet College of Information Science and Engineering China University of Petroleum-Beijing Department of Computer Science University of Reading
The development of the Industrial Internet of Things (IIoT) is impeded by the lack of unknown protocol specifications. Protocol Reverse Engineering (PRE) plays a crucial role in inferring unpublished protocol specific... 详细信息
来源: 评论
TrafPS: A Shapley-based Visual Analytics Approach to Interpret Traffic
arXiv
收藏 引用
arXiv 2024年
作者: Feng, Zezheng Jiang, Yifan Wang, Hongjun Fan, Zipei Ma, Yuxin Yang, Shuang-Hua Qu, Huamin Song, Xuan Department of Computer Science and Engineering Southern University of Science and Technology China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Department of Computer Science University of Reading United Kingdom Center for Spatial Information Science The University of Tokyo Japan Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Southern University of Science and Technology China
Recent achievements in deep learning (DL) have shown its potential for predicting traffic flows. Such predictions are beneficial for understanding the situation and making decisions in traffic control. However, most s... 详细信息
来源: 评论
Evolution of AVS video coding standards: twenty years of innovation and development
收藏 引用
science China(information sciences) 2022年 第9期65卷 50-73页
作者: Siwei MA Li ZHANG Shiqi WANG Chuanmin JIA Shanshe WANG Tiejun HUANG Feng WU Wen GAO Institute of Digital Media School of Computer Science Peking University Bytedance Inc. Department of Computer Science City University of Hong Kong CAS Key Laboratory of Technology in Geo-Spatial Information Processing and Application System University of Science and Technology of China
Ever since the founding of the Audio and Video Coding Standard(AVS) Workgroup of China in 2002, it has been dedicated to advancing and innovating the digital audio-video industry with highly efficient and economical e... 详细信息
来源: 评论
Tissue P systems with Look-Ahead Mode
收藏 引用
Chinese Journal of Electronics 2025年 第1期23卷 81-86页
作者: Yun Jiang Tao Song Zheng Zhang School of Computer Science and Information Engineering Chongqing Technology and Business University Chongqing China Department of Control Science and Engineering Image Processing and Intelligent Control Key Laboratory of Education Ministry of China Huazhong University of Science and Technology Wuhan China
Tissue P systems are a class of distributed and parallel computing models inspired from inter-cellular communication and cooperation between cells. In this work, a variant of tissue P system, named tissue P system wit... 详细信息
来源: 评论
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack Against Split Learning
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Xiaoyang Xu Mengda Yang Wenzhe Yi Ziang Li Juan Wang Hongxin Hu Yong Zhuang Yaxin Liu Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Department of Computer Science and Engineering University at Buffalo SUNY
Split Learning (SL) is a distributed learning framework renowned for its privacy-preserving features and minimal computational requirements. Previous research consistently highlights the potential privacy breaches in ... 详细信息
来源: 评论
Tensor Dynamic Fusion Based Modality-Imbalanced Multimodal Federated Learning in Mobile Edge Computing for Consumer Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Nie, Xin Yi, Lingzhi Yang, Laurence T. Deng, Xianjun Fan, Fulan Zhang, Hongtao Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei EngineeringResearch Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Zhongnan University of Economics and Law School of Information and Safety Engineering Wuhan430074 China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou China St. Francis Xavier University Department of Computer Science Antigonish Canada South-Central Minzu University School of Education Wuhan430074 China
Mobile edge computing extends the capabilities of computation and storage from the cloud to the edge, enabling local data storage and processing. This computing paradigm complements federated learning (FL), as it sati... 详细信息
来源: 评论