咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是561-570 订阅
排序:
Tail Classes Matter: Long-Tailed Object Detection Revisited
Tail Classes Matter: Long-Tailed Object Detection Revisited
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yinglu Zhang Chenbo Zhang Lu Zhang Tianying Liu Jihong Guan Xinkai Liang Jiajia Zhao Shuigeng Zhou Shanghai Key Lab of Intelligent Information Processing and School of Computer Science Fudan University China Department of Computer Science & Technology Tongji University China Science and Technology on Complex System Conroland InelligentAgent Cooperation Laboratory Beijing Electro-Mechanical Engineering Institute China
Real-world data ubiquitously exhibit long-tailed distribution, which sparks the increasing interest in long-tailed object detection (LTOD). However, existing methods neglect that a lack of diverse data in tail classes...
来源: 评论
Unsupervised Multivariate Time Series Anomaly Detection by Feature Decoupling in Federated Learning Scenarios
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: He, Yifan Ding, Xi Tang, Yateng Guan, Jihong Zhou, Shuigeng Fudan University School of Computer Science Shanghai200433 China Shanghai Key Laboratory of Intelligent Information Processing Shanghai200433 China Tencent Weixin Group Guangzhou510308 China Tongji University Department of Computer Science and Technology Shanghai201804 China Ministry of Education Key Laboratory of Embedded System and Service Computing Tongji University Shanghai200092 China
Anomalies are usually regarded as data errors or novel patterns previously unseen, which are quite different from most observed data. Accurate detection of anomalies is crucial in various application scenarios. This p... 详细信息
来源: 评论
UAV-RIS-Aided Energy-Efficient and QoS-Aware Emergency Communications Based on DRL  100
UAV-RIS-Aided Energy-Efficient and QoS-Aware Emergency Commu...
收藏 引用
100th IEEE Vehicular technology Conference, VTC 2024-Fall
作者: Hu, Jiawei Ju, Ying Wang, Haoyu Liu, Lei Pei, Qingqi Shee, Y.G. Zhu, Xiaojie Wu, Celimuge University of California Department of Electrical Engineering and Computer Science IrvineCA92697 United States Xidian University Guangzhou Institute of Technology Guangzhou510555 China Xi'an University of Posts Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Universiti Tunku Abdul Rahman Department of Electrical and Electronic Engineering Kajang43000 Malaysia King Abdullah University of Science and Technology Department of Computer Electrical and Mathematical Sciences and Engineering Thuwal239556900 Saudi Arabia The University of Electro-Communications Graduate School of Informatics and Engineering Tokyo182-8585 Japan
Ensuring reliable communication can be incredibly challenging in emergencies due to the breakdown of conventional infrastructure. However, a promising solution is on the horizon: the integration of reconfigurable inte... 详细信息
来源: 评论
S2KAN-SLAM: Elastic Neural LiDAR SLAM with SDF Submaps and Kolmogorov-Arnold Networks
收藏 引用
IEEE Transactions on Circuits and systems for Video technology 2025年
作者: Wang, Zhong Zhang, Lin Wang, Hesheng Shanghai Jiao Tong University State Key Laboratory of Avionics Integration and Aviation System-of-Systems Synthesis Department of Automation Key Laboratory of System Control and Information Processing of Ministry of Education Shanghai200240 China Tongji University School of Computer Science and Technology National Pilot Software Engineering School with Chinese Characteristics Shanghai201804 China
Traditional LiDAR SLAM approaches prioritize localization over mapping, yet high-precision dense maps are essential for numerous applications involving intelligent agents. Recent advancements have introduced methods l... 详细信息
来源: 评论
DEPA: Determining Exploit Primitives Automatically for Interactive Programs  22
DEPA: Determining Exploit Primitives Automatically for Inter...
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic information technology and computer Engineering
作者: Jie Liu Hang An Jin Li Hongliang Liang School of Computer Science Beijing University of Posts and Telecommunications China Codesafe Team of Legendsec Qi45anxin Group China Nation Key Laboratory of Science and Technology on Information System Security China
Automated Exploit Generation (AEG) is a well-known difficult task, especially for heap vulnerabilities. The premise of this task is the determination of exploit primitives, and prior research efforts for exploit primi... 详细信息
来源: 评论
Age-Energy Trade-off in Status Update system with Wake-up Control
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Jiajie Gong, Jie Guangdong Key Laboratory of Information Security Technology School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China
In the status update system, the freshness of information is drawing more and more attention. To measure the freshness of the data, age-of-synchronization (AoS) is introduced. Since many communication devices are ener... 详细信息
来源: 评论
Cloud Data Deduplication Scheme Based on Blockchain
Cloud Data Deduplication Scheme Based on Blockchain
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Pengliang Shi Dongning Hao Key Laboratory on High Trusted Information System Cyber security and computer science Hebei university Baoding China International College of Hebei university Baoding China
To address the problem of untrustworthiness among entities faced in the process of data deduplication in cloud storage environment, this paper proposes a cloud data deduplication scheme based on blockchain. Firstly, t...
来源: 评论
Robust peer-to-peer learning via secure multi-party computation
收藏 引用
Journal of information and Intelligence 2023年 第4期1卷 341-351页
作者: Yongkang Luo Wenjian Luo Ruizhuo Zhang Hongwei Zhang Yuhui Shi Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and TechnologyHarbin Institute of TechnologyShenzhen 518055China Peng Cheng Laboratory Shenzhen 518055China Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China
To solve the data island problem,federated learning(FL)provides a solution paradigm where each client sends the model parameters but not the data to a server for model ***-to-peer(P2P)federated learning further improv... 详细信息
来源: 评论
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
arXiv
收藏 引用
arXiv 2023年
作者: Jia, Zian Xiong, Yun Nan, Yuhong Zhang, Yao Zhao, Jinjing Wen, Mi Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China School of Software Engineering Sun Yat-sen University China National Key Laboratory of Science and Technology on Information System Security China Shanghai University of Electric Power China
Advance Persistent Threats (APTs), adopted by most delicate attackers, are becoming increasing common and pose great threat to various enterprises and institutions. Data provenance analysis on provenance graphs has em... 详细信息
来源: 评论
Prior Knowledge-Driven Hybrid Prompter Learning for RGB-Event Tracking
收藏 引用
IEEE Transactions on Circuits and systems for Video technology 2025年
作者: Wang, Mianzhao Shi, Fan Cheng, Xu Chen, Shengyong Tianjin University of Technology Engineering Research Center of Learning-Based Intelligent System Ministry of Education Key Laboratory of Computer Vision and System School of Computer Science and Engineering Tianjin300384 China Technical University of Denmark Department of Technology Management and Economics Kongens Lyngby Denmark
Event data can asynchronously capture variations in light intensity, thereby implicitly providing valuable complementary cues for RGB-Event tracking. Existing methods typically employ a direct interaction mechanism to... 详细信息
来源: 评论