咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是571-580 订阅
排序:
A Study on Semi-Supervised Semantic Segmentation of Ship Flame Images
A Study on Semi-Supervised Semantic Segmentation of Ship Fla...
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Junwei Wan Yaojie Chen XueCong Zheng Department of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China
In addressing the challenges of limited semantic labeling data and imprecise segmentation regions prevalent in the semantic segmentation of ship flame images, this study introduces a semi-supervised semantic segmentat...
来源: 评论
OmniMark: Efficient and Scalable Latent Diffusion Model Fingerprinting  39
OmniMark: Efficient and Scalable Latent Diffusion Model Fing...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Fei, Jianwei Dai, Yunshu Xia, Zhihua Huang, Fangjun Zhou, Jiantao State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China School of Cyber Science and Technology Sun Yat-Sen University China College of Cyberspace Security Jinan University China
We introduce OmniMark, a novel and efficient fingerprinting method for Latent Diffusion Models (LDM). OmniMark can encode user-specific fingerprints across diverse dimensions of the weights of the LDM, including kerne...
来源: 评论
Ethereum smart contract security research:survey and future research opportunities
收藏 引用
Frontiers of computer science 2021年 第2期15卷 143-160页
作者: Zeli WANG Hai JIN Weiqi DAI Kim-Kwang Raymond CHOO Deqing ZOU National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabClusters and Grid Computing LabHubei Engineering Research Center on Big Data SecurityWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Blockchain has recently emerged as a research trend,with potential applications in a broad range of industries and *** particular successful Blockchain technology is smart contract,which is widely used in commercial s... 详细信息
来源: 评论
Efficient Routing Protection Algorithm Based on Optimized Network Topology
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4525-4540页
作者: Haijun Geng Zikun Jin Jiangyuan Yao Han Zhang Zhiguo Hu Bo Yang Yingije Guo Wei Wang Qidong Zhang Guoao Duan School of Computer and Information Technology Shanxi UniversityShanxi030006China School of Automation and Software Engineering Shanxi UniversityShanxi030006China School of Computer Science and Technology Hainan UniversityHaikou570228China Department of Computer Science&Technology Tsinghua UniversityBeijing100084China Department of Urban&Regional Planning San JoséState University San JoséCA95192USA Key Laboratory of Embedded System and Service Computing(Tongji University) Ministry of EducationShanghai201804China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of ChinaChengdu610054China Beijinng University of Technology Beijing-Dublin International CollegeBeijing University of TechnologyBeijing100124China
Network failures are unavoidable and occur *** the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence *** this period,a large number of messages are discarded,whi... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Discrete Jaya algorithm to solve the police resource deployment problem in emergency traffic accident  10
Discrete Jaya algorithm to solve the police resource deploym...
收藏 引用
10th IEEE Joint International information technology and Artificial Intelligence Conference, ITAIC 2022
作者: Jing, Zhang Weijie, Ding Zhejiang Police College Department of Computer and Information Security Hangzhou310053 China Big-data and Network Security Research Institute Zhejiang Police College Hangzhou310053 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China
Aiming at the high frequency of urban traffic accidents and the relative shortage of police resources, a multi-objective discrete Jaya algorithm is proposed to solve the problem of police resource deployment in emerge... 详细信息
来源: 评论
Using Lock-Free Design for Throughput-Optimized Cache Eviction  25
Using Lock-Free Design for Throughput-Optimized Cache Evicti...
收藏 引用
Abstracts of the 2025 ACM SIGMETRICS International Conference on Measurement and Modeling of computer systems
作者: Chao Dong Fang Wang Hong Jiang Dan Feng Key Laboratory of Information Storage System (Wuhan National Laboratory for Optoelectronics) Engineering Research Center of data storage systems and Technology (School of Computer Science and Technology) Ministry of Education of China Huazhong University of Science and Techonolgy Wuhan Hubei China Department of Computer Science and Engineering University of Texas at Arlington Arlington Texas USA
This paper presents a practical approach to cache eviction algorithm design, called Mobius, that optimizes the concurrent throughput of caches and reduces cache operation latency by utilizing lock-free data structures... 详细信息
来源: 评论
Multi-Server Verifiable Aggregation for Federated Learning in Securing Industrial IoT
Multi-Server Verifiable Aggregation for Federated Learning i...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Liutao Zhao Haoran Xie Lin Zhong Yujue Wang Beijing Academy of Science and Technology Beijing Computing Center Co. Ltd Beijing China School of Computer Science and Information Security Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Hangzhou Innovation Institute of Beihang University Hangzhou China
The paper introduces a novel approach to address secure aggregation in federated learning, utilizing a multi-server model. This demonstrably secure system effectively mitigates the issues of server loss and single poi... 详细信息
来源: 评论
LIAS: A Lightweight Incentive Authentication Scheme for Forensic Services in IoV
LIAS: A Lightweight Incentive Authentication Scheme for Fore...
收藏 引用
作者: Zhang, Mingyue Zhou, Junlong Cong, Peijin Zhang, Gongxuan Zhuo, Cheng Hu, Shiyan Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China Institute of Computing Technology Chinese Academy of Sciences State Key Laboratory of Computer Architecture Beijing100190 China Zhejiang University Department of Information Science and Electronic Engineering Hangzhou310027 China University of Southampton School of Electronics and Computer Science SouthamptonSO17 1BJ United Kingdom
Internet of Vehicles (IoV) has become an indispensable data sensing and processing platform in Internet of Things (IoT) for intelligent transportation. The mounted cameras on the vehicles along with the fixed roadside... 详细信息
来源: 评论
Differential Cryptanalysis of Round-Reduced SPEEDY Family  18th
Differential Cryptanalysis of Round-Reduced SPEEDY Family
收藏 引用
18th International Conference on information security and Cryptology, Inscrypt 2022
作者: Yu, Qingyuan Jia, Keting Zou, Guangnan Zhang, Guoyan School of Cyber Science and Technology Shandong University Shandong Qingdao266237 China Institute for Network Sciences and Cyberspace BNRist Tsinghua University Beijing10084 China Department of Computer Sciences and Technology Tsinghua University Beijing10084 China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Shandong Qingdao266237 China Zhongguancun Laboratory Beijing China Shandong Institute of Blockchain Shandong Jinan China
SPEEDY is a family of ultra low latency block ciphers proposed at TCHES 2021 by Leander et al. The standard version, SPEEDY-6-192 offers 128-bit security with high encryption speed in hardware. Differential cryptanaly... 详细信息
来源: 评论