咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是601-610 订阅
排序:
Specifications of Virtual Reminder system using Z
Specifications of Virtual Reminder System using Z
收藏 引用
International Conference on Emerging Technologies, ICET
作者: J aviria Naveed Irfan Ahmed Jabar Mahmood Khadija Batool Department of Computer Sciences University of Sialkot Sialkot Pakistan State Key Laboratory of Blockchain and Data Security School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Hangzhou China
Formal Methods (FM) uses mathematical notations to precisely and accurately define specifications, which helps detect errors and inconsistencies in software development. For mathematical notations, a proper mathematic... 详细信息
来源: 评论
AI-aided power electronic converters automatic online real-time efficiency optimization method
收藏 引用
Fundamental Research 2025年 第3期5卷 1111-1116页
作者: Tang, Yuanhong Cao, Di Xiao, Jian Jiang, Chenying Huang, Qi Li, Yunwei Chen, Zhe Blaabjerg, Frede Hu, Weihao Power System Wide-area Measurement and Control Sichuan Provincial Key Laboratory School of Mechanical and Electrical Engineering University of Electronic Science and Technology of China Chengdu 611731 China MORNSUN Guangzhou Science & Technology Co. Ltd. Guangzhou 510663 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu 611731 China Yangtze Delta Region Institute (Quzhou) University of Electronic Science and Technology of China Quzhou 324000 China Department of Chengdu State Grid Corporation of China Chengdu 610599 China Southwest University of Science and Technology Mianyang 621010 China Department of Electrical and Computer Engineering University of Alberta Edmonton AB T6G 2V4 Canada Department of Energy Technology Aalborg University Aalborg 9220 Denmark
Energy losses during the conversion and supply of electric power are considered a significant issue and cannot be estimated. Improvement in the efficiency of energy conversion systems is highly restricted because of t... 详细信息
来源: 评论
Generating Highly Structured Inputs: A Survey  6
Generating Highly Structured Inputs: A Survey
收藏 引用
6th IEEE International Conference on Data science in Cyberspace, DSC 2021
作者: Li, Yabin Qin, Yinfan Tian, Jianwen Gu, Taotao Nie, Yuanping Kuang, Xiaohui School Of Computer Science Beijing University Of Posts And Telecommunications Beijing China Institute Of System Engineering Academy Of Military Sciences Beijing China National Key Laboratory Of Science And Technology On Information System Security Beijing China
Fuzzing is currently one of the most popular vulnerability mining technology. The test case generation technique plays a key role in fuzzing, and the quality of the generated test cases directly affects the effect of ... 详细信息
来源: 评论
A Multimodal Medical Image Fusion Method Incorporating an Adaptive Attention Mechanism
A Multimodal Medical Image Fusion Method Incorporating an Ad...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yingxian Zhang Yushui Geng Hu Liang Hai Zhong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Graduate School Qilu University of Technology (Shandong Academy of Sciences) Jinan China Department of Radiology The Second Hospital of Shandong University Jinan China
Multimodal medical image fusion technology provides more comprehensive and accurate image support for clinical diagnosis and treatment by integrating complementary information from different imaging modalities. Aiming... 详细信息
来源: 评论
DapperFL: domain adaptive federated learning with model fusion pruning for edge devices  24
DapperFL: domain adaptive federated learning with model fusi...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing systems
作者: Yongzhe Jia Xuyun Zhang Hongsheng Hu Kim-Kwang Raymond Choo Lianyong Qi Xiaolong Xu Amin Beheshti Wanchun Dou State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China School of Computing Macquarie University Australia School of Information and Physical Sciences University of Newcastle Australia Department of Information Systems and Cyber Security University of Texas at San Antonio USA College of Computer Science and Technology China University of Petroleum (East China) China School of Computer and Software Nanjing University of Information Science and Technology China
Federated learning (FL) has emerged as a prominent machine learning paradigm in edge computing environments, enabling edge devices to collaboratively optimize a global model without sharing their private data. However...
来源: 评论
Federated Online/Offline Remote Data Inspection for Distributed Edge Computing
arXiv
收藏 引用
arXiv 2023年
作者: Ali, Mohammad Liu, Ximeng The Department of Mathematics and Computer Science Amirkabir University of Technology Tehran Iran The Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou350108 China
In edge computing environments, app vendors can cache their data to be shared with their users in many geographically distributed edge servers. However, the cached data is particularly vulnerable to several intentiona... 详细信息
来源: 评论
A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective
arXiv
收藏 引用
arXiv 2023年
作者: Seyedi, Zahra Rahmati, Farhad Ali, Mohammad Liu, Ximeng Department of Mathematics and Computer Science Amirkabir University of Technology Tehran Iran Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou350108 China
Edge storage presents a viable data storage alternative for application vendors (AV), offering benefits such as reduced bandwidth overhead and latency compared to cloud storage. However, data cached in edge computing ... 详细信息
来源: 评论
Reduced-Complexity CRB Optimization for Dual-Function Radar-Communication systems using Hybrid Linear-Nonlinear Precoding
收藏 引用
IEEE Transactions on Signal Processing 2025年 73卷 2123-2138页
作者: Wen, Cai Chen, Yating Huang, Yan Davidson, Timothy N. Northwest University School of Information Science and Technology Xi’an China Southeast University State Key Laboratory of Millimeter Waves School of Information Science and Engineering Nanjing China McMaster University Department of Electrical and Computer Engineering Hamilton Canada
This paper proposes a waveform design technique for dual-function radar-communication (DFRC) systems that employ hybrid linear-nonlinear precoding (HLNP). The HLNP signal is a superposition of linear precoding of the ... 详细信息
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable systems and Networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs
收藏 引用
Frontiers of computer science 2023年 第6期17卷 167-169页
作者: Ding BAO Wei REN Yuexin XIANG Weimao LIU Tianqing ZHU Yi REN Kim-Kwang Raymond CHOO School of Computer Science China University of GeosciencesWuhan 430074China Hubei Key Laboratory of Intelligent Geo-Information Processing Wuhan 430074China NSFOCUS Technologies Group Co. Ltd.Beijing 100089China School of Computing Sciences University of East AngliaNorwich NR47TJUK Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX 78249-0631USA
1 Introduction A Bitcoin ledger comprises a sizable number of transaction records,which can be utilized to make it easier to track and analyze the traits and patterns of cryptocurrency-related *** facilitate the visua... 详细信息
来源: 评论