咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是611-620 订阅
排序:
Knowledge system,Ontology,and Knowledge Graph of the Deep-Time Digital Earth(DDE): Progress and Perspective
收藏 引用
Journal of Earth science 2023年 第5期34卷 1323-1327页
作者: Xiumian Hu Yiwei Xu Xiaogang Ma Yunqiang Zhu Chao Ma Chao Li Hairong Lü Xinbing Wang Chenghu Zhou Chengshan Wang School of Earth Sciences and Engineering Nanjing UniversityNanjing 210023China State Key Laboratory of Palaeobiology and Stratigraphy Nanjing Institute of Geology and Palaeontology and Center for Excellence in Life and PaleoenvironmentChinese Academy of SciencesNanjing 210008China Department of Computer Science University of IdahoMoscow ID 83844USA Institute of Geographical Science and Natural Resources Chinese Academy of SciencesBeijing 100101China State Key Laboratory of Oil and Gas Reservoir Geology and Exploitation&Institute of Sedimentary Geology&College of Computer Science and Cyber Security Chengdu University of TechnologyChengdu 610059China IUGS Deep-Time Digital Earth Research Center of Excellence Suzhou 215101China Department of Automation Tsinghua UniversityBeijing 100084China School of Electronic Information and Electrical EngineeringShanghai Jiao Tong UniversityShanghai 200240China State Key Laboratory of Biogeology and Environmental Geology China University of GeosciencesBeijing 100083China
THE USE OF KNOWLEDGE GRAPH IN NATURAL science Knowledge graph is a field of Artificial Intelligence(AI)that aims to represent knowledge in the form of graphs,consisting of nodes and edges which represent entities and ... 详细信息
来源: 评论
Mixed-Precision Computing in the GRIST Dynamical Core for Weather and Climate Modelling
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Siyuan Zhang, Yi Wang, Yiming Liu, Zhuang Li, Xiaohan Xue, Wei 2035 Future Laboratory PIESAT Information Technology Co. Ltd. Beijing China Ministry of Education Key Laboratory for Earth System Modelling Department of Earth System Science Tsinghua University Beijing China Chinese Academy of Meteorological Sciences Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Beijing Research Institute Nanjing University of Information Science and Technology Beijing China
Atmosphere modelling applications become increasingly memory-bound due to the inconsistent development rates between processor speeds and memory bandwidth. In this study, we mitigate memory bottlenecks and reduce the ... 详细信息
来源: 评论
Multi-scale and Multi-path Cascaded Convolutional Network for Semantic Segmentation of Colorectal Polyps
arXiv
收藏 引用
arXiv 2024年
作者: Manan, Malik Abdul Jinchao, Feng Yaqub, Muhammad Ahmed, Shahzad Imran, Syed Muhammad Ali Chuhan, Imran Shabir Khan, Haroon Ahmed Beijing Key Laboratory of Computational Intelligence and Intelligent System Faculty of Information Technology Beijing University of Technology Beijing100124 China Department of computer science and information technology Superior University Lahore Pakistan Interdisciplinary Research Institute Faculty of Science Beijing University of Technology Beijing China Islamabad Pakistan
Colorectal polyps are structural abnormalities of the gastrointestinal tract that can potentially become cancerous in some cases. The study introduces a novel framework for colorectal polyp segmentation named the Mult... 详细信息
来源: 评论
MEAT: Median-Ensemble Adversarial Training for Improving Robustness and Generalization
MEAT: Median-Ensemble Adversarial Training for Improving Rob...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhaozhe Hu Jia-Li Yin Bin Chen Luojun Lin Bo-Hao Chen Ximeng Liu Fujian Province Key Laboratory of Information Security and Network Systems Fuzhou China College of Computer Science and Big Data Fuzhou University Fuzhou China Department of Computer Science and Engineering Yuan Ze University Taiwan
Self-ensemble adversarial training methods improve model robustness by ensembling models at different training epochs, such as model weight averaging (WA). However, previous research has shown that self-ensemble defen...
来源: 评论
Meta-ZSDETR: Zero-shot DETR with Meta-learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Lu Zhang, Chenbo Zhao, Jiajia Guan, Jihong Zhou, Shuigeng Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University China Science and Technology on Complex System Control and Intelligent Agent Cooperation Laboratory China Department of Computer Science & Technology Tongji University China
Zero-shot object detection aims to localize and recognize objects of unseen classes. Most of existing works face two problems: the low recall of RPN in unseen classes and the confusion of unseen classes with backgroun... 详细信息
来源: 评论
Meet-in-the-Middle Statistical Fault Analysis of the PRESENT lightweight Cryptosystem
Meet-in-the-Middle Statistical Fault Analysis of the PRESENT...
收藏 引用
作者: Li, Wei Zhu, Xiao-Ming Gu, Da-Wu Li, Jia-Yao Cai, Tian-Pei School of Computer Science and Technology Donghua University Shanghai201620 China Department of Computer and Science and Engineering Shanghai Jiao Tong University Shanghai200240 China Shanghai Key Laboratory of Scalable Computing and System Shanghai200240 China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai200240 China
The lightweight block cipher PRESENT was presented at the International Conference on Cryptographic Hardware and Embedded systems (CHES) in 2007, and it has become a standard of ISO/IEC-29192-2 for lightweight cryptos... 详细信息
来源: 评论
Meta-ZSDETR: Zero-shot DETR with Meta-learning
Meta-ZSDETR: Zero-shot DETR with Meta-learning
收藏 引用
International Conference on computer Vision (ICCV)
作者: Lu Zhang Chenbo Zhang Jiajia Zhao Jihong Guan Shuigeng Zhou Shanghai Key Lab of Intelligent Information Processing and School of Computer Science Fudan University China Science and Technology on Complex System Control and Intelligent Agent Cooperation Laboratory China Department of Computer Science & Technology Tongji University China
Zero-shot object detection aims to localize and recognize objects of unseen classes. Most of existing works face two problems: the low recall of RPN in unseen classes and the confusion of unseen classes with backgroun...
来源: 评论
Two-Sided Online Task Assignment Based on Worker Portraits in Mobile CrowdSensing
Two-Sided Online Task Assignment Based on Worker Portraits i...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Zhenyang Mao Peng Li Guangzhong Liao Lei Nie Haizhou Bao Qin Liu School of Computer Science and Technology Wuhan University of Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System China School of Cyber Science and Engineering Wuhan University China
Task assignment is a challenging problem in mobile crowdsensing (MCS), especially since workers and tasks are online. Existing work does not consider the portrait of the workers when assigning tasks, which may result ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论