咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是621-630 订阅
排序:
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
arXiv
收藏 引用
arXiv 2023年
作者: Jia, Zian Xiong, Yun Nan, Yuhong Zhang, Yao Zhao, Jinjing Wen, Mi Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China School of Software Engineering Sun Yat-sen University China National Key Laboratory of Science and Technology on Information System Security China Shanghai University of Electric Power China
Advance Persistent Threats (APTs), adopted by most delicate attackers, are becoming increasing common and pose great threat to various enterprises and institutions. Data provenance analysis on provenance graphs has em... 详细信息
来源: 评论
Robust peer-to-peer learning via secure multi-party computation
收藏 引用
Journal of information and Intelligence 2023年 第4期1卷 341-351页
作者: Yongkang Luo Wenjian Luo Ruizhuo Zhang Hongwei Zhang Yuhui Shi Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and TechnologyHarbin Institute of TechnologyShenzhen 518055China Peng Cheng Laboratory Shenzhen 518055China Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China
To solve the data island problem,federated learning(FL)provides a solution paradigm where each client sends the model parameters but not the data to a server for model ***-to-peer(P2P)federated learning further improv... 详细信息
来源: 评论
Prior Knowledge-Driven Hybrid Prompter Learning for RGB-Event Tracking
收藏 引用
IEEE Transactions on Circuits and systems for Video technology 2025年
作者: Wang, Mianzhao Shi, Fan Cheng, Xu Chen, Shengyong Tianjin University of Technology Engineering Research Center of Learning-Based Intelligent System Ministry of Education Key Laboratory of Computer Vision and System School of Computer Science and Engineering Tianjin300384 China Technical University of Denmark Department of Technology Management and Economics Kongens Lyngby Denmark
Event data can asynchronously capture variations in light intensity, thereby implicitly providing valuable complementary cues for RGB-Event tracking. Existing methods typically employ a direct interaction mechanism to... 详细信息
来源: 评论
A Study on Semi-Supervised Semantic Segmentation of Ship Flame Images
A Study on Semi-Supervised Semantic Segmentation of Ship Fla...
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Junwei Wan Yaojie Chen XueCong Zheng Department of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China
In addressing the challenges of limited semantic labeling data and imprecise segmentation regions prevalent in the semantic segmentation of ship flame images, this study introduces a semi-supervised semantic segmentat...
来源: 评论
Topic-sensitive neural headline generation
收藏 引用
science China(information sciences) 2020年 第8期63卷 180-195页
作者: Ayana Ziyun WANG Lei XU Zhiyuan LIU Maosong SUN State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and TechnologyDepartment of Computer Science and TechnologyTsinghua University Department of Computer Information Management Inner Mongolia University of Finance and Economics
Neural models are being widely applied for text summarization, including headline generation,and are typically trained using a set of document-headline pairs. In a large document set, documents can usually be grouped ... 详细信息
来源: 评论
OmniMark: Efficient and Scalable Latent Diffusion Model Fingerprinting  39
OmniMark: Efficient and Scalable Latent Diffusion Model Fing...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Fei, Jianwei Dai, Yunshu Xia, Zhihua Huang, Fangjun Zhou, Jiantao State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China School of Cyber Science and Technology Sun Yat-Sen University China College of Cyberspace Security Jinan University China
We introduce OmniMark, a novel and efficient fingerprinting method for Latent Diffusion Models (LDM). OmniMark can encode user-specific fingerprints across diverse dimensions of the weights of the LDM, including kerne...
来源: 评论
Ethereum smart contract security research:survey and future research opportunities
收藏 引用
Frontiers of computer science 2021年 第2期15卷 143-160页
作者: Zeli WANG Hai JIN Weiqi DAI Kim-Kwang Raymond CHOO Deqing ZOU National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabClusters and Grid Computing LabHubei Engineering Research Center on Big Data SecurityWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Blockchain has recently emerged as a research trend,with potential applications in a broad range of industries and *** particular successful Blockchain technology is smart contract,which is widely used in commercial s... 详细信息
来源: 评论
Efficient Routing Protection Algorithm Based on Optimized Network Topology
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4525-4540页
作者: Haijun Geng Zikun Jin Jiangyuan Yao Han Zhang Zhiguo Hu Bo Yang Yingije Guo Wei Wang Qidong Zhang Guoao Duan School of Computer and Information Technology Shanxi UniversityShanxi030006China School of Automation and Software Engineering Shanxi UniversityShanxi030006China School of Computer Science and Technology Hainan UniversityHaikou570228China Department of Computer Science&Technology Tsinghua UniversityBeijing100084China Department of Urban&Regional Planning San JoséState University San JoséCA95192USA Key Laboratory of Embedded System and Service Computing(Tongji University) Ministry of EducationShanghai201804China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of ChinaChengdu610054China Beijinng University of Technology Beijing-Dublin International CollegeBeijing University of TechnologyBeijing100124China
Network failures are unavoidable and occur *** the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence *** this period,a large number of messages are discarded,whi... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Neo: Towards Efficient Fully Homomorphic Encryption Acceleration using Tensor Core  25
Neo: Towards Efficient Fully Homomorphic Encryption Accelera...
收藏 引用
Proceedings of the 52nd Annual International Symposium on computer Architecture
作者: Dian Jiao Xianglong Deng Zhiwei Wang Shengyu Fan Yi Chen Dan Meng Rui Hou Mingzhe Zhang State Key Laboratory of Cyberspace Security Defense Institute of Information Engineering CAS Beijing China and School of Cyber Security University of Chinese Academy of Sciences Beijing China State Key Laboratory of Cyberspace Security Defense Institute of Information Engineering CAS Beijing China Huazhong University of Science and Technology Wuhan China Computing System Lab Ant Group Beijing China
来源: 评论