咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是631-640 订阅
排序:
Towards Privacy-Preserving and Practical Vaccine Supply Chain based on Blockchain
Towards Privacy-Preserving and Practical Vaccine Supply Chai...
收藏 引用
Asia Joint Conference on information security (Asia JCIS)
作者: Baodong Wen Yujue Wang Yong Ding Hai Liang Changsong Yang Decun Luo Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Hangzhou Innovation Institute of Beihang University Hangzhou China Cyberspace Security Research Center Pengcheng Laboratory Shenzhen China
Vaccines play a vital role in safeguarding people’s health and improving their well-being. With the increase in the variety and number of infectious diseases, the importance of vaccination cannot be underestimated. D...
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
arXiv
收藏 引用
arXiv 2024年
作者: Deng, Kaijun Zheng, Dezhi Xie, Jindong Wang, Jinbao Xie, Weicheng Shen, Linlin Song, Siyang Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China Department of Computer Science University of Exeter United Kingdom
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
Remote Sensing Images Semantic Segmentation Method Based on Improved Nested UNet
Remote Sensing Images Semantic Segmentation Method Based on ...
收藏 引用
2022 International Conference on Geographic information and Remote Sensing technology, GIRST 2022
作者: Li, Zhongyu Liu, Yang Kuang, Yin Wang, Huajun Liu, Cheng College of Geophysics Chengdu University of Technology Chengdu610059 China College of Computer Science Chengdu Normal University Chengdu611130 China Key Laboratory of interior Layout optimization and Security Institutions of Higher Education of Sichuan Province Sichuan Chengdu611130 China Key Laboratory of Pattern Recognition and Intelligent Information Processing of Sichuan Chengdu University Chengdu610106 China Artificial Intelligence Key Laboratory of Sichuan Province Zigong643000 China
With the development of remote sensing technology, remote sensing images of buildings are of great significance in urban planning, disaster response, and other directions. When we use a neural network containing batch... 详细信息
来源: 评论
SecSCS: A User-Centric Secure Smart Camera system Based on Blockchain
SecSCS: A User-Centric Secure Smart Camera System Based on B...
收藏 引用
International Conference on Distributed Computing systems
作者: Xinyuan Qian Hongwei Li Haoyong Wang Guowen Xu Shengmin Xu Ju Ren School of Computer Science and Engineering University of Electronic Science and Technology of China Chongqing Key Laboratory of Automated Reasoning and Cognition Department of Computer Science City University of Hong Kong College of Computer and Cyber Security Fujian Normal University Department of Computer Science and Techology Tsinghua University
Smart cameras have gained immense popularity in commercial markets for their safety and security capabilities. Yet, the prevalent design of these intelligent camera systems often compels users to cede control of their... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
A Brief Survey on Privacy-Preserving Methods for Graph-Structured Data
A Brief Survey on Privacy-Preserving Methods for Graph-Struc...
收藏 引用
International Conference on Image, Vision and Intelligent systems, ICIVIS 2021
作者: Zhang, Yunan Wu, Tao Xian, Xingping Xu, Yuqing Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China
As one of the main manifestations of big data, graph-structured data widely exists in various fields such as social networks, smart cities, medical health, and finance, and is characterized by high dimension, nonlinea... 详细信息
来源: 评论
RAS2P: Remote Attestation via Self-Measurement for SGX-based Platforms
RAS2P: Remote Attestation via Self-Measurement for SGX-based...
收藏 引用
2022 IEEE International Conference on systems, Man, and Cybernetics, SMC 2022
作者: Ren, Zhengwei Li, Xueting Deng, Li Tong, Yan Xu, Shiwei Tang, Jinshan Wuhan University of Science and Technology School of Computer Science and Technology Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Wuhan University of Science and Technology School of Computer Science and Technology Wuhan China Agricultural University College of Informatics Huazhong Wuhan China George Mason University College of Health and Human Services Department of Health Administration and Policy Fairfax United States
Remote Attestation (RA) is a security service by which a Verifier (Vrf) can verify the platform state of a remote Prover (Prv). However, in most existing RA schemes, the Prv might be vulnerable to denial of service (D... 详细信息
来源: 评论
Efficient Batch Verification and Privacy-Preserving Data Aggregation Scheme in V2G Networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wang, Congcong Wang, Chen Shen, Jian Vasilakos, Athanasios V. Wang, Bin Wang, Weizheng Department of Software Engineering Nanjing University of Information Science and Technology Nanjing210044 China the Zhejiang Key Laboratory of Digital Fashion and Data Governance the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Provincial Innovation Center of Advanced Textile Technology Shaoxing312000 China College of Computer Science and Information Technology IAU Saudi Arabia Grimstad4879 Norway Network and Data Security Hangzhou310053 China Computer Science Department City University of Hong Kong Hong Kong the Division of Computer Science University of Aizu Fukushima965–8580 Japan
In recent years, against the backdrop of smart grids, vehicle-to-grid (V2G) interaction has become a hot topic. With the increasing number of new energy vehicles, handling massive amounts of electricity transaction da... 详细信息
来源: 评论
Accumulative Time Based Ranking Method to Reputation Evaluation in information Networks
收藏 引用
Journal of computer science & technology 2022年 第4期37卷 960-974页
作者: Hao Liao Qi-Xin Liu Ze-Cheng Huang Ke-Zhong Lu Chi Ho Yeung Yi-Cheng Zhang National Engineering Laboratory on Big Data System Computing Technology College of Computer Science and SoftwareEngineeringShenzhen UniversityShenzhen 518060China Guangdong Province Key Laboratory of Popular High Performance Computers Shenzhen UniversityShenzhen 518060China Guangdong Province Engineering Center of China-Made High Performance Data Computing System College of ComputerScience and Software EngineeringShenzhen UniversityShenzhen 518060China Institute of Big Data Intelligent Management and Decision Shenzhen UniversityShenzhen 518060China Department of Science and Environmental Studies The Education University of Hong KongHong Kong 999077China Department of Physics University of FribourgFribourg 1700Switzerland
Due to over-abundant information on the Web, information filtering becomes a key task for online users to obtain relevant suggestions and how to extract the most related item is always a key topic for researchers in v... 详细信息
来源: 评论
GNN-ASG: A Double Feature Selection-based Adversarial Sample Generation Method in Industrial Control system
GNN-ASG: A Double Feature Selection-based Adversarial Sample...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Lijuan Xu Zhiang Yao Dawei Zhao Xin Li Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Due to the unique constraints of industrial control data, industrial control adversarial sample attacks are particularly challenging. Existing methods strive to conduct adversarial sample attacks under the conditions ... 详细信息
来源: 评论