咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是641-650 订阅
排序:
Retrofitting XoM for Stripped Binaries without Embedded Data Relocation
arXiv
收藏 引用
arXiv 2024年
作者: Luo, Chenke Ming, Jiang Xie, Mengfei Peng, Guojun Fu, Jianming Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Department of Computer Science School of Science and Engineering Tulane University United States
system programs are frequently coded in memory-unsafe languages such as C/C++, rendering them susceptible to a variety of memory corruption attacks. Among these, just-in-time return-oriented programming (JIT-ROP) stan... 详细信息
来源: 评论
A BiLSTM cardinality estimator in complex database systems based on attention mechanism
收藏 引用
CAAI Transactions on Intelligence technology 2022年 第3期7卷 537-546页
作者: Qiang Zhou Guoping Yang Haiquan Song Jin Guo Yadong Zhang Shengjie Wei Lulu Qu Louis Alberto Gutierrez Shaojie Qiao School of Information Science and Technology Southwest Jiaotong UniversityChengduChina School of Software Engineering Chengdu University of Information TechnologyChengduChina School of Energy Power and Mechanical Engineering North China Electric Power UniversityBaodingChina Digital Media Art Key Laboratory of Sichuan ProvinceSichuan Conservatory of MusicChengduChina Department of Computer Science Rensselaer Polytechnic InstituteNew YorkNew YorkUSA
An excellent cardinality estimation can make the query optimiser produce a good execution *** there are some studies on cardinality estimation,the prediction results of existing cardinality estimators are inaccurate a... 详细信息
来源: 评论
Bidding Management Platform for Cloud-Chain Convergence
Bidding Management Platform for Cloud-Chain Convergence
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yanzhi Zhang Xiaoming Wu Xiangzhi Liu Huomin Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Strengthening the supervision of bidding business is an important measure to optimise the business environment of bidding and ensure fair competition among enterprises. The existing blockchain-based bidding platform h... 详细信息
来源: 评论
Measurement-based Verification of Quantum Markov Chains
arXiv
收藏 引用
arXiv 2024年
作者: Guan, Ji Feng, Yuan Turrini, Andrea Ying, Mingsheng Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Beijing100190 China Department of Computer Science and Technology Tsinghua University Beijing100084 China Institute of Intelligent Software Guangzhou511458 China The Centre for Quantum Software and Information University of Technology SydneyNSW2007 Australia
Model-checking techniques have been extended to analyze quantum programs and communication protocols represented as quantum Markov chains, an extension of classical Markov chains. To specify qualitative temporal prope... 详细信息
来源: 评论
GLAND SEGMENTATION VIA DUAL ENCODERS AND BOUNDARY-ENHANCED ATTENTION
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Huadeng Yu, Jiejiang Li, Bingbing Pan, Xipeng Liu, Zhenbing Lan, Rushi Luo, Xiaonan Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Department of Pathology Ganzhou Municipal Hospital Ganzhou China
Accurate and automated gland segmentation on pathological images can assist pathologists in diagnosing the malignancy of colorectal adenocarcinoma. However, due to various gland shapes, severe deformation of malignant... 详细信息
来源: 评论
TIBS: A Deep-Learning Model for Network Intrusion Detection for SDN Environments
TIBS: A Deep-Learning Model for Network Intrusion Detection ...
收藏 引用
International Conference on computers, Communications, and systems (ICCCS)
作者: Yilin Zhang Xiaoming Wu Huomin Dong Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center (National Supercomputer Center in Jinan) Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Software-Defined Networking (SDN) is a modern network strategy that replaces traditional network structures. Its management efficiency and convenience are significantly higher than traditional networks. However, it sh... 详细信息
来源: 评论
Android Malware Detection Method Based on Graph Convolutional Networks
Android Malware Detection Method Based on Graph Convolutiona...
收藏 引用
Artificial Intelligence and Power systems (AIPS), International Conference on
作者: Qingling Xu Shumian Yang Lijuan Xu Dawei Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) (Shandong Academy of Sciences) Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Facing the serious security threats posed by Android malware amidst the rapid development of mobile internet, there is an urgent need to develop more accurate and efficient detection technologies. This paper introduce... 详细信息
来源: 评论
YOLO-RDD: A road defect detection algorithm based on YOLO
YOLO-RDD: A road defect detection algorithm based on YOLO
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Jiabin Pei Xiaoming Wu Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Road maintenance is an indispensable part of the transportation system, ensuring road safety and maximizing road efficiency. The rapid and accurate acquisition of road surface information is crucial for effective road... 详细信息
来源: 评论
Backdoor-Empowered Regulable Privilege Authorization for Edge-Level Graph Learning in 6G Vehicular Networks
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Yang, Xiao Li, Gaolei Wu, Jun Zhou, Kai Li, Jianhua Yang, Wu Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering Shanghai China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai China The Hong Kong Polytechnic University Department of Computing Hong Kong Harbin Engineering University College of Computer Science and Technology Harbin China
Edge-Level Graph Learning system (EGLS) exhibits diverse applicability in flow prediction, route planning, and accident forecasting. Existing EGLS studies extremely stress absolute fairness and impartiality for all us... 详细信息
来源: 评论
Cloud Ubiquitous Learning Approach Based on Multi-agents system  23
Cloud Ubiquitous Learning Approach Based on Multi-agents Sys...
收藏 引用
23rd International Arab Conference on information technology, ACIT 2022
作者: Guettala, Manel Harous, Saad Bourekkache, Samir Athamena, Belkacem Kazar, Okba Houhamdi, Zina University of Biskra LINFI Laboratory Department of Computer Science Biskra07000 Algeria University of Sharjah College of Computing and Informatics Department of Computer Science United Arab Emirates College of Business Al Ain University Al Ain United Arab Emirates College of Information Technology UAE University Department of Information Systems and Security United Arab Emirates
information technology (IT) plays an important role in the education field, with ubiquitous computing technology the ubiquitous learning (U-Iearning) is now a practical possibility. Cloud computing can offer many bene... 详细信息
来源: 评论