咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是651-660 订阅
排序:
Gland Segmentation Via Dual Encoders and Boundary-Enhanced Attention
Gland Segmentation Via Dual Encoders and Boundary-Enhanced A...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Huadeng Wang Jiejiang Yu Bingbing Li Xipeng Pan Zhenbing Liu Rushi Lan Xiaonan Luo Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Department of Pathology Ganzhou Municipal Hospital Ganzhou China
Accurate and automated gland segmentation on pathological images can assist pathologists in diagnosing the malignancy of colorectal adenocarcinoma. However, due to various gland shapes, severe deformation of malignant...
来源: 评论
A Personal DRM Scheme Based on Social Trust
收藏 引用
Chinese Journal of Electronics 2023年 第4期21卷 719-724页
作者: Qin QIU Zhi TANG Fenghua LI Yinyan YU Institute of Computer Science and Technology Peking University Beijing China Beijing Key Laboratory of Internet Security Technology Peking University Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China Department of Electronic Engineering Beijing Electronic Science and Technology Institute Beijing China
Existing commercial Digital rights management (DRM) schemes are not suitable for personal content protection because of centralized architecture and rigid constraints. To enable secure and flexible sharing of sensitiv... 详细信息
来源: 评论
Few-Shot Hyperspectral Image Classification with Spectral-Spatial Feature Fusion Based on Fuzzy Broad Learning system
Few-Shot Hyperspectral Image Classification with Spectral-Sp...
收藏 引用
IEEE International Conference on Image Processing
作者: Xiaopei Hu Guixin Zhao Aimei Dong Guohua Lv Yi Zhai Ying Guo Xiangjun Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the few-shot hyperspectral image (HSI) classification, most current models don't fully utilize the advantage of spectral-spatial feature fusion, resulting in low classification accuracy. Therefore, we propose a...
来源: 评论
PACE: Reputation-Driven Hierarchical Incentive Mechanism for Trusted Healthcare Transactions in Model Marketplace
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Lu, Jianfeng Dou, Xiaochi Rathore, Bharati Jhaveri, Rutvij H. Seid, Abegaz Mohammed Erbad, Aiman Wuhan University of Science and Technology School of Computer Science and Technology Wuhan430065 China Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System China Ministry of Education Key Laboratory of Social Computing and Cognitive Intelligence Dalian University of Technology China United Kingdom Pandit Deendayal Energy University Department of Computer Science and Engineering School of Technology India Hamad Bin Khalifa University College of Science and Engineering Doha Qatar Qatar University College of Engineering Doha Qatar
Federated learning-based model marketplaces have the potential to securely leverage healthcare data for efficient healthcare transactions. However, the willingness to participate in this marketplace is severely hinder... 详细信息
来源: 评论
DEEPCON: Improving Distributed Deep Learning Model Consistency in Edge-Cloud Environments via Distillation
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2025年
作者: Qian, Bin Qian, Jiaxu Wen, Zhenyu Wu, Di He, Shibo Chen, Jiming Ranjan, Rajiv Zhejiang University State Key Laboratory of Industrial Control Technology Hangzhou China Zhejiang University of Technology Institute of Cyberspace Security College of Information Engineering Hangzhou China University of St Andrews School of Computer Science United Kingdom Newcastle University United Kingdom
In a typical distributed Deep Learning (DL) based application, models are configured differently to meet the requirements of resource constraints. For instance, a large ResNet56 model is deployed on the cloud server w... 详细信息
来源: 评论
Fine-Grained Depth Knowledge Distillation for Cloth-Changing Person Re-identification
Fine-Grained Depth Knowledge Distillation for Cloth-Changing...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Yuhan Yao Jiawei Feng Ancong Wu Jiangqun Ni Wei-Shi Zheng School of Computer Science and Engineering Sun Yat-sen University China School of Cyber Science and Technology Sun Yat-sen University Shenzhen China Department of New Networks Peng Cheng Laboratory Shenzhen China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Key Laboratory of Information Security Technology China
The mission of cloth-changing person re-identification (CC-ReID) is to discover cloth-invariant and identity-related cues, while traditional person ReID methods rely on appearance features that are biased to cloth-rel... 详细信息
来源: 评论
Hybrid Variational Autoencoder for Collaborative Filtering  25
Hybrid Variational Autoencoder for Collaborative Filtering
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Liu, Jinxin Xiao, Yingyuan Zhu, Ke Zheng, Wenguang Hsu, Ching-Hsien Tianjin University of Technology Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin China Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Asia University Department of Computer Science and Information Engineering Taichung Taiwan
In recent years, Variational AutoEncoder (VAE) based methods have made many important achievements in the field of collaborative filtering recommendation system. VAE is a kind of Bayesian model which combines latent v... 详细信息
来源: 评论
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction and Reconstruction of Multivariate Time Series  19
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Xiong, Zhiying Fan, Qilin Wang, Kai Li, Xiuhua Zhang, Xu Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing China Chongqing University Chongqing Key Laboratory of Digital Cinema Art Theory and Technology Chongqing China Harbin Institute of Technology School of Computer Science and Technology Weihai China Harbin Institute of Technology Research Institute of Cyberspace Security Weihai China Haihe Laboratory of Information Technology Application Innovation Tianjin China University of Exeter Department of Computer Science Exeter United Kingdom
Detecting anomalies for key performance indicator (KPI) data is of paramount importance to ensure the quality and reliability of network services. However, building the anomaly detection system for KPI is challenging ... 详细信息
来源: 评论
CBAN: A DDoS detection method based on CNN, BiGRU, and attention mechanism
CBAN: A DDoS detection method based on CNN, BiGRU, and atten...
收藏 引用
2024 International Conference on computer Network security and Software Engineering, CNSSE 2024
作者: Wang, Bing Yu, Yankun Zhao, Chunlan Jiang, Jingjing School of Computer Science and Software Engineering Southwest Petroleum University Sichuan Chengdu610500 China Key Laboratory of Energy Security and Low-carbon development Southwest Petroleum University Sichuan Chengdu610500 China School of Sciences Southwest Petroleum University Sichuan Chengdu610500 China Information Technology Department Jinchuan County Middle School Aba Tibetan and Qiang Autonomous Prefecture Sichuan624100 China
In order to address the obstacles posed by the growing security issues of the Internet of Things to the development of big data, this paper conducts in-depth research on the defense of the most harmful DDoS attack. Th... 详细信息
来源: 评论
Detecting and Corrupting Convolution-based Unlearnable Examples
arXiv
收藏 引用
arXiv 2023年
作者: Li, Minghui Wang, Xianlong Yu, Zhifei Hu, Shengshan Zhou, Ziqi Zhang, Longling Zhang, Leo Yu School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Convolution-based unlearnable examples (UEs) employ class-wise multiplicative convolutional noise to training samples, severely compromising model performance. This fire-new type of UEs have successfully countered all... 详细信息
来源: 评论