咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是661-670 订阅
排序:
Joint Covert and Secure Communication for SWIPT Assisted CNOMA systems
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20406-20419页
作者: Huang, Gaojian Lei, Yuxin Li, Xingwang Khan, Wali Ullah Wang, Gongpu Nallanathan, Arumugam Henan Polytechnic University School of Physics and Electronic Information Engineering Jiaozuo454003 China City University of Macau Faculty of Data Science 999078 China Henan Polytechnic University School of Surveying and Land Information Engineering Jiaozuo454003 China Henan Polytechnic University School of Physics and Electronic Information Engineering Jiaozuo454099 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Luxembourg City1855 Luxembourg Beijing Jiaotong University Beijing Key Laboratory of Transportation Data Analysis and Mining School of Computer and Information Technology Beijing100044 China Institute of Internet of Things Wuxi214111 China Queen Mary University of London School of Electronic Engineering and Computer Science LondonE1 4NS United Kingdom Kyung Hee University Department of Electronic Engineering Gyeonggi-do Yongin-si17104 Korea Republic of
With the rapid advancement of physical-layer security technology, the covert and secure communication has become crucial in safeguarding wireless communication systems. In this paper, we propose a joint covert and sec... 详细信息
来源: 评论
Improving Smart Contract security with Contrastive Learning-Based Vulnerability Detection
Improving Smart Contract Security with Contrastive Learning-...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Yizhou Chen Zeyu Sun Zhihao Gong Dan Hao Key Lab of HCST (PKU) MOE School of Computer Science Peking University Beijing China Science & Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences Beijing China
Currently, smart contract vulnerabilities (SCVs) have emerged as a major factor threatening the transaction security of blockchain. Existing state-of-the-art methods rely on deep learning to mitigate this threat. They... 详细信息
来源: 评论
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Xiaoyang Yang, Mengda Yi, Wenzhe Li, Ziang Wang, Juan Hu, Hongxin Zhuang, Yong Liu, Yaxin Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Department of Computer Science and Engineering University at Buffalo SUNY United States
Split Learning (SL) is a distributed learning framework renowned for its privacy-preserving features and minimal computational requirements. Previous research consistently highlights the potential privacy breaches in ... 详细信息
来源: 评论
Big-Moe: Bypassing Isolated Gating For Generalized Multimodal Face Anti-Spoofing
Big-Moe: Bypassing Isolated Gating For Generalized Multimoda...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yingjie Ma Zitong Yu Xun Lin Weicheng Xie Linlin Shen College of Computer Science and Software Engineering Shenzhen University Great Bay University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing
In the domain of facial recognition security, multimodal Face Anti-Spoofing (FAS) is essential for countering presentation attacks. However, existing technologies encounter challenges due to modality biases and imbala... 详细信息
来源: 评论
Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges
arXiv
收藏 引用
arXiv 2023年
作者: Dong, Junhao Chen, Junxi Xie, Xiaohua Lai, Jianhuang Chen, Hao School of Computer Science and Engineering Sun Yat-sen University Guangdong Province Key Laboratory of Information Security Technology Guangzhou China Department of Computer Science and Engineering Department of Chemical and Biological Engineering Division of Life Science Hong Kong University of Science and Technology Hong Kong
Deep learning techniques have achieved superior performance in computer-aided medical image analysis, yet they are still vulnerable to imperceptible adversarial attacks, resulting in potential misdiagnosis in clinical... 详细信息
来源: 评论
Towards Fair Federated Learning via Unbiased Feature Aggregation
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: He, Zeqing Wang, Zhibo Dong, Xiaowei Sun, Peng Ren, Ju Ren, Kui Zhejiang University State Key Laboratory of Blockchain and Data Security China Institute of Blockchain and Data Security Hangzhou310027 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China Hunan University College of Computer Science and Electronic Engineering Changsha410082 China Tsinghua University Department of Computer Science and Technology Beijing100084 China Zhongguancun Laboratory Beijing100094 China
Federated learning (FL) is a distributed machine learning framework that enables multiple clients to collaboratively train models without raw data exchange. Prior studies on FL mainly focus on optimizing learning perf... 详细信息
来源: 评论
Concrete Structural Crack Damage Classification Using Nonlinear Dimension Reduction and Broad Learning system
Concrete Structural Crack Damage Classification Using Nonlin...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Bingshu Wang Jia Lin Xiaodong Zhuang Guanghui Zhang C.L. Philip Chen School of Software Northwestern Polytechnical University Xi'an China Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China School of Computer Science and Technology Shandong University Qingdao China School of Computer Science and Engineering South China University of Technology Guangzhou China
Concrete structural crack damage classification is of importance for road safety. This paper proposes a new method based on broad neural network for crack damage classification in concrete structures. It includes thre... 详细信息
来源: 评论
Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
arXiv
收藏 引用
arXiv 2025年
作者: You, Zhichao Dong, Xuewen Li, Shujun Liu, Ximeng Ma, Siqi Shen, Yulong School of Computer Science & Technology Xidian University China Shaanxi Key Laboratory of Network and System Security Xi’an China University of Kent Canterbury United Kingdom College of Computer and Data Science Fuzhou University Fuzhou China School of System and Computing University of New South Wales CanberraACT2612 Australia
Reconstruction attacks against federated learning (FL) aim to reconstruct users’ samples through users’ uploaded gradients. Local differential privacy (LDP) is regarded as an effective defense against various attack... 详细信息
来源: 评论
FCAU-Net: A Frequency Channel Attention Convolutional Neural Network for Medical Image Segmentation  9
FCAU-Net: A Frequency Channel Attention Convolutional Neural...
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Tao, Chen Chen, Hongyu Wu, Ronghua Zhi, Huixiang Yan, Xiao Liu, Hongzhe Xu, Cheng Jian, Muwei Linyi University School of Information Science and Technology Linyi China The First Affiliated Hospital of Ningbo University Ningbo Clinical Research Center for Hematologic Malignancies Department of Haematology Ningybo China Beijing Union University Beijing Key Laboratory of Information Service Engineering Beijing China Shandong University of Finance and Economics School of Computer Science and Technology Jinan China
Recently, U-Net and its subsequent extensions such as Attention U-Net have emerged as the leading medical image segmentation methods. However, many approaches that combine attention mechanisms with U-Net have overlook... 详细信息
来源: 评论
Minimization of Age of information for Satellite-Terrestrial Covert Communication with a Full-Duplex Receiver
Minimization of Age of Information for Satellite-Terrestrial...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Yizhi Cao Zewei Guo Qifeng Miao Ranran Sun Ji He Xiaochen Li Hangzhou Institute of Technology Xidian University Hangzhou China Shaanxi Key Laboratory of Network and System Security Xidian University Xi’an China School of Systems Information Science Future University Hakodate Hakodate Japan School of Computer Science and Technology Xidian University Xi’an China PLA Strategic Support Force Information Engineering University Zhengzhou China
This paper investigates the freshness of information for covert communication in a satellite-terrestrial system consisting of a satellite transmitter Alice, a terrestrial full-duplex receiver Bob, and a terrestrial wa... 详细信息
来源: 评论