咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是691-700 订阅
排序:
Accumulative Time Based Ranking Method to Reputation Evaluation in information Networks
收藏 引用
Journal of computer science & technology 2022年 第4期37卷 960-974页
作者: Hao Liao Qi-Xin Liu Ze-Cheng Huang Ke-Zhong Lu Chi Ho Yeung Yi-Cheng Zhang National Engineering Laboratory on Big Data System Computing Technology College of Computer Science and SoftwareEngineeringShenzhen UniversityShenzhen 518060China Guangdong Province Key Laboratory of Popular High Performance Computers Shenzhen UniversityShenzhen 518060China Guangdong Province Engineering Center of China-Made High Performance Data Computing System College of ComputerScience and Software EngineeringShenzhen UniversityShenzhen 518060China Institute of Big Data Intelligent Management and Decision Shenzhen UniversityShenzhen 518060China Department of Science and Environmental Studies The Education University of Hong KongHong Kong 999077China Department of Physics University of FribourgFribourg 1700Switzerland
Due to over-abundant information on the Web, information filtering becomes a key task for online users to obtain relevant suggestions and how to extract the most related item is always a key topic for researchers in v... 详细信息
来源: 评论
Retrofitting XoM for Stripped Binaries without Embedded Data Relocation
arXiv
收藏 引用
arXiv 2024年
作者: Luo, Chenke Ming, Jiang Xie, Mengfei Peng, Guojun Fu, Jianming Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Department of Computer Science School of Science and Engineering Tulane University United States
system programs are frequently coded in memory-unsafe languages such as C/C++, rendering them susceptible to a variety of memory corruption attacks. Among these, just-in-time return-oriented programming (JIT-ROP) stan... 详细信息
来源: 评论
GNN-ASG: A Double Feature Selection-based Adversarial Sample Generation Method in Industrial Control system
GNN-ASG: A Double Feature Selection-based Adversarial Sample...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Lijuan Xu Zhiang Yao Dawei Zhao Xin Li Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Due to the unique constraints of industrial control data, industrial control adversarial sample attacks are particularly challenging. Existing methods strive to conduct adversarial sample attacks under the conditions ... 详细信息
来源: 评论
Bidding Management Platform for Cloud-Chain Convergence
Bidding Management Platform for Cloud-Chain Convergence
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yanzhi Zhang Xiaoming Wu Xiangzhi Liu Huomin Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Strengthening the supervision of bidding business is an important measure to optimise the business environment of bidding and ensure fair competition among enterprises. The existing blockchain-based bidding platform h... 详细信息
来源: 评论
A BiLSTM cardinality estimator in complex database systems based on attention mechanism
收藏 引用
CAAI Transactions on Intelligence technology 2022年 第3期7卷 537-546页
作者: Qiang Zhou Guoping Yang Haiquan Song Jin Guo Yadong Zhang Shengjie Wei Lulu Qu Louis Alberto Gutierrez Shaojie Qiao School of Information Science and Technology Southwest Jiaotong UniversityChengduChina School of Software Engineering Chengdu University of Information TechnologyChengduChina School of Energy Power and Mechanical Engineering North China Electric Power UniversityBaodingChina Digital Media Art Key Laboratory of Sichuan ProvinceSichuan Conservatory of MusicChengduChina Department of Computer Science Rensselaer Polytechnic InstituteNew YorkNew YorkUSA
An excellent cardinality estimation can make the query optimiser produce a good execution *** there are some studies on cardinality estimation,the prediction results of existing cardinality estimators are inaccurate a... 详细信息
来源: 评论
Measurement-based Verification of Quantum Markov Chains
arXiv
收藏 引用
arXiv 2024年
作者: Guan, Ji Feng, Yuan Turrini, Andrea Ying, Mingsheng Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Beijing100190 China Department of Computer Science and Technology Tsinghua University Beijing100084 China Institute of Intelligent Software Guangzhou511458 China The Centre for Quantum Software and Information University of Technology SydneyNSW2007 Australia
Model-checking techniques have been extended to analyze quantum programs and communication protocols represented as quantum Markov chains, an extension of classical Markov chains. To specify qualitative temporal prope... 详细信息
来源: 评论
GLAND SEGMENTATION VIA DUAL ENCODERS AND BOUNDARY-ENHANCED ATTENTION
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Huadeng Yu, Jiejiang Li, Bingbing Pan, Xipeng Liu, Zhenbing Lan, Rushi Luo, Xiaonan Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Department of Pathology Ganzhou Municipal Hospital Ganzhou China
Accurate and automated gland segmentation on pathological images can assist pathologists in diagnosing the malignancy of colorectal adenocarcinoma. However, due to various gland shapes, severe deformation of malignant... 详细信息
来源: 评论
YOLO-RDD: A road defect detection algorithm based on YOLO
YOLO-RDD: A road defect detection algorithm based on YOLO
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Jiabin Pei Xiaoming Wu Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Road maintenance is an indispensable part of the transportation system, ensuring road safety and maximizing road efficiency. The rapid and accurate acquisition of road surface information is crucial for effective road... 详细信息
来源: 评论
CBAN: A DDoS detection method based on CNN, BiGRU, and attention mechanism
CBAN: A DDoS detection method based on CNN, BiGRU, and atten...
收藏 引用
2024 International Conference on computer Network security and Software Engineering, CNSSE 2024
作者: Wang, Bing Yu, Yankun Zhao, Chunlan Jiang, Jingjing School of Computer Science and Software Engineering Southwest Petroleum University Sichuan Chengdu610500 China Key Laboratory of Energy Security and Low-carbon development Southwest Petroleum University Sichuan Chengdu610500 China School of Sciences Southwest Petroleum University Sichuan Chengdu610500 China Information Technology Department Jinchuan County Middle School Aba Tibetan and Qiang Autonomous Prefecture Sichuan624100 China
In order to address the obstacles posed by the growing security issues of the Internet of Things to the development of big data, this paper conducts in-depth research on the defense of the most harmful DDoS attack. Th... 详细信息
来源: 评论
TIBS: A Deep-Learning Model for Network Intrusion Detection for SDN Environments
TIBS: A Deep-Learning Model for Network Intrusion Detection ...
收藏 引用
International Conference on computers, Communications, and systems (ICCCS)
作者: Yilin Zhang Xiaoming Wu Huomin Dong Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center (National Supercomputer Center in Jinan) Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Software-Defined Networking (SDN) is a modern network strategy that replaces traditional network structures. Its management efficiency and convenience are significantly higher than traditional networks. However, it sh... 详细信息
来源: 评论