咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是741-750 订阅
排序:
Computing on Surface: A Multi-Task Multi-Access Offloading Scheme in Maritime Edge Networks
Computing on Surface: A Multi-Task Multi-Access Offloading S...
收藏 引用
2024 International Conference on Cloud and Network Computing, ICCNC 2024
作者: Dai, Minghui Dou, Chenglong Wu, Yuan Qian, Liping Lin, Bin Su, Zhou Shen, Xuemin Sherman University of Macau State Key Laboratory of Internet of Things for Smart City China Zhuhai UM Science and Technology Research Institute Zhuhai China Zhejiang University of Technology College of Information Engineering Hangzhou China Dalian Maritime University Department of Communication Engineering Dalian China Xi'An Jiaotong University School of Cyber Science and Engineering Xi'an China University of Waterloo Department of Electrical and Computer Engineering Waterloo Canada
The recent development of unmanned aerial vehicles (UAVs) technology has been envisioned as a promising paradigm to cater for the growing maritime activities. However, the increasing growth of marine services poses ch... 详细信息
来源: 评论
DCHM: Dynamic Collaboration of Heterogeneous Models Through Isomerism Learning in a Blockchain-Powered Federated Learning Framework  39
DCHM: Dynamic Collaboration of Heterogeneous Models Through ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Hao, Zhihao Zhang, Bob Li, Haisheng School of Computer Science and Artificial Intelligence Beijing Key Laboratory of Commercial Data Security Protection and Intelligent Governance Beijing Technology and Business University Beijing China Department of Computer and Information Science Faculty of Science and Technology University of Macau Taipa China Centre for Artificial Intelligence and Robotics Institute of Collaborative Innovation University of Macau Taipa China
Solutions to time-varying problems are crucial for research areas such as predicting changes in human body shape over time. While recurrent neural networks have made significant advancements in this field, their relia... 详细信息
来源: 评论
Location and Reward Privacy-Preserving based Secure Task Allocation in Mobile Crowdsensing
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Li, Zhetao Shi, Weifan Choi, Young-June Sekiya, Hiroo Deng, Qingyong Jinan University College of Information Science and Technology Guangzhou510632 China Ajou University Department of Software Suwon443749 Korea Republic of Chiba University Graduate School of Advanced Integration Science Chiba263-8522 Japan Guangxi Normal University Key Laboratory of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Key Laboratory of Multisource Information Mining and Security Guilin541004 China
Online multi-task allocation has become an essential research topic in Mobile Crowdsensing (MCS). Most existing studies merely focus on minimizing the total distance that workers need to travel, but ignore considering... 详细信息
来源: 评论
AI-Based Feature Extraction and Cosine Similarity for Automation of Student Learning Assessment  24
AI-Based Feature Extraction and Cosine Similarity for Automa...
收藏 引用
24th International Arab Conference on information technology, ACIT 2023
作者: Wijanarko, Bambang Dwi Bachtiar Hassan, Rosilah Binti Murad, Dina Fitria Ihsan, Ridho Bramulya Heryadi, Yaya Kuncoro, Engkos Achmad Julianti, Eka Binus Online Learning Bina Nusantara University Computer Science Department Jakarta Indonesia Graduate School Universitas Terbuka Master of English Education Jakarta Indonesia Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Selangor Bangi43600 Malaysia Binus Online Learning Bina Nusantara University Information Systems Department Jakarta Indonesia Binus Online Learning Bina Nusantara University Manajemen Department Jakarta Indonesia Binus Graduate Program-Doctor of Computer Science Bina Nusantara University Computer Science Department Jakarta Indonesia Binus Business School Undergraduate Program Bina Nusantara University Management Department Jakarta Indonesia Universitas Terbuka Information System Department Jakarta Indonesia
This research is ongoing research into the student learning process which aims to develop artificial intelligence-based technology to calculate essay exam scores automatically, based on the textual proximity of studen... 详细信息
来源: 评论
Rockburst prediction using artificial intelligence techniques:A review
Rock Mechanics Bulletin
收藏 引用
Rock Mechanics Bulletin 2024年 第3期3卷 1-13页
作者: Yu Zhang Kongyi Fang Manchao He Dongqiao Liu Junchao Wang Zhengjia Guo School of Electrical and Information Engineering Beijing University of Civil Engineering and ArchitectureBeijing100044China Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and ArchitectureBeijing100044China State Key Laboratory for Geomechanics and Deep Underground Engineering China University of Mining and TechnologyBeijing100083China Thomas Lord Department of Computer Science University of Southern CaliforniaLos Angeles90007CAUSA
Rockburst is a phenomenon where sudden,catastrophic failure of the rock mass occurs in underground deep regions or areas with high tectonic stress during the excavation *** disasters endanger the safety of people'... 详细信息
来源: 评论
Cross-Modality Perturbation Synergy Attack for Person Re-identification  38
Cross-Modality Perturbation Synergy Attack for Person Re-ide...
收藏 引用
38th Conference on Neural information Processing systems, NeurIPS 2024
作者: Gong, Yunpeng Zhong, Zhun Qu, Yansong Luo, Zhiming Ji, Rongrong Jiang, Min School of Informatics Xiamen University China School of Computer Science and Information Engineering Hefei University of Technology China The Department of Artificial Intelligence Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China School of Informatics Key Laboratory of Digital Protection and Intelligent Processing of Intangible CulturalHeritage of Fujian and Taiwan Ministry of Culture and Tourism Xiamen University Fujian Xiamen361005 China
In recent years, there has been significant research focusing on addressing security concerns in single-modal person re-identification (ReID) systems that are based on RGB images. However, the safety of cross-modality...
来源: 评论
Scalar optical hopfions
收藏 引用
eLight 2022年 第1期2卷 284-290页
作者: Chenhao Wan Yijie Shen Andy Chong Qiwen Zhan School of Optical‑Electrical and Computer Engineering University of Shanghai for Science and TechnologyShanghai 200093China School of Optical and Electronic Information and Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430074HubeiChina Optoelectronics Research Centre University of SouthamptonSouthampton SO171BJUK Department of Physics Pusan National UniversityGeumjeong‑GuBusan 46241South Korea Zhangjiang Laboratory 100 Haike RoadShanghai 201204China Shanghai Key Lab of Modern Optical System University of Shanghai for Science and TechnologyShanghai 200093China
Hopfions are three-dimensional(3D)topological states discovered in field theory,magnetics,and hydrodynamics that resemble particle-like objects in physical *** inherit the topological features of the Hopf fibration,a ... 详细信息
来源: 评论
GM-DF: Generalized Multi-Scenario Deepfake Detection
arXiv
收藏 引用
arXiv 2024年
作者: Lai, Yingxin Yu, Zitong Yang, Jing Li, Bin Kang, Xiangui Shen, Linlin The School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Information Security The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510080 China Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Existing face forgery detection usually follows the paradigm of training models in a single domain, which leads to limited generalization capacity when unseen scenarios and unknown attacks occur. In this paper, we ela... 详细信息
来源: 评论
BeamVQ: Beam Search with Vector Quantization to Mitigate Data Scarcity in Physical Spatiotemporal Forecasting
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Weiyan Shi, Xingjian Shu, Ruiqi Gao, Yuan Chen, Rui Ray Wang, Kun Xu, Fan Xue, Jinbao Li, Shuaipeng Tao, Yangyu Wang, Di Wu, Hao Huang, Xiaomeng TEG Tencent China Boson AI United States Department of Earth System Science Ministry of Education Key Laboratory for Earth System Modeling Institute for Global Change Studies Tsinghua University China Institute for Interdisciplinary Information Sciences Tsinghua University China School of Computer Science and Engineering Nanyang Technological University Singapore Department and Computer and Science University of Science and Technology of China China
In practice, physical spatiotemporal forecasting can suffer from data scarcity, because collecting large-scale data is non-trivial, especially for extreme events. Hence, we propose BeamVQ, a novel probabilistic framew... 详细信息
来源: 评论
Data-Driven Active Power Dispatch for Wind Farms
Data-Driven Active Power Dispatch for Wind Farms
收藏 引用
Data Driven Control and Learning systems (DDCLS)
作者: Xuguo Jiao Daoyuan Zhang Xin Wang Zhaoxing Ma Zhenyong Zhang Wenfeng Liu School of Information and Control Engineering Qingdao University of Technology Qingdao China State Key Laboratory of Industrial Control Technology College of Control Science and Engineering Zhejiang University Hangzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Civil Engineering Qingdao University of Technology Qingdao China
Active power dispatch of wind farms plays an important role in power grid scheduling. In this paper, a data-driven active power dispatch strategy for wind farms is proposed, which uses the key point of minimizing the ... 详细信息
来源: 评论