咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是761-770 订阅
排序:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
Fourier-Reflexive Partitions Induced by Poset Metric
Fourier-Reflexive Partitions Induced by Poset Metric
收藏 引用
作者: Xu, Yang Kan, Haibin Han, Guangyue Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China Fudan-Zhongan Joint Laboratory of Blockchain and Information Security Shanghai Engineering Research Center of Blockchain Fudan University Shanghai200433 China Department of Mathematics Faculty of Science The University of Hong Kong Hong Kong
Let H be the cartesian product of a family of finite abelian groups indexed by a finite set Ω. A given poset (i.e., partially ordered set) P = (Ω, ≤P) gives rise to a poset metric on H, which further leads to a par... 详细信息
来源: 评论
Laws of Quantum Programming
arXiv
收藏 引用
arXiv 2024年
作者: Ying, Mingsheng Zhou, Li Barthe, Gilles Centre for Quantum Software and Information University of Technology Sydney Ultimo Australia Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Max Plamck Institute for Security and Privacy Bochum Germany IMDEA Software Institute Madrid Spain
In this paper, we investigate the fundamental laws of quantum programming. We extend a comprehensive set of Hoare et al.’s basic laws of classical programming to the quantum setting. These laws characterise the algeb... 详细信息
来源: 评论
Anomaly Detection Using Multiscale C-LSTM for Univariate Time-Series
收藏 引用
security and Communication Networks 2023年 第1期2023卷
作者: Lu, Yi-Xiang Jin, Xiao-Bo Liu, Dong-Jie Zhang, Xin-Chang Geng, Guang-Gang College of Information Science and Technology College of Cyber Security Jinan University Guangzhou510632 China Intelligent Science Department Xi'An Jiaotong-Liverpool University Suzhou215123 China Computer Network Information Center Chinese Academy of Sciences Beijing100190 China College of Computer Science and Technology The Shandong Provincial Key Laboratory of Computer Networks Qilu University of Technology Shandong Academy of Sciences Jinan250014 China
computers generate network traffic data when people go online, and devices generate sensor data when they communicate with each other. When events such as network intrusion or equipment failure occur, the correspondin... 详细信息
来源: 评论
Hierarchical Recording Architecture for Three-Dimensional Magnetic Recording
arXiv
收藏 引用
arXiv 2025年
作者: Jian, Yugen Luo, Ke Chen, Jincai Fong, Xuanyao Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Wuhan430074 China Department of Electrical and Computer Engineering National University of Singapore Singapore117583 Singapore School of Computer of Science and Technology Huazhong University of Science and Technology Wuhan430074 China Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China Wuhan430074 China
Three-dimensional magnetic recording (3DMR) is a highly promising approach to achieving ultra-large data storage capacity in hard disk drives. One of the greatest challenges for 3DMR lies in performing sequential and ... 详细信息
来源: 评论
Evaluating the Performance to Detecting Topic Shift of Large Language Models: A Study
Evaluating the Performance to Detecting Topic Shift of Large...
收藏 引用
6th International Conference on Intelligent Computing and Signal Processing (ICSP)
作者: Pingfang Tian Deting Liu Department of Computer Science and Technology Wuhan University of Science and Technology Wuhan China The Key Laboratory of the Rich Media Knowledge Organisation and Service of Digital Publishing Content Institute of Scientific and Technical Information of China Beijing China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan China
Topic shift detection aims to identify whether there is a change in the current topic of conversation or if a change is needed. The study found previous work did not evaluate the performance of large language models l... 详细信息
来源: 评论
High Performance Distributed Control Law for Large-Scale Linear systems: A Partitioned Distributed Observer Approach
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Haotian Liu, Shuai Shi, Ling Department of Automation Shanghai Jiao Tong University Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology Hong Kong
In recent years, the distributed-observer-based distributed control law has shown powerful ability to arbitrarily approximate the centralized control performance. However, the traditional distributed observer requires... 详细信息
来源: 评论
Distributionally Robust Optimization for Computation Offloading in Aerial Access Networks
Distributionally Robust Optimization for Computation Offload...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Jiang, Guanwang Jia, Ziye He, Lijun Dong, Chao Wu, Qihui Han, Zhu Nanjing University of Aeronautics and Astronautics Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Nanjing211111 China Northwestern Polytechnical University School of Software Xi'an710072 China University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States
With the rapid increment of multiple users for data offloading and computation, it is challenging to guarantee the quality of service (QoS) in remote areas. To deal with the challenge, it is promising to combine aeria... 详细信息
来源: 评论
ASDIA: An Adversarial Sample to Preserve Privacy Program in Federated Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Tian, Shujuan Tan, Yi Wang, Han Liu, Haolin Li, Zhetao Xiangtan University School of Computer Science School of Cyberspace Security Xiangtan China Xiangtan University Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan411105 China Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan411105 China Department of Electrical Engineering and Computer Science University of Kansas 1520 W 15th St LawrenceKS United States Jinan University College of Information Science and Technology Guangzhou510632 China
Federated learning enables training across multiple entities while ensuring data security and the effectiveness of knowledge dissemination. Despite its benefits, it remains susceptible to privacy breaches by both exte... 详细信息
来源: 评论
Parallel Adaptive Network for Polyp Segmentation  9
Parallel Adaptive Network for Polyp Segmentation
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Yu, Xiaoyang Zhong, Yanjie Yan, Xiao Jian, Muwei Liu, Hongzhe Xu, Cheng Shandong University of Finance and Economics College of Computer Science and Technology Jinan China The First Affiliated Hospital of Ningbo University Ningbo Clinical Research Center for Hematologic Malignancie Department of Haematology Ningbo China Shandong University of Finance and Economics School of Information Science and Technology Jinan China Beijing Union University Beijing Key Laboratory of Information Service Engineering Beijing China
This paper proposes a parallel adaptive network named PA-Net for polyp segmentation, which enables to dynamically adjust convolution kernels and attention weights according to the input. It enhances the focus on key r... 详细信息
来源: 评论