咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是791-800 订阅
排序:
Medical Visual Prompting (MVP): A Unified Framework for Versatile and High-Quality Medical Image Segmentation
Medical Visual Prompting (MVP): A Unified Framework for Vers...
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: Chen, Yulin Huang, Guoheng Huang, Kai Lin, Zijin Zhong, Guo Luo, Shenghong Deng, Jie Zhou, Jian School of Automation Guangdong University of Technology Guangzhou China School of Computer Science and Technology Guangdong University of Technology Guangzhou China School of Information Science and Technology Guangdong University of Foreign Studies Guangzhou China University of Macau Faculty of Science and Technology China The First Affiliated Hospital of Sun Yat-Sen University Department of Otorhinolaryngology Guangzhou China Sun Yat-Sen University Cancer Center Guangdong Key Laboratory of Nasopharyngeal Carcinoma Diagnosis and Therapy Guangzhou China South China Hospital Shenzhen University Shenzhen China
Accurate segmentation of lesion regions is crucial for clinical diagnosis and treatment across various diseases. While deep convolutional networks have achieved satisfactory results in medical image segmentation, they... 详细信息
来源: 评论
Ciphertext-only fault analysis on the Midori lightweight cryptosystem
收藏 引用
science China(information sciences) 2020年 第3期63卷 288-292页
作者: Wei LI Linfeng LIAO Dawu GU Shan CAO Yixin WU Jiayao LI Zhihong ZHOU Zheng GUO Ya LIU Zhiqiang LIU School of Computer Science and Technology Donghua University Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Key Laboratory of Integrate Administration Technologies for Information Security School of Microelectronics Shanghai Jiao Tong University Department of Computer Science and Engineering University of Shanghai for Science and Technology
Dear editor,The Midori lightweight cipher can be applied in the RFID tags and other low-resource devices to protect information on the Internet. This cipher was proposed by Banik et al. and presented at the ASIACRYPT ... 详细信息
来源: 评论
Fuzzy Safety and Liveness Properties in Linear-time
Fuzzy Safety and Liveness Properties in Linear-time
收藏 引用
IEEE International Conference on Software Quality, Reliability and security (QRS)
作者: Fan Shi Zhiqiu Huang Haiyu Pan Yuting Chang Heng Xu College of Computer Science and Technology/College of Software Nanjing University of Aeronautics and Astronautics Nanjing Jiangsu China Key Laboratory for Safety-critical Software Development and Verification Ministry of Industry and Information Technology Nanjing Jiangsu China School of Computer and Information Security/School of Software Guilin University of Electronic Technology Guilin Guangxi China Nokis Solutions and Networks System Technology (Beijing) Co. Ltd. Hangzhou Zhejiang China
Safety and liveness are fundamental to many system verification paradigms. In contrast to existing approaches for extending safety and liveness properties of fuzzy systems, we first utilize ultrametric to measure the ... 详细信息
来源: 评论
Neural Network-Based Safety Optimization Control for Constrained Discrete-Time systems
Neural Network-Based Safety Optimization Control for Constra...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Xueli Wang Shangwei Zhao Ming Yang Xiaoming Wu Xin Wang Shuo Xu Xu Hu Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Qilu University of Technology Jinan China Department of Automation Shanghai Jiao Tong University Shanghai China Public Security Bureau of Jinan Jinan China
This paper proposes a constraint-aware safety control approach via adaptive dynamic programming (ADP) to address the control optimization issues for discrete-time systems subjected to state constraints. First, the con...
来源: 评论
Free Adversarial Training with Layerwise Heuristic Learning  11th
Free Adversarial Training with Layerwise Heuristic Learning
收藏 引用
11th International Conference on Image and Graphics, ICIG 2021
作者: Zhang, Haitao Shi, Yucheng Dong, Benyu Han, Yahong Li, Yuanzhang Kuang, Xiaohui College of Intelligence and Computing and Tianjin Key Lab of Machine Learning Tianjin University Tianjin China Beijing Institute of Technology Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Due to the existence of adversarial attacks, various applications that employ deep neural networks (DNNs) have been under threat. Adversarial training enhances robustness of DNN-based systems by augmenting training da... 详细信息
来源: 评论
Unsupervised Fact-Checking via Recursively Verifying Presuppositions
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 2189-2199页
作者: Xiucheng Lyu Runcong Zhao Jiazheng Li Bin Liang Min Yang Lin Gui Ruifeng Xu School of Computer Science and Technology Harbin Institute of Technology (Shenzhen) Shenzhen China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Shenzhen China Department of Informatics King’s College London London U.K. Department of Computer Science and Engineering Chinese University of Hong Kong Hong Kong SAR China Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen China Peng Cheng Laboratory Shenzhen China
Presuppositions are implicit assumptions that interlocutors take for granted. Verifying presuppositions is crucial for reasoning-based fact-checking that aims to reason about True or False, but existing pipelines have... 详细信息
来源: 评论
Applications of Multi-Agent Deep Reinforcement Learning with Communication in Network Management: A Survey
arXiv
收藏 引用
arXiv 2024年
作者: Pi, Yue Zhang, Wang Zhang, Yong Huang, Hairong Rao, Baoquan Ding, Yulong Yang, Shuanghua Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China Peng Cheng Laboratory Shenzhen China Huawei Technologies Co. Ltd. China Department of Computer Science University of Reading United Kingdom
With the advancement of artificial intelligence technology, the automation of network management, also known as Autonomous Driving Networks (ADN), is gaining widespread attention. The network management has shifted fr... 详细信息
来源: 评论
A Deep Learning-Based Algorithm for Energy and Performance Optimization of Computational Offloading in Mobile Edge Computing
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Khan, Israr Raza, Salman Rehman, Waheed Ur Khan, Razaullah Nahida, Kiran Tao, Xiaofeng National Engineering Laboratory for Mobile Network Technologies Beijing University of Posts and Telecommunications Beijing100876 China Department of Computer Science National Textile University Faisalabad Pakistan Department of Computer Science University of Peshawar Peshawar Pakistan Department of Computer Science University of Engineering and Technology Mardan Pakistan Beijing Laboratory of Advanced Information Network Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications China
Mobile edge computing (MEC) has produced incredible outcomes in the context of computationally intensive mobile applications by offloading computation to a neighboring server to limit the energy usage of user equipmen... 详细信息
来源: 评论
Multi-view Contrastive Learning for Medical Question Summarization
Multi-view Contrastive Learning for Medical Question Summari...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Sibo Wei Xueping Peng Hongjiao Guan Lina Geng Ping Jian Hao Wu Wenpeng Lu Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Australia Department of Blood Purification Qilu Hospital of Shandong University Jinan China School of Computer Science and Technology Beijing Institute of Technology Beijing China
Most Seq2Seq neural model-based medical question summarization (MQS) systems have a severe mismatch between training and inference, i.e., exposure bias. However, this problem remains unexplored in the MQS task. To bri... 详细信息
来源: 评论
Forensics Forest: Multi-scale Hierarchical Cascade Forest for Detecting GAN-generated Faces
Forensics Forest: Multi-scale Hierarchical Cascade Forest fo...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Jiucui Lu Yuezun Li Jiaran Zhou Bin Li Siwei Lyu Department of Computer Science and Technology Ocean University of China Qingdao China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China University at Buffalo State University of New York USA
We describe a simple and effective method called ForensicsForest to detect GAN-generate faces. Instead of using the commonly used CNN models, we describe a novel multi-scale hierarchical cascade forest, which takes se...
来源: 评论