咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是801-810 订阅
排序:
A Power-system Economic Dispatching Based on Enhanced Group Search Optimizer  1
收藏 引用
18th International Conference on Intelligent information Hiding and Multimedia Signal Processing, IIH-MSP 2022
作者: Pan, Jeng-Shyang Nguyen, Trong-The Nguyen, Trinh-Dong Nguyen, Vinh-Tiep Dao, Thi-Kien College of Computer Science and Engineering Shandong University of Science and Technology Qing-Dao266590 China Department of Information Management Chaoyang University of Technology Taichung41349 Taiwan University of Information Technology Ho Chi Minh City700000 Viet Nam Vietnam National University Ho Chi Minh City700000 Viet Nam Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China
Economic dispatch (ED) is one of the critical tasks in a power system’s optimization issues, but its characteristics with non-convex, high-dimensional, non-linear, and non-differentiable, so that caused solutions are... 详细信息
来源: 评论
Geometric Constellation Shaping for Wireless Optical Intensity Channels: An information-Theoretic Approach
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Suhua Li, Tianqi Fang, Zhaoxi Zhou, Jing Zhang, Wenyi School of Automation Beijing Information Science and Technology University Beijing100192 China National Computer System Engineering Research Institute of China Beijing100083 China Department of Computer Science and Engineering Shaoxing University Shaoxing312000 China Henan Key Laboratory of Visible Light Communications Zhengzhou450002 China Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei230027 China
A simple geometric shaping method is proposed for optical wireless communication systems based on intensity modulation and direct detection (IM/DD) from an information-theoretic perspective. Constellations consisting ... 详细信息
来源: 评论
Space-Air-Ground Integrated Network with Native Intelligence(NI-SAGIN):Concept,Architecture,Access and Networking
收藏 引用
China Communications 2022年 第1期19卷 I0002-I0007页
作者: Zhenyu Xiao Qihui Wu Jiajia Liu Ning Zhang Tao Sun the School of Electronic and Information Engineering Beihang University IET China Institute of Communications and of Electronics the Nanjing University of Aeronautics and Astronautics(NUAA) key lab of Ministry of Industry and Information Technology of China the School of Cybersecurity Northwestern Polytechnical University Shaanxi Provincial Engineering Laboratory of Cyber Security Xi’an Unmanned System Security and Intelligent Communications ISTC Center IEEE IOT-AHSN TC IEEE Communications Society1 IEEE Vehicular Technology Society1 the Department of Electrical and Computer Engineering at University of Windsor1 China Mobile Research Institute1 GPP SA21 China Mobile’s 3GPP SA and CT groups
Ubiquitous coverage is one of the most important goals for mobile communication *** achieve this,integration of space,air,and ground networks is highly demanded,which expects to become the one of the enabling technolo... 详细信息
来源: 评论
Bandwidth-Efficient Two-Server ORAMs with O(1) Client Storage
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Wei Zhang, Xianglong Xu, Peng Chen, Rongmao Yang, Laurence Tianruo School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Jinyinhu Laboratory Wuhan430040 China School of Computer National University of Defense Technology Changsha410073 China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou450001 China Department of Computer Science St. Francis Xavier University AntigonishNSB2G 2W5 Canada
Oblivious RAM (ORAM) allows a client to securely retrieve elements from outsourced servers without leakage about the accessed elements or their virtual addresses. Two-server ORAM, designed for secure two-party RAM com... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
DHD: Double Hard Decision Decoding Scheme for NAND Flash Memory
DHD: Double Hard Decision Decoding Scheme for NAND Flash Mem...
收藏 引用
2025 Design, Automation and Test in Europe Conference, DATE 2025
作者: Cui, Lanlan Wang, Yichuan Xiao, Renzhi Li, Miao Liu, Xiaoxue Hei, Xinhong School of Computer Science and Engineering XI'AN University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Software Engineering Jiangxi University of Science and Technology Nanchang China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
With the advancement of NAND flash technology, the increased storage density leads to intensified interference, which in turn raises the error rate during data retrieval. To ensure data reliability, low-density parity... 详细信息
来源: 评论
ATEDU-NET: An Attention-Embedded Deep Unet for multi-disease diagnosis in chest X-ray images, breast ultrasound, and retina fundus
收藏 引用
computers in Biology and Medicine 2025年 186卷 109708-109708页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Agbesi, Victor K. Ejiyi, Makuachukwu Bennedith Chikwendu, Ijeoma A. Bamisile, Oluwatoyosi F. Onyekwere, Favour Ezinne Bamisile, Olusola O. College of Nuclear Technology and Automation Engineering Chengdu University of Technology Sichuan 610059 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Pharmacy Department University of Nigeria Nsukka Enugu State Nsukka Nigeria School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
In image segmentation for medical image analysis, effective upsampling is crucial for recovering spatial information lost during downsampling. This challenge becomes more pronounced when dealing with diverse medical i... 详细信息
来源: 评论
PIOD: An Efficient Parallel Iterative Algorithm for Solving Over-determined Equations
PIOD: An Efficient Parallel Iterative Algorithm for Solving ...
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Min Tian Zhenguo Wei Yanlong Li Wei Du Lei Xiao Chaoshuai Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan Key Laboratory of High Performance Computing Jinan Institute of Supercomputing Technology
The solution of over-determined equations plays a very important role in fields such as data fitting, signal processing, and machine learning. It is of great significance in predicting natural phenomena, optimizing en...
来源: 评论
An Enhanced Resource Selection Scheme for Efficient Intra-Platoon Message Delivery
An Enhanced Resource Selection Scheme for Efficient Intra-Pl...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Wang, Bingying Zheng, Jun Li, Cheng Nanjing University of Information Science and Technology School of Electronics and Information Engineering Nanjing210044 China Southeast University National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Purple Mountain Laboratories Nanjing211111 China Simon Fraser University School of Engineering Science BurnabyBCV5A 1S6 Canada Memorial University Department of Electrical and Computer Engineering St. John'sNLA1B 3X5 Canada
This paper proposes an enhanced resource selection (eInP-RS) scheme for efficient intra-platoon message delivery of cooperative awareness messages (CAMs) and decentralized environmental notification messages (DENMs). ... 详细信息
来源: 评论
What limits limits?
收藏 引用
National science Review 2021年 第1期8卷 11-14页
作者: Yong-Chun Liu Kun Huang Yun-Feng Xiao Lan Yang Cheng-Wei Qiu State Key Laboratory of Low-Dimensional Quantum Physics Department of Physics Frontier Science Center for Quantum Information Tsinghua University Department of Optics and Optical Engineering University of Science and Technology of China State Key Laboratory for Mesoscopic Physics and Frontiers Science Center for Nano-optoelectronics School of Physics Peking University Department of Electrical and Systems Engineering Washington University Department of Electrical and Computer Engineering National University of Singapore
There are fundamental rules and principles setting the limits of physical systems. It triggers an interesting thought—can we break the limits under specific circumstances? A realistic system can only provide limited ...
来源: 评论