咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是821-830 订阅
排序:
PAIL: Performance based Adversarial Imitation Learning Engine for Carbon Neutral Optimization
arXiv
收藏 引用
arXiv 2024年
作者: Ye, Yuyang Tang, Lu-An Wang, Haoyu Yu, Runlong Yu, Wenchao He, Erhu Chen, Haifeng Xiong, Hui Department of Management Science and Information Systems Rutgers Business School Rutgers University NewarkNJ United States Department of Data Science and System Security NEC Laboratories PrincetonNJ United States Department of Computer Science University of Pittsburgh PittsburghPA United States Department of Computer Science and Engineering The Hong Kong University of Science and Technology Guangzhou China
Achieving carbon neutrality within industrial operations has become increasingly imperative for sustainable development. It is both a significant challenge and a key opportunity for operational optimization in industr... 详细信息
来源: 评论
Compression Meets security: Low-Complexity Linear Collaborative Federated Learning with Enhanced Accuracy
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Wang, Tianshun Li, Peichun Feng, Panpan Wei, Xin Qian, Liping Wu, Yuan Nanjing University of Posts and Telecommunications School of Communication and Information Engineering Nanjing China University of Macau State Key Laboratory of Internet of Things for Smart City China University of Macau Department of Computer and Information Science China Zhejiang University of Technology Institute of Cyberspace Security Hangzhou310023 China
Federated learning (FL) has been regarded as a promising paradigm for enabling distributed model training over resource-limited edge devices. Although FL maintains data locality and enhances model generalization, it f... 详细信息
来源: 评论
Multi-View Incongruity Learning for Multimodal Sarcasm Detection
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Diandian Cao, Cong Yuan, Fangfang Liu, Yanbing Zeng, Guangjie Yu, Xiaoyan Peng, Hao Yu, Philip S. Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science University of Illinois Chicago United States
Multimodal sarcasm detection (MSD) is essential for various downstream tasks. Existing MSD methods tend to rely on spurious correlations. These methods often mistakenly prioritize non-essential features yet still make... 详细信息
来源: 评论
Domain decomposition based on the spectral element method for frequency-domain computational elastodynamics
收藏 引用
science China Earth sciences 2021年 第3期64卷 388-403页
作者: Linlin SHI Mingwei ZHUANG Yuanguo ZHOU Na LIU Qinghuo LIU Institute of Electromagnetics and Acoustics and Key Laboratory of Electromagnetic Wave Science and Detection Technology Xiamen UniversityXiamen 361005China The Fifth Electronics Research Institute of Ministry of Industry and Information Technology Guangzhou 510610China College of Communication and Information Engineering Xi’an University of Science and TechnologyXi’an 710054China Department of Electrical and Computer Engineering Duke UniversityDurhamNC 27708USA
We propose a domain decomposition method based on the spectral element method(DDM-SEM)for elastic wave computation in frequency *** combines the high accuracy of the spectral element method and the high degree of para... 详细信息
来源: 评论
E2: Entropy Discrimination and Energy Optimization for Source-free Universal Domain Adaptation
E2: Entropy Discrimination and Energy Optimization for Sourc...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Meng Shen Andy J. Ma Pong C. Yuen School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Department of Computer Science Hong Kong Baptist University Hong Kong
Universal domain adaptation (UniDA) transfers knowledge under both distribution and category shifts. Most UniDA methods accessible to source-domain data during model adaptation may result in privacy policy violation a...
来源: 评论
AUTOMATIC CHINESE NATIONAL PENTATONIC MODES RECOGNITION USING CONVOLUTIONAL NEURAL NETWORK  23
AUTOMATIC CHINESE NATIONAL PENTATONIC MODES RECOGNITION USIN...
收藏 引用
23rd International Society for Music information Retrieval Conference, ISMIR 2022
作者: Wang, Zhaowen Che, Mingjin Yang, Yue Meng, Wenwu Li, Qinyu Xia, Fan Li, Wei Department of Music AI and Information Technology Central Conservatory of Music China College of Experimental Art Sichuan Conservatory of Music China School of Computer Science and Technology Fudan University China Shanghai Key Laboratory of Intelligent Information Processing Fudan University China
Chinese national pentatonic modes, with five tones of Gong, Shang, Jue, Zhi and Yu as the core, play an essential role in traditional Chinese music culture. After the early twentieth century, with the development of n... 详细信息
来源: 评论
Robust Phase Retrieval from Quantized and Noisy Measurements
Robust Phase Retrieval from Quantized and Noisy Measurements
收藏 引用
Acoustics, Speech, and Signal Processing Workshops (ICASSPW), IEEE International Conference on
作者: Yihong Gao Luteng Zhu Zhuoyang An Mingjie Shao Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong SAR China School of Information Science and Engineering Shandong University Qingdao China Computer School Beijing Information Science and Technology University Beijing China Key Laboratory of System and Control AMSS Chinese Academy of Sciences Beijing China
The phase retrieval (PR) problem involves recovering a signal from amplitude-only measurements and has been extensively studied in various physical measurement and signal processing systems. Recently, there has been i... 详细信息
来源: 评论
Target-Oriented WiFi Sensing for Respiratory Healthcare: from Indiscriminate Perception to In-Area Sensing
收藏 引用
IEEE Network 2024年
作者: Wang, Meng Huang, Jinyang Zhang, Xiang Liu, Zhi Li, Meng Zhao, Peng Yan, Huan Sun, Xiao Dong, Mianxiong Hefei University of Technology Anhui Province Key Laboratory of Affective Computing and Advanced Intelligence Machine School of Computer and Information Hefei230601 China University of Science and Technology of China CAS Key Laboratory of Electromagnetic Space Information Hefei230026 China The University of Electro-Communications Department of Computer and Network Engineering Tokyo1828585 Japan Guizhou Normal University School of Big Data and Computer Science Guiyang550025 China Muroran Institute of Technology Department of Sciences and Informatics 0508585 Japan
Driven by the vision of integrated sensing and communication (ISAC) toward 6G technology, the WiFi-based respiration sensing approach has emerged as a highly competitive candidate for advanced healthcare services. Nev... 详细信息
来源: 评论
Physically Secure and Privacy-Preserving Authentication Scheme for VANET
Physically Secure and Privacy-Preserving Authentication Sche...
收藏 引用
Artificial Intelligence of Things and systems (AIoTSys), International Conference on
作者: Dongmei Chen Yangfan Liang Lihui Li Yining Liu School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems Jiaxing University Jiaxing China School of Data Science and Artificial Intelligence Wenzhou University of Technology Wenzhou China
The communication between vehicles and other entities occurs over open wireless networks, making them susceptible to various security attacks In Vehicular Ad Hoc Network (VANET). Consequently, many researchers have pr... 详细信息
来源: 评论
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Jinhuan Chen, Pengtao Xu, Xinyao Wu, Jiajing Shen, Meng Xuan, Qi Yang, Xiaoniu Zhejiang University of Technology Institute of Cyberspace Security College of Information Engineering Hangzhou310023 China ZJUT Binjiang Institute of Artificial Intelligence Hangzhou310056 China Fudan University Adaptive Networks and Control Lab Department of Electronic Engineering School of Information Science and Technology Shanghai200433 China Sun Yat-sen University School of Computer Science and Engineering Guangzhou510006 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Shenzhen518066 China National Key Laboratory of Electromagnetic Space Security Jiaxing314033 China
Due to the decentralized and public nature of the blockchain ecosystem, malicious activities on the Ethereum platform impose immeasurable losses on users. At the same time, the transparency of cryptocurrency transacti... 详细信息
来源: 评论