咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是831-840 订阅
排序:
Federated Meta Continual Learning for Efficient and Autonomous Edge Inference  24th
Federated Meta Continual Learning for Efficient and Autono...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Li, Bingze Ho, Stella Qu, Youyang Xu, Chenhao Luan, Tom H. Gao, Longxiang Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Department of Biomedical Engineering The University of Melbourne VIC Melbourne Australia School of Information Technology Deakin University VIC Geelong Australia School of Cyber Engineering Xidian University Xi’an China
With an increasing volume of data being collected and processed on edge, Federated Learning (FL) has become a dominant approach to train shared global models on distributed data held by diverse edge clients without ex... 详细信息
来源: 评论
SHFuzz:A Hybrid Fuzzing Method Assisted by Static Analysis for Binary Programs
收藏 引用
China Communications 2021年 第8期18卷 1-16页
作者: Wenjie Wang Donghai Tian Rui Ma Hang Wei Qianjin Ying Xiaoqi Jia Lei Zuo School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China Key Laboratory of Network Assessment Technology Institute of Information EngineeringChinese Academy of SciencesBeijing 100049China School of Cyber Security University of Chinese Academy of SciencesBeijing 100049China NSFOCUS Inc. Beijing 100089China
Fuzzing is an effective technique to find security bugs in programs by quickly exploring the input space of *** further discover vulnerabilities hidden in deep execution paths,the hybrid fuzzing combines fuzzing and c... 详细信息
来源: 评论
Utilizing Lexicon-enhanced Approach to Sensitive information Identification  27
Utilizing Lexicon-enhanced Approach to Sensitive Information...
收藏 引用
27th International Conference on Automation and Computing, ICAC 2022
作者: Cai, Lihua Zhou, Yujue Ding, Yulong Jiang, Jie Yang, Shuang-Hua Institute of Risk Analysis Prediction & Management Southern University of Science and Technology Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China Shenzhen Key Laboratory of Future Industrial Internet Safety and Security Southern University of Science and Technology Shenzhen China Academy for Advanced Interdisciplinary Studies Southern University of Science and Technology Shenzhen China Department of Computer Science University of Warwick CoventryCV4 7AL United Kingdom
Large-scale sensitive information leakage incidents have occurred frequently, causing huge impacts and losses to individuals, enterprises, and society. Most sensitive information exists in unstructured data, making it... 详细信息
来源: 评论
Scalability Oriented Consensus Group Selection Based on Transmission Delay between Nodes in Sharding Blockchains
SSRN
收藏 引用
SSRN 2023年
作者: Tao, Liping Lu, Yang Fan, Yuqi Wei, Zhen School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei230009 China Anhui Mine IOT and Security Monitoring Technology Key Laboratory Anhui Hefei230009 China
Sharding brings a promising prospect for the scalability of blockchain. Nevertheless, the small number of consensus nodes and the traditional fixed consensus nodes in each shard make that the consensus process of each... 详细信息
来源: 评论
BERT-based Sentiment Analysis of Chinese Online Social Movements  27
BERT-based Sentiment Analysis of Chinese Online Social Movem...
收藏 引用
27th International Conference on Automation and Computing, ICAC 2022
作者: Li, Hao Ding, Yulong Jiang, Jie Deng, Peng Yuan, Diping Yang, Shuang-Hua Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen China Southern University of Science and Technology Shenzhen Key Laboratory of Future Industrial Internet Safety and Security Shenzhen China Southern University of Science and Technology Academy for Advanced Interdisciplinary Studies Shenzhen China Shenzhen Urban Public Safety and Technology Institute Shenzhen China Ministry of Emergency Management Key Laboratory of Urban Safety Risk Monitoring and Early Warning Shenzhen China
Online social movements are a group of netizens with the same or similar purpose, spontaneously discussing and disseminating certain information, trying to attract more people to participate, and creating a public opi... 详细信息
来源: 评论
Mdct-Unet: A Dual-Encoder Network Combining Multi-Scale Dilated Convolutions with Transformer for Medical Image Segmentation
SSRN
收藏 引用
SSRN 2025年
作者: Chen, Zhengshi He, Juanjuan Liu, Xiaoming Tang, Jinshan College of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Health Informatics Department of Health Administration Policy George Mason University FairfaxVA22030 United States
Precise medical image segmentation is crucial in clinical diagnosis and pathological analysis. Most segmentation methods are based on U-shaped convolutional neural networks (U-Net). Although U-Net performs well in med... 详细信息
来源: 评论
Encrypted Finite-Horizon Energy-to-Peak State Estimation for Time-Varying systems Under Eavesdropping Attacks: Tackling Secrecy Capacity
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第4期10卷 985-996页
作者: Lei Zou Zidong Wang Bo Shen Hongli Dong Guoping Lu College of Information Science and Technology Donghua UniversityShanghai 201620 Engineering Research Center of Digitalized Textile and Fashion Technology Ministry of EducationShanghai 201620China College of Electrical Engineering and Automation Shandong University of Science and TechnologyQingdao 266590China Department of Computer Science Brunel University LondonUxbridgeMiddlesex UB83PHUK Intelligence Energy Research Institute Northeast Petroleum UniversityDaqing 163318 Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control Northeast Petroleum UniversityDaqing 163318 Sanya Offshore Oil&Gas Research Institute Northeast Petroleum UniversitySanya 572024China School of Electrical Engineering Nantong UniversityNantong 226019China
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying *** to the inherent vulnerability of network-based communication,the measurement s... 详细信息
来源: 评论
Covert and Reliable Semantic Communication Against Cross-Layer Privacy Inference over Wireless Edge Networks
Covert and Reliable Semantic Communication Against Cross-Lay...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Rui Xu Gaolei Li Zhaohui Yang Mingzhe Chen Yuchen Liu Jianhua Li School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai China College of Information Science and Electronic Engineering Zhejiang University Hangzhou China Electrical and Computer Engineering Department University of Miami USA Department of Computer Science NC State University USA
Semantic communication has emerged as a revolutionary paradigm within wireless edge networks, showcasing remarkable communication efficiency. In contrast to traditional bit-level communication systems, semantic commun... 详细信息
来源: 评论
Medical Visual Prompting (MVP): A Unified Framework for Versatile and High-Quality Medical Image Segmentation
Medical Visual Prompting (MVP): A Unified Framework for Vers...
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: Chen, Yulin Huang, Guoheng Huang, Kai Lin, Zijin Zhong, Guo Luo, Shenghong Deng, Jie Zhou, Jian School of Automation Guangdong University of Technology Guangzhou China School of Computer Science and Technology Guangdong University of Technology Guangzhou China School of Information Science and Technology Guangdong University of Foreign Studies Guangzhou China University of Macau Faculty of Science and Technology China The First Affiliated Hospital of Sun Yat-Sen University Department of Otorhinolaryngology Guangzhou China Sun Yat-Sen University Cancer Center Guangdong Key Laboratory of Nasopharyngeal Carcinoma Diagnosis and Therapy Guangzhou China South China Hospital Shenzhen University Shenzhen China
Accurate segmentation of lesion regions is crucial for clinical diagnosis and treatment across various diseases. While deep convolutional networks have achieved satisfactory results in medical image segmentation, they... 详细信息
来源: 评论
Ciphertext-only fault analysis on the Midori lightweight cryptosystem
收藏 引用
science China(information sciences) 2020年 第3期63卷 288-292页
作者: Wei LI Linfeng LIAO Dawu GU Shan CAO Yixin WU Jiayao LI Zhihong ZHOU Zheng GUO Ya LIU Zhiqiang LIU School of Computer Science and Technology Donghua University Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Key Laboratory of Integrate Administration Technologies for Information Security School of Microelectronics Shanghai Jiao Tong University Department of Computer Science and Engineering University of Shanghai for Science and Technology
Dear editor,The Midori lightweight cipher can be applied in the RFID tags and other low-resource devices to protect information on the Internet. This cipher was proposed by Banik et al. and presented at the ASIACRYPT ... 详细信息
来源: 评论