咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是841-850 订阅
排序:
Free Adversarial Training with Layerwise Heuristic Learning  11th
Free Adversarial Training with Layerwise Heuristic Learning
收藏 引用
11th International Conference on Image and Graphics, ICIG 2021
作者: Zhang, Haitao Shi, Yucheng Dong, Benyu Han, Yahong Li, Yuanzhang Kuang, Xiaohui College of Intelligence and Computing and Tianjin Key Lab of Machine Learning Tianjin University Tianjin China Beijing Institute of Technology Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Due to the existence of adversarial attacks, various applications that employ deep neural networks (DNNs) have been under threat. Adversarial training enhances robustness of DNN-based systems by augmenting training da... 详细信息
来源: 评论
Applications of Multi-Agent Deep Reinforcement Learning with Communication in Network Management: A Survey
arXiv
收藏 引用
arXiv 2024年
作者: Pi, Yue Zhang, Wang Zhang, Yong Huang, Hairong Rao, Baoquan Ding, Yulong Yang, Shuanghua Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China Peng Cheng Laboratory Shenzhen China Huawei Technologies Co. Ltd. China Department of Computer Science University of Reading United Kingdom
With the advancement of artificial intelligence technology, the automation of network management, also known as Autonomous Driving Networks (ADN), is gaining widespread attention. The network management has shifted fr... 详细信息
来源: 评论
Fuzzy Safety and Liveness Properties in Linear-time
Fuzzy Safety and Liveness Properties in Linear-time
收藏 引用
IEEE International Conference on Software Quality, Reliability and security (QRS)
作者: Fan Shi Zhiqiu Huang Haiyu Pan Yuting Chang Heng Xu College of Computer Science and Technology/College of Software Nanjing University of Aeronautics and Astronautics Nanjing Jiangsu China Key Laboratory for Safety-critical Software Development and Verification Ministry of Industry and Information Technology Nanjing Jiangsu China School of Computer and Information Security/School of Software Guilin University of Electronic Technology Guilin Guangxi China Nokis Solutions and Networks System Technology (Beijing) Co. Ltd. Hangzhou Zhejiang China
Safety and liveness are fundamental to many system verification paradigms. In contrast to existing approaches for extending safety and liveness properties of fuzzy systems, we first utilize ultrametric to measure the ... 详细信息
来源: 评论
Neural Network-Based Safety Optimization Control for Constrained Discrete-Time systems
Neural Network-Based Safety Optimization Control for Constra...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Xueli Wang Shangwei Zhao Ming Yang Xiaoming Wu Xin Wang Shuo Xu Xu Hu Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Qilu University of Technology Jinan China Department of Automation Shanghai Jiao Tong University Shanghai China Public Security Bureau of Jinan Jinan China
This paper proposes a constraint-aware safety control approach via adaptive dynamic programming (ADP) to address the control optimization issues for discrete-time systems subjected to state constraints. First, the con...
来源: 评论
Unsupervised Fact-Checking via Recursively Verifying Presuppositions
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 2189-2199页
作者: Xiucheng Lyu Runcong Zhao Jiazheng Li Bin Liang Min Yang Lin Gui Ruifeng Xu School of Computer Science and Technology Harbin Institute of Technology (Shenzhen) Shenzhen China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Shenzhen China Department of Informatics King’s College London London U.K. Department of Computer Science and Engineering Chinese University of Hong Kong Hong Kong SAR China Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen China Peng Cheng Laboratory Shenzhen China
Presuppositions are implicit assumptions that interlocutors take for granted. Verifying presuppositions is crucial for reasoning-based fact-checking that aims to reason about True or False, but existing pipelines have... 详细信息
来源: 评论
A Deep Learning-Based Algorithm for Energy and Performance Optimization of Computational Offloading in Mobile Edge Computing
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Khan, Israr Raza, Salman Rehman, Waheed Ur Khan, Razaullah Nahida, Kiran Tao, Xiaofeng National Engineering Laboratory for Mobile Network Technologies Beijing University of Posts and Telecommunications Beijing100876 China Department of Computer Science National Textile University Faisalabad Pakistan Department of Computer Science University of Peshawar Peshawar Pakistan Department of Computer Science University of Engineering and Technology Mardan Pakistan Beijing Laboratory of Advanced Information Network Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications China
Mobile edge computing (MEC) has produced incredible outcomes in the context of computationally intensive mobile applications by offloading computation to a neighboring server to limit the energy usage of user equipmen... 详细信息
来源: 评论
An Operational Assessment Framework for Near Real-time Cropland Dynamics:Toward Sustainable Cropland Use in Mid-Spine Belt of Beautiful China
Journal of Remote Sensing
收藏 引用
Journal of Remote Sensing 2023年 第1期3卷 247-263页
作者: Zhenrong Du Le Yu Xin Chen Xiyu Li Dailiang Peng Shijun Zheng Pengyu Hao Jianyu Yang Huadong Guo Peng Gong Department of Earth System Science Ministry of Education Key Laboratory for Earth System ModelingInstitute for Global Change StudiesTsinghua UniversityBeijing 100084China Ministry of Education Ecological Field Station for East Asian Migratory Birds Beijing 100084China Tsinghua University(Department of Earth System Science)-Xi’an Institute of Surveying and Mapping Joint Research Center for Next-Generation Smart Mapping Beijing 100084China Key Laboratory of Digital Earth Science Aerospace Information Research InstituteChinese Academy of SciencesBeijing 100094China International Research Center of Big Data for Sustainable Development Goals Beijing 100094China University of Chinese Academy of Sciences Beijing 100049China Food and Agriculture Organization of the United Nations Viale delle Terme di Caracalla00153 RomeItaly College of Land Science and Technology China Agricultural UniversityBeijing 100193China Department of Geography Department of Earth Sciences and Institute for Climate and Carbon NeutralityUniversity of Hong KongHong Kong 999077China
Cropland monitoring is a crucial component for a broad user community from Land Use and Land Cover Change study to food security policy *** with the rich natural ecological environment and variable agricultural produc... 详细信息
来源: 评论
Multi-view Contrastive Learning for Medical Question Summarization
Multi-view Contrastive Learning for Medical Question Summari...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Sibo Wei Xueping Peng Hongjiao Guan Lina Geng Ping Jian Hao Wu Wenpeng Lu Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Australia Department of Blood Purification Qilu Hospital of Shandong University Jinan China School of Computer Science and Technology Beijing Institute of Technology Beijing China
Most Seq2Seq neural model-based medical question summarization (MQS) systems have a severe mismatch between training and inference, i.e., exposure bias. However, this problem remains unexplored in the MQS task. To bri... 详细信息
来源: 评论
Forensics Forest: Multi-scale Hierarchical Cascade Forest for Detecting GAN-generated Faces
Forensics Forest: Multi-scale Hierarchical Cascade Forest fo...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Jiucui Lu Yuezun Li Jiaran Zhou Bin Li Siwei Lyu Department of Computer Science and Technology Ocean University of China Qingdao China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China University at Buffalo State University of New York USA
We describe a simple and effective method called ForensicsForest to detect GAN-generate faces. Instead of using the commonly used CNN models, we describe a novel multi-scale hierarchical cascade forest, which takes se...
来源: 评论
Video key concept extraction using Convolution Neural Network
Video key concept extraction using Convolution Neural Networ...
收藏 引用
AI in Cybersecurity (ICAIC), International Conference on
作者: Tanvir H Sardar Ruhul Amin Hazarika Bishwajeet Pandey Guru Prasad M S Sk Mahmudul Hassan Radhakrishna Dodmane Hardik Gohel Dept. of Computer Science & Engg School of Technology (GST) GITAM University Bengaluru India Department of Information Technology Manipal Institute of Technology Bengaluru India Department of Intelligent System and Cyber Security Astana IT University Kazakhstan Dept. of Computer Science & Engg. Graphic Era (Deemed to be University) Dehradun India School of Computer Science and Engineering VIT-AP India Department of Computer Science & Engg. NMAM Institute of Technology Nitte India Department of CSE University of Houston Victoria USA
Objectives: This work aims to develop an automated video summarising methodology and timestamping that uses natural language processing (NLP) tools to extract significant video ***: The methodology comprises extractin...
来源: 评论