咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是851-860 订阅
排序:
Deep Reinforcement Learning based Reliability-aware Resource Placement and Task Offloading in Edge Computing
Deep Reinforcement Learning based Reliability-aware Resource...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Jingyu Liang Zihan Feng Han Gao Ying Chen Jiwei Huang Hong-Linh Truong Beijing Key Laboratory of Petroleum Data Mining China University of Petroleum Beijing China School of Computer Science Beijing Information Science and Technology University Beijing China Department of Computer Science School of Science Aalto University Espoo Finland
With the rapid development of 5G technology, the service demand in various application scenarios is continuously increasing. Mobile edge computing (MEC) has become a popular computing paradigm by placing services and ... 详细信息
来源: 评论
Query-guided Prototype Evolution Network for Few-Shot Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Cong, Runmin Xiong, Hang Chen, Jinpeng Zhang, Wei Huang, Qingming Zhao, Yao Institute of Information Science Beijing Jiaotong University Beijing100044 China School of Control Science and Engineering Shandong University Jinan250061 China Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan250061 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Department of Computer Science City University of Hong Kong Hong Kong School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China
Previous Few-Shot Segmentation (FSS) approaches exclusively utilize support features for prototype generation, neglecting the specific requirements of the query. To address this, we present the Query-guided Prototype ... 详细信息
来源: 评论
Hyperbolic Neural Network Based Preselection for Expensive Multi-Objective Optimization
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 1-1页
作者: Li, Bingdong Yang, Yanting Hong, Wenjing Yang, Peng Zhou, Aimin Shanghai Institute of AI for Education the School of Computer Science and Technology and the Shanghai Frontiers Science Center of Molecule Intelligent Syntheses East China Normal University Shanghai China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science and Engineering Guangdong Key Laboratory of Brain-Inspired Intelligent Computation Southern University of Science and Technology Shenzhen China
A series of surrogate-assisted evolutionary algorithms (SAEAs) have been proposed for expensive multi-objective optimization problems (EMOPs), building cheap surrogate models to replace the expensive real function eva... 详细信息
来源: 评论
Frogmen Formation Voice Communication technology Based on Fast ICA
Frogmen Formation Voice Communication Technology Based on Fa...
收藏 引用
2021 OES China Ocean Acoustics, COA 2021
作者: Zhang, Xiao Liu, Xiaomeng Jilin University College of Computer Science and Technology Chang Chun China College of Underwater Acoustic Engineering Harbin Engineering University Acoustic Science and Technology Laboratory Key Laboratory of Marine Information Acquisition and Security Harbin China
Frogmen formation voice communication has become a mega trend nowadays. Among various methods of modulation, single side band (SSB) multi-user voice communication system holds the advantages of remaining speakers'... 详细信息
来源: 评论
Gesture Builder: Flexible Gesture Customization and Efficient Recognition on VR Devices
收藏 引用
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2025年 第2期9卷 1-37页
作者: Yang Zou Yanguang Wan Yonghao Zhang Xiao Zhou Jian Cheng Cuixia Ma Chun Yu Xiaoming Deng Hongan Wang Institute of Software Chinese Academy of Sciences Beijing China and University of Chinese Academy of Sciences Beijing China Aerospace Information Research Institute Chinese Academy of Sciences Beijing China Institute of Software Chinese Academy of Sciences Beijing China School of Computer Science and Technology and University of Chinese Academy of Sciences Beijing China Key Laboratory of System Software Chinese Academy of Sciences) and State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Institute of Software Chinese Academy of Sciences Beijing China
In the realm of VR/MR interactions, gestures serve as a critical bridge between users and interfaces, with custom gestures enhancing creativity and providing a personalized immersive experience. We introduce a novel g... 详细信息
来源: 评论
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control with On-chain and Off-chain system
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Chao Hou, Cankun Jiang, Tianyu Ning, Jianting Qiao, Hui Wu, Yusen Fujian Provincial Key Laboratory of Data Intensive Computing the Key Laboratory of Intelligent Computing and Information Processing Fujian China The School of Computer Science and Technology Xidian University Shaanxi Xi’an710071 China The Department of Computer Science University of Miami MiamiFL33146 United States College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China The Faculty of Data Science City University of Macau China
Data-driven landscape across finance, government, and healthcare, the continuous generation of information demands robust solutions for secure storage, efficient dissemination, and fine-grained access control. Blockch... 详细信息
来源: 评论
U-HRMLP: Refining Segmentation Boundaries in Histopathology Images
U-HRMLP: Refining Segmentation Boundaries in Histopathology ...
收藏 引用
IEEE International Symposium on Biomedical Imaging
作者: Tao Wang Kai Zhang Weijie Wang Mingrui Ma Ye Zhang He Zhao Guixia Liu College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China School of Information Science and Engineering Shandong Normal University China Department of Information Engineering and Computer Science University of Trento Italy Faculty of Information Engineering and Automation Kunming University of Science and Technology China School of Information Science and Technology Northeast Normal University China
Segmenting regions of interest in histopathology images is a critical prerequisite for biomedical applications. CNN-based models have advanced medical image segmentation, yet accurately delineating boundaries is still... 详细信息
来源: 评论
Improved Underwater Acoustic Voice Communication Based on Blind Separation  3
Improved Underwater Acoustic Voice Communication Based on Bl...
收藏 引用
3rd IEEE International Conference on Communications, information system and computer Engineering, CISCE 2021
作者: Zhang, Xiao Liu, Xiaomeng College of Computer Science and Technology Jilin University Chang Chun China Acoustic Science and Technology Laboratory Key Laboratory of Marine Information Acquisition and Security College of Underwater Acoustic Engineering Harbin Engineering University Harbin China
Frogman underwater voice communication system is an indispensable equipment for underwater frogman combat. Among various methods of modulation, SSB voice communication system holds the advantages of high stability and... 详细信息
来源: 评论
Factored Trace Lasso Based Linear Regression Methods: Optimizations and Applications  5th
Factored Trace Lasso Based Linear Regression Methods: Optimi...
收藏 引用
5th International Conference on Cognitive systems and Signal Processing, ICCSIP 2020
作者: Zhang, Hengmin Du, Wenli Liu, Xiaoqian Zhang, Bob Qian, Feng School of Information Science and Engineering Key Laboratory of Advanced Control and Optimization for Chemical Processes Ministry of Education East China University of Science and Technology Shanghai200237 China Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Department of Computer and Information Science University of Macau 999078 China
Consider that matrix trace lasso regularized convex p -norm with p= 1, 2 regression methods usually have the higher computational complexity due to the singular value decomposition (SVD) of larger size matrix in big d... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论