咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是861-870 订阅
排序:
Formal Model of ATM Based on Object Constraint Language (OCL)
Formal Model of ATM Based on Object Constraint Language (OCL...
收藏 引用
International Conference on Engineering and Emerging Technologies (ICEET)
作者: Irfan Ahmed Sadia Naseer Umm - e - Habiba Jabar Mahmood Shehzad Ashraf Chaudhry Khadija Batool Department of Computer Science University of Sialkot Sialkot Pakistan State Key Laboratory of Blockchain School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Hangzhou China Department of Computer Science and Information Technology College of Engineering Abu Dhabi University Abu Dhabi U.A.E International Institute of Science Arts and Technology (IISAT) Gujranwala Pakistan
Formal methods (FM) are innovative methods which employ mathematical notations to specify explicit and precise requirements. This paper presents a formal model of an automated teller machine (ATM) using Object Constra... 详细信息
来源: 评论
Joint Secure Beamforming for RIS-Aided Integrated Multibeam-Satellite Terrestrial Networks
Joint Secure Beamforming for RIS-Aided Integrated Multibeam-...
收藏 引用
Future Communications and Networks (FCN), International Conference on
作者: Yu Zhang Yang Yang Shuangrui Zhao Teng Li Yulong Shen Xiaohong Jiang Jianfeng Ma School of Computer Science and Technology Xidian University Xi’an China Shaanxi Key Laboratory of Network and System Security Xidian University Xi’an China School of Cyber Engineering Xidian University Xi’an China School of Systems Information Science Future University Hakodate Japan
This paper focuses on a reconfigurable intelligent surface (RIS) enabled integrated multibeam-satellite terrestrial network, which consists of a satellite, a base station (BS), an RIS, multiple earth stations (ESs), a... 详细信息
来源: 评论
Efficient multimodal cancelable biometric system based on steganography and cryptography
收藏 引用
Iran Journal of computer science 2023年 第2期6卷 109-121页
作者: Salama, Gerges M. El-Gazar, Safaa Nassar, Rana M. El-Shafai, Walid Khalaf, Ashraf A. M. El-Banby, Ghada M. Hamed, Hesham F. A. El-Samie, Fathi E. Abd Department of Electrical Engineering Faculty of Engineering Minia University Minia 61111 Egypt Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt Security Engineering Laboratory Department of Computer Science Prince Sultan University Riyadh 11586 Saudi Arabia Department of Industrial Electronics and Control Engineering Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt Department of Electrical Engineering Faculty of Engineering Egyptian-Russian University Cairo Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh 84428 Saudi Arabia
Due to the development of hacking programs, it has become easy to penetrate systems. Hence, there is a need for strong security mechanisms. The use of traditional passwords has become insufficient to secure systems. B... 详细信息
来源: 评论
Significance-aware Medication Recommendation with Medication Representation Learning
Significance-aware Medication Recommendation with Medication...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yishuo Li Zhufeng Shao Weimin Chen Shoujin Wang Yuehan Du Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Mental Health Center Jinan China Data Science Institute University of Technology Sydney Sydney Australia Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The goal of medication recommendation system is to recommend appropriate pharmaceutical interventions based on a patient’s diagnosis. Most of existing approaches often formulate these recommendations use data on diag... 详细信息
来源: 评论
Safe Probabilistic Invariance Verification for Stochastic Discrete-Time Dynamical systems
Safe Probabilistic Invariance Verification for Stochastic Di...
收藏 引用
IEEE Conference on Decision and Control
作者: Yiqing Yu Taoran Wu Bican Xia Ji Wang Bai Xue Department of Information Science School of Mathematical Sciences Peking University China State Key Laboratory of Computer Science Institute of Software CAS China State Key Laboratory of High Performance Computing and College of Computer Science and Technology National University of Defense Technology China
Ensuring safety through set invariance has proven a useful method in a variety of applications in robotics and control. In this paper, we focus on the safe probabilistic invariance verification problem for discrete-ti...
来源: 评论
Online Discriminative Semantic-Preserving Hashing for Large-Scale Cross-Modal Retrieval  18th
Online Discriminative Semantic-Preserving Hashing for Large-...
收藏 引用
18th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2021
作者: Yi, Jinhan He, Yi Liu, Xin Department of Computer Science and Technology Huaqiao University Xiamen361021 China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Nanjing University of Science and Technology Nanjing210094 China Xiamen Key Laboratory of Computer Vision and Pattern Recognition Xiamen China Fujian Key Laboratory of Big Data Intelligence and Security Xiamen China
Cross-modal hashing has drawn increasing attentions for efficient retrieval across different modalities, and existing methods primarily learn the hash functions in a batch based mode, i.e., offline methods. Neverthele... 详细信息
来源: 评论
Federated Learning-Based Intelligent Indoor Smoke and Fire Detection system for Smart Buildings
Federated Learning-Based Intelligent Indoor Smoke and Fire D...
收藏 引用
2024 International Conference on Telecommunications and Intelligent systems, ICTIS 2024
作者: Aymene Berkani, Mohamed Rafik Chouchane, Ammar Himeur, Yassine Abdennebi, Anes Sagiroglu, Seref Amira, Abbes Medea Algeria University Biskra University Center of Barika Laboratory of LI3C Amdoukal Road Barika05001 Algeria University of Dubai College of Engineering and Information Technology Dubai United Arab Emirates École de Technologie Supérieure Software and Information Technology Engineering Montréal Canada Analytics Security R&D Center Gazi University Artificial Intelligence and Big Data Ankara Turkey University of Sharjah Department of Computer Science Sharjah United Arab Emirates
Ensuring safety in smart buildings is crucial due to the increasing prevalence of smoke and fire hazards in modern environments. This paper introduces a novel privacy-preserving FL approach based on a CNN1D for smoke ... 详细信息
来源: 评论
Free-space Continuous-variable Quantum Secret Sharing
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Fangli Chang, Liang Qiu, Daowen Pan, Minghua Xiong, Wanjun Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Institute of Quantum Computing and Software School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China
Free-space quantum cryptography has the potential to enable global quantum communication. However, most existing continuous-variable quantum secret sharing (CV-QSS) schemes rely on fiber channels. In this paper, we pr... 详细信息
来源: 评论
Industrial Intrusion Detection technology Based on One-dimensional Multi-scale Residual Network  2021
Industrial Intrusion Detection Technology Based on One-dimen...
收藏 引用
7th International Conference on Computing and Artificial Intelligence, ICCAI 2021
作者: Kong, De Peng Du, Ye Li, Mei Hong Li, Gui Ling Beijing Key Laboratory of Security and Privacy in Intelligent Transportation School of Computer Science and Information Technology Beijing Jiaotong University China National Education Examinations Authority China
In order to solve the problem that the traditional intrusion detection algorithm cannot learn more information based on the traffic data effectively and the detection accuracy is not ideal, an intrusion detection algo... 详细信息
来源: 评论
Air-Ground Integrated Online Federated Learning Under Unreliable Communication
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2025年
作者: Jing, Yuqian Qu, Yuben Wu, Tao Dong, Chao Guo, Song Wu, Qihui Ministry of Industry and Information Technology Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Hong Kong Polytechnic University Department of Computing Hong Kong Hong Kong National University of Defense Technology Anhui Hefei230009 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong999077 Hong Kong
In recent years, unmanned aerial vehicles (UAVs) equipped with intelligent computing modules for machine learning (ML) have garnered attention. Federated learning (FL), as an emerging distributed learning paradigm, al... 详细信息
来源: 评论