咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是871-880 订阅
排序:
Coalition Formation for Heterogeneous Federated Learning Enabled Channel Estimation in RIS-assisted Cell-free MIMO
arXiv
收藏 引用
arXiv 2025年
作者: Qi, Nan Liu, Haoxuan Tsiftsis, Theodoros A. Boulogeorgos, Alexandros-Apostolos A. Zhou, Fuhui Jin, Shi Wu, Qihui Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics Nanjing210016 China Department of Informatics and Telecommunications University of Thessaly Lamia35100 Greece Department of Electrical and Computer Engineering University of Western Macedonia Kozani50100 Greece National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China
Downlink channel estimation remains a significant bottleneck in reconfigurable intelligent surface-assisted cell-free multiple-input multiple-output communication systems. Conventional approaches primarily rely on cen... 详细信息
来源: 评论
User Behavior-Based Collaborative Filtering Recommendation Algorithm and Visualization in Second-Hand Trading Platform
User Behavior-Based Collaborative Filtering Recommendation A...
收藏 引用
Sensors, Electronics and computer Engineering (ICSECE), IEEE International Conference on
作者: Rui Qiao Xin Wang Xiaoben Zhong School of Computer Science and Technology Wuhan University of Science and Technology Wuhan Hubei China China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan Hubei China Yunnan College of Business Management Anning China
In the backdrop of the digital era, the demand for second-hand trading within campuses has seen a significant rise. This project aims at designing a second-hand trading platform that merges the latest technological tr... 详细信息
来源: 评论
GeoReF: Geometric Alignment Across Shape Variation for Category-level Object Pose Refinement
GeoReF: Geometric Alignment Across Shape Variation for Categ...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Linfang Zheng Tze Ho Elden Tse Chen Wang Yinghan Sun Hua Chen Ales Leonardis Wei Zhang Hyung Jin Chang Shenzhen Key Laboratory of Control Theory and Intelligent Systems School of System Design and Intelligent Manufacturing Southern University of Science and Technology China School of Computer Science. University of Birmigsham UK Department of Computer Science the University of Hong Kong China
Object pose refinement is essential for robust object pose estimation. Previous work has made significant progress to-wards instance-level object pose refinement. Yet, category-level pose refinement is a more challeng... 详细信息
来源: 评论
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Man Su, Shuao Wang, Qian Li, Qi Zhou, Yuting Ma, Xiaojing Li, Zhengxiong School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China Institute for Network Sciences and Cyberspace Tsinghua University China Department of Computer Science and Engineering University of Colorado Denver United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive i... 详细信息
来源: 评论
Task Offloading and Primary Node Selection in Blockchain, Digital Twin, and MEC Enabled Internet of Vehicles  100
Task Offloading and Primary Node Selection in Blockchain, Di...
收藏 引用
100th IEEE Vehicular technology Conference, VTC 2024-Fall
作者: Du, Jianbo Fang, Huifang Li, Shulei Du, Pengfei Kong, Ziwen Kang, Jiawen Niyato, Dusit Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security School of Communications and Information Engineering Xi'an China Xidian University School of Communications Engineering Xi'an710071 China Tianyuan Ruixin Communication Technology Co. LTD. Xi'an710071 China Xihua University Engineering Research Center of Intelligent Airground Integrated Vehicle and Traffic Control Ministry of Education Chengdu610039 China Guangdong University of Technology School of Automation China Nanyang Technological University School of Computer Science and Engineering Singapore
In this paper, we investigate the safe task offloading and primary node selection in blockchain, digital twin (DT) and Multi-access Edge Computing (MEC) enabled Internet of Vehicles (IoV). Edge servers centers provide... 详细信息
来源: 评论
Fight Fire with Fire: How Much Can We Trust ChatGPT on Source Code-Related Tasks?
arXiv
收藏 引用
arXiv 2024年
作者: Yu, Xiao Liu, Lei Hu, Xing Keung, Jacky Wai Liu, Jin Xia, Xin State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou China Faculty of Electronic and Information Engineering Xi’an Jiaotong University Shanxi Xi’an China Department of Computer Science City University of Hong Kong Hong Kong School of Computer Science Wuhan University Wuhan China College of Computer Science and Technology Zhejiang University Hangzhou China
With the increasing utilization of large language models such as ChatGPT during software development, it has become crucial to verify the quality of code content it generates. Recent studies proposed utilizing ChatGPT... 详细信息
来源: 评论
A Certificateless Homomorphic Encryption Scheme for Protecting Transaction Data Privacy of Post-Quantum Blockchain
收藏 引用
Journal of Cyber security 2022年 第1期4卷 29-39页
作者: Meng-Wei Zhang Xiu-Bo Chen Haseeb Ahmad Gang Xu Yi-Xian Yang Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Department of Computer Science National Textile University Faisalabad37610Pakistan School of Information Science and Technology North China University of TechnologyBeijing100144China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong UniversityBeijing100044China
Blockchain has a profound impact on all areas of society by virtue of its immutability,decentralization and other ***,blockchain faces the problem of data privacy leakage during the application process,and the rapid d... 详细信息
来源: 评论
MFCLIP: Multi-modal Fine-grained CLIP for Generalizable Diffusion Face Forgery Detection
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 5888-5903页
作者: Zhang, Yaning Wang, Tianyi Yu, Zitong Gao, Zan Shen, Linlin Chen, Shengyong Qilu University of Technology Shandong Academy of Sciences Faculty of Computer Science and Technology Jinan 250014 China National University of Singapore School of Computing 21 Lower Kent Ridge Rd 119077 Singapore Great Bay University School of Computing and Information Technology Dongguan 523000 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen 518060 China Qilu University of Technology (Shandong Academy of Sciences) Shandong Artificial Intelligence Institute Jinan 250014 China Tianjin University of Technology Key Laboratory of Computer Vision and System Ministry of Education Tianjin 300384 China Shenzhen University Computer Vision Institute College of Computer Science and Software Engineering Shenzhen 518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen 518129 China Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen 518060 China
The rapid development of photo-realistic face generation methods has raised significant concerns in society and academia, highlighting the urgent need for robust and generalizable face forgery detection (FFD) techniqu... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
VHASR: A Multimodal Speech Recognition system With Vision Hotwords
arXiv
收藏 引用
arXiv 2024年
作者: Hu, Jiliang Li, Zuchao Wang, Ping Ai, Haojun Zhang, Lefei Zhao, Hai Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China School of Computer Science Wuhan University Wuhan China School of Information Management Wuhan University Wuhan China Department of Computer Science and Engineering Shanghai Jiao Tong University China
The image-based multimodal automatic speech recognition (ASR) model enhances speech recognition performance by incorporating audio-related image. However, some works suggest that introducing image information to model... 详细信息
来源: 评论