咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是81-90 订阅
排序:
Event-Triggered Cooperative Tracking Control of Multiagent systems with a Dynamic Leader via Approximate Dynamic Programming
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2752-2765页
作者: Fu, Hao He, Haodong Chen, Yang Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System The School of Computer Science and Technology Wuhan430081 China Wuhan University of Science and Technology Eng. Res. Center for Metallurgical Automation and Measurement Technology of Ministry of Education Wuhan430081 China
This article investigates the optimal cooperative tracking control problem for unknown nonlinear multiagent systems with a real dynamic leader and uncertainties. Its main difficulty lies in eliminating effect of the u... 详细信息
来源: 评论
A security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain
收藏 引用
IEEE Internet of Things Journal 2024年 第6期11卷 10325-10335页
作者: Yang, Ching-Nung Li, Peng Cheng, Hsiang-Han Kuo, Hsin-Chuan Lu, Ming-Chan Xiong, Lizhi National Dong Hwa University Department of Computer Science and Information Engineering Hualien97401 Taiwan North China Electric Power University Department of Mathematics and Physics Hebei Key Laboratory of Physics and Energy Technology Baoding071003 China Nanjing University of Information Science and Technology School of Computer and Software Nanjing210044 China
Secret sharing (SS) is a threshold technology that shares a secret value by generating and distributing n shares in the way that a set of any k shares can recover the secret. On the other hand, blockchain is a decentr... 详细信息
来源: 评论
Transformation Method from AltaRica3.0 to SBIP model
Transformation Method from AltaRica3.0 to SBIP model
收藏 引用
2022 International Conference on Signal Processing, computer Networks, and Communications, SPCNC 2022
作者: He, Hongbin Yang, Lin Zhang, Long Yang, Feng National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute Academy of Military Sciences Beijing100141 China
In order to provide reliability and safety assessments for safety-critical systems, Model-Based Safety Analysis (MBSA) methods have been developed, of which AltaRica3.0 is one representative method. However, there are... 详细信息
来源: 评论
Leveraging IR based sequence and graph features for source-binary code alignment  4
Leveraging IR based sequence and graph features for source-b...
收藏 引用
4th International Conference on Neural Networks, information and Communication Engineering, NNICE 2024
作者: Yu, Zhouqian Zhang, Wei Xu, Tao Beijing Information Science and Technology University Computer School Beijing China Beijing Information Science and Technology University Beijing Laboratory of National Economic Security Early-Warning Engineering Beijing China Tsinghua University Department of Computer Science and Technology Beijing China
Code similarity analysis is a versatile technique that can be applied across various domains, including code clone detection, code search, malware detection, patch analysis, and vulnerability search. The core of sourc... 详细信息
来源: 评论
Attribute-Based Data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation system
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论
A Lightweight and key Escrow-Free Access Control Scheme on Encrypted Data in Edge Computing  12
A Lightweight and Key Escrow-Free Access Control Scheme on E...
收藏 引用
12th International Conference on Advanced Cloud and Big Data, CBD 2024
作者: He, Heng Chen, Yuejia Lu, Jianfeng Zheng, Jiacheng School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China
Attribute-based encryption provides fine-grained access control, ensuring data security in edge computing. However, existing access control schemes face issues such as high computational complexity due to bilinear pai... 详细信息
来源: 评论
Intermittent Fault Diagnosis of Split-Star Networks and its Applications
收藏 引用
IEEE Transactions on Parallel and Distributed systems 2023年 第4期34卷 1253-1264页
作者: Song, Jiankang Lin, Limei Huang, Yanze Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou Fujian350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou Fujian350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid increase of the number of processors in multiprocessor systems and the fast expansion of interconnection networks, the reliability of interconnection network is facing severe challenges, where the fast ... 详细信息
来源: 评论
Polarization-induced photocurrent switching effect in heterojunction photodiodes
收藏 引用
Nano Research 2023年 第4期16卷 5503-5510页
作者: Dingbo Chen Yu-Chang Chen Guang Zeng Yu-Chun Li Xiao-Xi Li Dong Li Chao Shen Nan Chi Boon S.Ooi David Wei Zhang Hong-Liang Lu State Key Laboratory of ASIC and System Shanghai Institute of Intelligent Electronics&SystemsSchool of MicroelectronicsFudan UniversityShanghai 200433China Key Laboratory for Information Science of Electromagnetic Waves Department of Communication Science and EngineeringFudan UniversityShanghai 200433China Photonics Laboratory Division of ComputerElectricaland Mathematical Sciences and EngineeringKing Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Kingdom of Saudi Arabia
The unipolar photocurrent in conventional photodiodes(PDs)based on photovoltaic effect limits the output modes and potential versatility of these devices in *** photodiodes with photocurrent switching are emerging as ... 详细信息
来源: 评论
Automatic skin lesion classification using a novel densely connected convolutional network integrated with an attention module
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第7期14卷 8943-8956页
作者: Shan, Pufang Chen, Jialei Fu, Chong Cao, Lin Tie, Ming Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China Science and Technology on Space Physics Laboratory Beijing100076 China School of Computer Science The University of Auckland Auckland New Zealand
Automated skin lesion classification in dermoscopy images remains challenging due to the existence of artefacts and intrinsic cutaneous features, diversity of lesion morphology, insufficiency of training data, and cla... 详细信息
来源: 评论
LogESP: Enhancing Log Semantic Representation With Word Position for Anomaly Detection  22
LogESP: Enhancing Log Semantic Representation With Word Posi...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Ni, Zhengping Di, Xiaoqiang Liu, Xu Chang, Lianjie Li, Jinqing Tang, Qiyue Changchun University of Science and Technology School of Computer Science and Technology Changchun130022 China Changchun University of Science and Technology Jilin Province Key Laboratory of Network and Information Security Changchun130022 China Changchun University of Science and Technology Information Center Changchun130022 China
Logs are valuable data for detecting anomalous network behavior. Accurate feature extraction from logs is essential for anomaly detection. However, statistical-based feature extraction methods consider the statistical... 详细信息
来源: 评论