咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是921-930 订阅
排序:
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
computer systems science & Engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
Mel-S3R: Combining Mel-spectrogram and self-supervised speech representation with VQ-VAE for any-to-any voice conversion
收藏 引用
Speech Communication 2023年 151卷 52-63页
作者: Jichen Yang Yi Zhou Hao Huang School of Cyber Security Guangdong Polytechnic Normal University Guangzhou China School of Electronics and Information Engineering South China Normal University Foshan China Department of Electrical and Computer Engineering National University of Singapore Singapore School of Information Science and Engineering Xinjiang University and Xinjiang Provincial Key Laboratory of Multilingual Information Technology Urumqi China
The self-supervised speech representation (S3R) has succeeded in many downstream tasks, such as speaker recognition and voice conversion thanks to its high-level information. Voice conversion (VC) is a task to convert... 详细信息
来源: 评论
High-Resolution Polymerization Network For Multi-Person Pose Estimation  11
High-Resolution Polymerization Network For Multi-Person Pose...
收藏 引用
11th International Conference on information technology in Medicine and Education, ITME 2021
作者: Bai, Yu-Fei Zhang, Hong-Bo Lei, Qing Du, Ji-Xiang Huaqiao University Department of Computer Science and Technology Xiamen China Huaqiao University Fujian Key Laboratory of Big Data Intelligence and Security Xiamen China
In this paper, we propose a High-Resolution Polymerization Network (HPN) for Multi-Person Pose Estimation. First, we use the separate channel convolution module High-Resolution Polymerization Block(HPB) in HPN to opti... 详细信息
来源: 评论
Hybrid Data-Free Knowledge Distillation  39
Hybrid Data-Free Knowledge Distillation
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Tang, Jialiang Chen, Shuo Gong, Chen School of Computer Science and Engineering Nanjing University of Science and Technology China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education China Jiangsu Key Laboratory of Image and Video Understanding for Social Security China Center for Advanced Intelligence Project RIKEN Japan Department of Automation Institute of Image Processing and Pattern Recognition Shanghai Jiao Tong University China
Data-free knowledge distillation aims to learn a compact student network from a pre-trained large teacher network without using the original training data of the teacher network. Existing collection-based and generati... 详细信息
来源: 评论
Skeleton Based Action Quality Assessment of Figure Skating Videos  11
Skeleton Based Action Quality Assessment of Figure Skating V...
收藏 引用
11th International Conference on information technology in Medicine and Education, ITME 2021
作者: Li, Hui-Ying Lei, Qing Zhang, Hong-Bo Du, Ji-Xiang Huaqiao University Department of Computer Science and Technology Xiamen China Huaqiao University Fujian Key Laboratory of Big Data Intelligence and Security Xiamen China
Action quality assessment(AQA) aims at achieving automatic evaluation the performance of human actions in video. Compared with action recognition problem, AQA focuses more on subtle differences both in spatial and tem... 详细信息
来源: 评论
Intelligent evaluation system for new energy vehicles based on sentiment analysis: An MG-PL-3WD method
收藏 引用
Engineering Applications of Artificial Intelligence 2024年 133卷
作者: Zhang, Chao Wen, Qifei Li, Deyu Sangaiah, Arun Kumar Lin, Mingwei School of Computer and Information Technology Shanxi University Taiyuan030006 China Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education Shanxi University Taiyuan030006 China International Graduate Institute of Artificial Intelligence National Yunlin University of Science and Technology Yunlin64002 Taiwan Department of Electrical and Computer Engineering Lebanese American University Byblos1102-2801 Lebanon College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China
As a critical strategic tool within the framework of the digital economy (DE), artificial intelligence (AI) plays a crucial role in realizing an AI-assisted economy. This novel paradigm has gained widespread acceptanc... 详细信息
来源: 评论
NavG: Risk-Aware Navigation in Crowded Environments Based on Reinforcement Learning with Guidance Points
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Qianyi Luo, Wentao Liu, Boyi Zhang, Ziyang Wang, Yaoyuan Liu, Jingtai Institute of Robotics and Automatic Information System Nankai University Tianjin Key Laboratory of Intelligent Robotics Tianjin China Advanced Computing and Storage Lab Huawei 2012 Lab China Department of Electronic and Computer Engineering The Kong Kong University of Science and Technology Hong Kong
Motion planning in navigation systems is highly susceptible to upstream perceptual errors, particularly in human detection and tracking. To mitigate this issue, the concept of guidance points—a novel directional cue ... 详细信息
来源: 评论
A Multi-Stage Vision Transformer for Fine-grained Image Classification  11
A Multi-Stage Vision Transformer for Fine-grained Image Clas...
收藏 引用
11th International Conference on information technology in Medicine and Education, ITME 2021
作者: Huang, Zheng Du, Ji-Xiang Zhang, Hong-Bo Huaqiao University Department of Computer Science and Technology Xiamen China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Xiamen China
Different from general image classification, Fine-grained visual classification(FGVC) aims at recognizing the subclass of an object. This task is challenging due to the differences between subcategories that might be ... 详细信息
来源: 评论
AsyncSC: An Asynchronous Sidechain for Multi-Domain Data Exchange in Internet of Things
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Gao, Sheng Tong, Wei Lu, Di Shen, Yulong Du, Xiaojiang The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'An710071 China The Zhejiang Lab Hangzhou311121 China The School of Information Central University of Finance and Economics Beijing100081 China The School of Information Science and Engineering Zhejiang Sci-Tech University Hangzhou310018 China The School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi'An710071 China The School of Engineering and Science Stevens Institute of Technology Hoboken07030 United States
Sidechain techniques improve blockchain scalability and interoperability, providing decentralized exchange and cross-chain collaboration solutions for Internet of Things (IoT) data across various domains. However, cur...
来源: 评论
Text information Mining in Cyberspace: An information Extraction Method Based on T5 and keyBERT
Text Information Mining in Cyberspace: An Information Extrac...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Kuan Liu Yumei Li Yuanhua Qi Ning Qi Mengran Zhai Information Research Institute of Shandong Academy of Sciences Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Institute of Economy and Informatization Development Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China Shandong Institute of Economy and Informatization Development Jinan China
With the development of the digital economy and the advent of the big data era, the rapid growth of textual information in cyberspace has placed higher demands on information processing technology. This paper proposes... 详细信息
来源: 评论