咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是931-940 订阅
排序:
EAPDS: Efficient Auditable and Privacy-preservation Data Sharing Scheme Based on Attribute-Based Encryption for IoMT
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Hui Xie, Yong Luo, Min Liu, Yining Shirazi, Syed Hamad Qinghai University Department of Information Technology Xining810016 China Qinghai Institute of Technology School of Computer and Information Science Xining810016 China Qinghai Provincial Key Laboratory of Big Data in Finance and Artificial Intelligence Application Technology Xining810016 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China Wenzhou University of Technology School of Data Science and Artificial Intelligence Wenzhou325000 China Hazara University Department of Information Technology Mansehra21300 Pakistan
Data sharing schemes based on the Internet of Medical Things (IoMT) have emerged as a more convenient way to monitor and manage individuals’ health. However, this scenario faces challenges such as privacy preservatio... 详细信息
来源: 评论
Multi-modal Large Language Model Enhanced Pseudo 3D Perception Framework for Visual Commonsense Reasoning
arXiv
收藏 引用
arXiv 2023年
作者: Zhu, Jian Wang, Hanli Shi, Miaojing The Department of Computer Science & Technology The Key Laboratory of Embedded System & Service Computing Ministry of Education Tongji University Shanghai200092 China The College of Electronic and Information Engineering Tongji University Shanghai201804 China
The visual commonsense reasoning (VCR) task is to choose an answer and provide a justifying rationale based on the given image and textural question. Representative works first recognize objects in images and then ass... 详细信息
来源: 评论
Two-pupil optical heterodyne scanning holographic system with highpass filtering pupils
Two-pupil optical heterodyne scanning holographic system wit...
收藏 引用
Frontiers in Optics, FiO 2022
作者: Yao, Yongwei Zhang, Yaping Poon, Ting-Chung Yunnan Provincial Key Laboratory of Modern Information Optics Kunming University of Science and Technology Yunnan Kunming650500 China Bradley Department of Electrical and Computer Engineering Virginia Tech BlacksburgVA24061 United States
We propose the use of highpass filtering pupils to achieve edge extraction in a two-pupil optical heterodyne scanning holographic system. Preliminary simulation results have shown an effective edge extraction. © ...
来源: 评论
Work or Sleep: Freshness-Aware Energy Scheduling for Wireless Powered Communication Networks with Interference Consideration
Work or Sleep: Freshness-Aware Energy Scheduling for Wireles...
收藏 引用
Design Automation Conference
作者: Ling Lin Lei Ju Chun Jason Xue Mingliang Zhou Wei Zhang Zimeng Zhou School of Cyber Science and Technology Shandong University China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University China Quan Cheng Laboratory Jinan China Department of Computer Science City University of Hong Kong Hong Kong Chongqing University Chongqing China
This paper explores how to schedule energy to optimize the information freshness in wireless powered communication networks (WPCNs) when considering channel interference among adjacent sensor nodes. We introduce Age o...
来源: 评论
Review and Perspective on Encrypted Traffic Classification Based on Contrastive Learning
Review and Perspective on Encrypted Traffic Classification B...
收藏 引用
International Conference on computer Engineering and Applications (ICCEA)
作者: Zhaodi Li Qingqing Liu Kaixuan Yu Department of Computer and Information Engineering Henan University Kaifeng China Department of Computer Science and Art Henan Light Industry Vocational College ZhengZhou China State Key Laboratory of Shield Machine and Boring Technology ZhengZhou China
Encrypted network traffic classification plays an important role in today's network security and performance optimization. Through the classification and identification of network traffic, it can better monitor an... 详细信息
来源: 评论
Short Tail:taming tail latency for erasure-code-based in-memory systems
收藏 引用
Frontiers of information technology & Electronic Engineering 2022年 第11期23卷 1646-1657页
作者: Yun TENG Zhiyue LI Jing HUANG Guangyan ZHANG College of Computer Science and Technology Jilin UniversityChangchun 130012China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchun 130012China Beijing National Research Center for Information Science and Technology(Tsinghua University) Beijing 100084China
In-memory systems with erasure coding(EC)enabled are widely used to achieve high performance and data ***,as the scale of clusters grows,the server-level fail-slow problem is becoming increasingly frequent,which can c... 详细信息
来源: 评论
Efficient Graph Neural Network Driven Recurrent Reinforcement Learning for GNSS Position Correction  36
Efficient Graph Neural Network Driven Recurrent Reinforcemen...
收藏 引用
36th International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2023
作者: Zhao, Haoli Tang, Jianhao Li, Zhenni Wu, Zhuoyu Xie, Shengli Wu, Zhaofeng Liu, Ming Kumara, Banage T.G.S. School of Automation Guangdong University of Technology Guangzhou510006 China Guangdong-HongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangzhou510006 China 111 Center for Intelligent Batch Manufacturing Based on IoT Technology Guangzhou510006 China Key Laboratory of Intelligent Detection and The Internet of Things in Manufacturing Guangzhou510006 China Guangdong Key Laboratory of IoT Information Technology Guangzhou510006 China Techtotop Microelectronics Technology Co. Ltd. Guangzhou510000 China Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong Department of Computing and Information Systems Sabaragamuwa University of Sri Lanka Belihuloya Sri Lanka
With the wide applications of the Global Navigation Satellite system (GNSS) in autonomous driving scenarios, the demand for high-precision positioning of navigation systems has increased dramatically in complex multip...
来源: 评论
Personalized Multimedia Recommendation systems Using Higher-Order Tensor Singular-Value-Decomposition
收藏 引用
IEEE Transactions on Broadcasting 2024年 第1期70卷 148-160页
作者: Chang, Shih Yu Wu, Hsiao-Chun Yan, Kun Chen, Xinjia Huang, Scott Chih-Hao Wu, Yiyan San Jose State University Department of Applied Data Science San JoseCA95192 United States Louisiana State University School of Electrical Engineering and Computer Science Baton RougeLA70803 United States Yuan Ze University Innovation Center for AI Applications Chungli32003 Taiwan Guilin University of Electronic Technology Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing Department of Information and Telecommunication Guilin541004 China Northwestern State University Department of Engineering Technology NatchitochesLA71497 United States National Tsing Hua University Department of Electrical Engineering Hsinchu300 Taiwan Communications Research Centre Canada OttawaK2H 8S2 Canada
Because of rapid growth of multimedia data over the Internet, the infobesity has been emerging in recent years. Many recommender systems (RSs) have been proposed using a variety of techniques, including artificial int... 详细信息
来源: 评论
SCR-Auth: Secure Call Receiver Authentication on Smartphones Using Outer Ear Echoes
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Xiping Chen, Jing He, Kun He, Zhixiang Du, Ruiying Feng, Yebo Zhao, Qingchuan Wu, Cong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Rizhao Institute of Information Technology Wuhan University Rizhao276800 China Collaborative Innovation Center of Geospatial Technology Wuhan430079 China School of Computer Science and Engineering Nanyang Technological University Singapore Department of Computer Science City University of Hong Kong Hong Kong
Receiving calls is one of the most universal functions of smartphones, involving sensitive information and critical operations. Unfortunately, to prioritize convenience, the current call receiving process bypasses sma... 详细信息
来源: 评论
BIG-MOE: BYPASS ISOLATED GATING MOE FOR GENERALIZED MULTIMODAL FACE ANTI-SPOOFING
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Yingjie Yu, Zitong Lin, Xun Xie, Weicheng Shen, Linlin Great Bay University China College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
In the domain of facial recognition security, multimodal Face Anti-Spoofing (FAS) is essential for countering presentation attacks. However, existing technologies encounter challenges due to modality biases and imbala... 详细信息
来源: 评论