咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是941-950 订阅
排序:
Dynamic 3D UAV Placement Optimization: Improved Bonobo Optimizer for Enhanced Coverage and Communication  35
Dynamic 3D UAV Placement Optimization: Improved Bonobo Optim...
收藏 引用
35th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2024
作者: Yahia, Selma Taleb, Sylia Mekhmoukh Loscri, Valeria Saadi, Amylia Ait Ho, Tu Dac Vo, Van Nhan Eldeeb, Hossien Muhaidat, Sami Inria Lille-Nord Europe Lille 59000 France University of m'Hamed Bougara List Laboratory Boumerdes35000 Algeria Esme Engineering School Ivry-sur-Seine94200 France Norwegian University of Science and Technology Department of Information Security and Communication Technology Norway The Arctic University of Norway Department of Electrical Engineering Norway Duy Tan University Faculty of Information Technology Viet Nam Duy Tan University The Institute of Research and Development Viet Nam Khalifa University 6G Research Center Computer and Communication Engineering Abu Dhabi United Arab Emirates
Unmanned aerial vehicles (UAVs) offer a promising solution for enhancing network coverage, reliability, and data speed in future wireless network generations. However, deploying UAVs as aerial base stations requires c... 详细信息
来源: 评论
IDTRSC: ID-based Traceable Ring Signcryption Framework for Data Sharing without key Escrow
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wei, Jiannan Xie, Longyu Zhu, Qinchuan Gao, Yansong Yu, Keping Choo, Kim-Kwang Raymond Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China institute of State Key Laboratory of Cryptology P.O.Box 5159 Beijing100878 China Waseda University Global Information and Telecommunication Institute Shinjuku169-8050 Japan University of Texas San Antonio Department of Information Systems and Cyber Security San AntonioTX78249-0631 United States
The capability to share data across different entities is increasingly pronounced in our data-driven and centric society. However, we also have to ensure properties such as data confidentiality, unforgeability, anonym... 详细信息
来源: 评论
GSLB: The Graph Structure Learning Benchmark  37
GSLB: The Graph Structure Learning Benchmark
收藏 引用
37th Conference on Neural information Processing systems, NeurIPS 2023
作者: Li, Zhixun Wang, Liang Sun, Xin Luo, Yifan Zhu, Yanqiao Chen, Dingshuo Luo, Yingtao Zhou, Xiangxin Liu, Qiang Wu, Shu Yu, Jeffrey Xu Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong Hong Kong Center for Research on Intelligent Perception and Computing State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences China School of Artificial Intelligence University of Chinese Academy of Sciences China Department of Automation University of Science and Technology of China China School of Cyberspace Security Beijing University of Posts and Telecommunications China Department of Computer Science University of California Los Angeles United States Heinz College of Information Systems and Public Policy Machine Learning Department School of Computer Science Carnegie Mellon University United States
Graph Structure Learning (GSL) has recently garnered considerable attention due to its ability to optimize both the parameters of Graph Neural Networks (GNNs) and the computation graph structure simultaneously. Despit... 详细信息
来源: 评论
Exfiltration-resistant Proxy Re-Encryption for IoT Data Sharing in Unreliable Clouds
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhou, Yuyang Zhao, Liang Li, Fagen Takagi, Tsuyoshi School of Cyberspace Security Hainan University Haikou570000 China Department of Mathematical Informatics Graduate School of Information Science and Technology The university of Tokyo Tokyo113-8656 Japan School of Cyber Science and Engineering Sichuan University Chengdu610065 China Key Laboratory of Data Protection and Intelligent Management [Sichuan University Ministry of Education China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
The sharing of Internet of Things (IoT) data plays an extensive role in our everyday lives. Exploring secure and efficient methods for data sharing is a prominent area of research. Proxy re-encryption (PRE) in the clo... 详细信息
来源: 评论
Prototype Implementation and Experimental Evaluation for LoRa-Backscatter Communication systems with RF Energy Harvesting and Low Power Management
收藏 引用
IEEE Transactions on Communications 2024年
作者: Tang, Xiaoqing Liu, Xin Xie, Guihui Cui, Yongqiang Li, Dong Hubei University School of Artificial Intelligence Wuhan China Ministry of Education Key Laboratory of Intelligent Sensing System and Security Hubei University Wuhan China Wuhan Qingchuan University Institute of Electronic Information Wuhan China School of Automation Wuhan China South-Central Minzu University College of Electronics and Information Engineering Wuhan China Macau University of Science and Technology School of Computer Science and Engineering Avenida Wai Long Taipa Macau China
Battery free Internet of Things (BF IoT), which is realized by harvesting ambient energy to power the IoT devices, has many advantages such as low power, low cost, free-maintenance, easy deployment, and environmental ... 详细信息
来源: 评论
Cybersecurity of Unmanned Aerial Vehicles: A Survey
Cybersecurity of Unmanned Aerial Vehicles: A Survey
收藏 引用
International Conference on Advanced computer Theory and Engineering, ICACTE
作者: Renshuai Guo Minhuan Huang Jin Li Jingjing Wang National Key Laboratory of Science and Technology on Information System Security Beijing China
In recent years, due to rapid advances in science and technology and the continuous reduction of manufacturing costs, unmanned aerial vehicles (UAVs) have expanded from the military field to the civil field and are us... 详细信息
来源: 评论
Online scheduling of transmission and processing for AoI minimization with edge computing
arXiv
收藏 引用
arXiv 2022年
作者: Zhu, Jianhang Gong, Jie Guangdong Key Laboratory Of Information Security Technology School Of Computer Science And Engineering Sun Yat-sen University Guangzhou510006 China
Age of information (AoI), which measures the time elapsed since the generation of the last received packet at the destination, is a new metric for real-time status update tracking applications. In this paper, we consi... 详细信息
来源: 评论
SMWT: A Universal and Lightweight SDN-Based Meter Table Watermarking Traceback Scheme
SMWT: A Universal and Lightweight SDN-Based Meter Table Wate...
收藏 引用
Asia-Pacific Network Operations and Management Symposium (APNOMS)
作者: Heng He Sen Yang Xiaohu Zhou Jia Wang School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China Guilin Medical University Guilin China
The use of anonymous network has increased dramatically due to the development of network technology and people focus on the network security and privacy. However, anonymous networks are often used for illegal purpose...
来源: 评论
A robust incomplete large-scale group decision-making model for metaverse metro operations and maintenance
收藏 引用
Applied Soft Computing 2024年 156卷
作者: Bai, Wenhui Zhang, Chao Zhai, Yanhui Sangaiah, Arun Kumar School of Computer and Information Technology Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education Shanxi University Shanxi Taiyuan030006 China International Graduate Institute of Artificial Intelligence National Yunlin University of Science and Technology Yunlin Taiwan Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
The metaverse, constructed through digital technology, serves as a virtual realm intertwining with reality. Within this context, the challenge of evaluating data from diverse sources arises, and the application of lar... 详细信息
来源: 评论
Transmission of Bernoulli Sources Using Convolutional LDGM Codes
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Yixin Zhu, Tingting Ma, Xiao The Guangdong Key Laboratory of Information Security Technology School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China
We propose in this paper to exploit convolutional low density generator matrix (LDGM) codes for transmission of Bernoulli sources over binary-input output-symmetric (BIOS) channels. To this end, we present a new frame... 详细信息
来源: 评论