咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是961-970 订阅
排序:
Spatio-temporal GNN-Based Cell-Free Massive MIMO Network with Maximal Benefit-Cost Ratio
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Jiang, Jing Li, Yanni Ye, Yinghui Feng, Dan Zhang, Jiayi Sutthiphan, Worakrin Niyato, Dusit Xi'an Uni versity of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Beijing Jiaotong University Frontiers Science Center for Smart High-Speed Railway System Beijing100044 China National Telecommunication Public Company Mobile System Development Department Bangkok10210 Thailand Nanyang Technological University College of Computing and Data Science Singapore
Due to the network's rapid expansion, mobile networks bear extra high deployment costs. Being a key enabler of 6th generation (6G) mobile networks, it is crucial that cell-free massive MIMO (CF mMIMO) networks ach... 详细信息
来源: 评论
An Improved Q-RRT^(*) Algorithm Based on Virtual Light
收藏 引用
computer systems science & Engineering 2021年 第10期39卷 107-119页
作者: Chengchen Zhuge Qun Wang Jiayin Liu Lingxiang Yao Department of Computer Information and Cyber Security Jiangsu Police InsituteNanjing210031China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Jiangsu Police InsituteNanjing210031China Jiangsu Provincial Public Security Department Key Laboratory of Digital Forensics Jiangsu Police InsituteNanjing210031China University of Technology Sydney Sydney2007Australia
The Rapidly-exploring Random Tree(RRT)algorithm is an efficient path-planning algorithm based on random *** RRT^(*)algorithm is a variant of the RRT algorithm that can achieve convergence to the optimal ***,it has bee... 详细信息
来源: 评论
WiWm-EP: Wi-Fi CSI-based Wheat Moisture Detection Using Equivalent Permittivity
WiWm-EP: Wi-Fi CSI-based Wheat Moisture Detection Using Equi...
收藏 引用
2023 IEEE INFOCOM Conference on computer Communications Workshops, INFOCOM WKSHPS 2023
作者: Hu, Pengming Yang, Weidong Wang, Xuyu Mao, Shiwen Shen, Erbo Henan University of Technology Henan Key Laboratory of Grain Photoelectric Detection and Control Zhengzhou450001 China College of Information Science and Engineering Henan University of Technology Zhengzhou450001 China Knight Foundation School of Computing and Information Sciences Florida International University FL33199 United States Auburn University Department of Electrical and Computer Engineering AuburnAL36849-5201 United States
Moisture content is one of the important indexes of food storage security. The existing detection methods are time-consuming and high cost such that it is difficult to realize online moisture detection. In this paper,... 详细信息
来源: 评论
Multi-Modal Cross-Domain Alignment Network for Video Moment Retrieval
arXiv
收藏 引用
arXiv 2022年
作者: Fang, Xiang Liu, Daizong Zhou, Pan Hu, Yuchong Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430074 China Wangxuan Institute of Computer Technology Peking University No. 128 Zhongguancun North Street Beijing China School of Computer Science and Technology Key Laboratory of Information Storage System Ministry of Education of China Huazhong University of Science and Technology Wuhan430074 China
As an increasingly popular task in multimedia information retrieval, video moment retrieval (VMR) aims to localize the target moment from an untrimmed video according to a given language query. Most previous methods d... 详细信息
来源: 评论
PCF-Grasp: Converting Point Completion to Geometry Feature to Enhance 6-DoF Grasp
arXiv
收藏 引用
arXiv 2025年
作者: Cheng, Yaofeng Zha, Fusheng Guo, Wei Wang, Pengfei Zeng, Chao Sun, Lining Yang, Chenguang State Key Laboratory of Robotics and System Harbin Institute of Technology Harbin150001 China Lanzhou University of Technology China Department of Computer Science University of Liverpool LiverpoolL69 3BX United Kingdom
The 6-Degree of Freedom (DoF) grasp method based on point clouds has shown significant potential in enabling robots to grasp target objects. However, most existing methods are based on the point clouds (2.5D points) g... 详细信息
来源: 评论
Data Processing technology for Network Abnormal Traffic Detection
收藏 引用
Procedia computer science 2024年 243卷 610-618页
作者: Kun Wang Yu Fu Xueyuan Duan Jianqiao Xu Taotao Liu Department of Information Security Naval University of Engineering Wuhan 430033 China School of Mathematics and Information Engineering Xinyang Vocational and Technical College Xinyang 464000 China College of Computer and Information Technology Xinyang Normal University Xinyang 464000 China Henan Key Laboratory of Analysis and Applications of Education Big Data Xinyang Normal University Xinyang 464000 China
At present, the threats to network security are also increasing, among which abnormal traffic detection is the key link to ensure network security. Traditional detection methods based on signature or threshold are oft... 详细信息
来源: 评论
Identify Influential Nodes in Complex Networks: A K-Orders Entropy-Based Method
SSRN
收藏 引用
SSRN 2023年
作者: Wu, Yali Dong, Ang Ren, Yuanguang Jiang, Qiaoyong Department of Information and Control Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi’an University of Technology Xi’an710048 China The School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China
Identifying influential nodes is a recognized challenge for the tremendous number of nodes in complex networks. Most of proposed methods detect the influential nodes based on their degree or topological location, whic... 详细信息
来源: 评论
Research on Image Captioning Based on Vision-language Pre-trained Models
Research on Image Captioning Based on Vision-language Pre-tr...
收藏 引用
International Conference on Big Data and information Analytics (BigDIA)
作者: Shiwei Zou Yuxiang Xie Jie Yan Yingmei Wei Xidao Luan Department of System Engineering National University of Defense Technology Hunan China Key Laboratory of Big Data Department of System Engineering National University of Defense Technology Hunan Changsha China Department of Computer Science Changsha University Hunan China
Image captioning is a vision-language task that targets at describing an image by generating a coherent sentence automatically. This technology allows computers to understand and describe images like humans, enabling ...
来源: 评论
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
收藏 引用
Frontiers of computer science 2020年 第3期14卷 203-215页
作者: Yudi ZHANG Debiao HE Mingwu ZHANG Kim-Kwang Raymond CHOO Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education School of Cyber Science and EngineeringWuhan UniversityWuhan 430072China School of Computer Sciences Hubei University of TechnologyWuhan 430068China Department of Information Systems and Cyber Security and Department of Electrical and Computer Engineering University of Texas at San AntonioSan AntonioTX 78249USA
Mobile devices are widely used for data access,communications and ***,storing a private key for signature and other cryptographic usage on a single mobile device can be challenging,due to its computational ***,a numbe... 详细信息
来源: 评论
Deep Adaptively Feature Extracting Network for Cervical Squamous Lesion Cell Detection  4th
Deep Adaptively Feature Extracting Network for Cervical Squ...
收藏 引用
4th International Conference on Machine Learning for Cyber security, ML4CS 2022
作者: Peng, Zhonghua Hu, Rong Wang, Fuen Fan, Haoyi Eng, Yee Wei Li, Zuoyong Zhou, Liwei Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fujian University of Technology Fujian Fuzhou350118 China School of Computer and Artificial Intelligence Zhengzhou University Henan Zhengzhou450001 China School of Computer Sciences Universiti Sains Malaysia Penang11800 Malaysia Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fujian Fuzhou350121 China Department of Nutrition The First Affiliated Hospital of Zhengzhou University Henan Zhengzhou450052 China
Cervical cancer is one of the most widespread malignancies affecting women’s health worldwide today. However, the task of detection is particularly difficult due to the complex background of the cervical smear, where... 详细信息
来源: 评论