咨询与建议

限定检索结果

文献类型

  • 1,952 篇 期刊文献
  • 1,814 篇 会议
  • 1 册 图书

馆藏范围

  • 3,767 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,641 篇 工学
    • 1,809 篇 计算机科学与技术...
    • 1,409 篇 软件工程
    • 633 篇 信息与通信工程
    • 410 篇 电气工程
    • 361 篇 控制科学与工程
    • 318 篇 电子科学与技术(可...
    • 226 篇 生物工程
    • 199 篇 机械工程
    • 160 篇 网络空间安全
    • 149 篇 光学工程
    • 136 篇 生物医学工程(可授...
    • 129 篇 仪器科学与技术
    • 110 篇 动力工程及工程热...
    • 108 篇 安全科学与工程
    • 105 篇 交通运输工程
    • 71 篇 建筑学
    • 66 篇 化学工程与技术
    • 65 篇 土木工程
  • 1,282 篇 理学
    • 688 篇 数学
    • 349 篇 物理学
    • 250 篇 生物学
    • 220 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 67 篇 化学
  • 660 篇 管理学
    • 426 篇 管理科学与工程(可...
    • 259 篇 图书情报与档案管...
    • 158 篇 工商管理
  • 145 篇 法学
    • 92 篇 社会学
  • 136 篇 医学
    • 119 篇 临床医学
    • 100 篇 基础医学(可授医学...
  • 58 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 92 篇 feature extracti...
  • 72 篇 federated learni...
  • 68 篇 semantics
  • 68 篇 security
  • 63 篇 deep learning
  • 63 篇 optimization
  • 63 篇 computational mo...
  • 62 篇 training
  • 61 篇 accuracy
  • 61 篇 cryptography
  • 56 篇 blockchain
  • 54 篇 computer science
  • 53 篇 laboratories
  • 51 篇 privacy
  • 48 篇 authentication
  • 39 篇 servers
  • 39 篇 data models
  • 39 篇 robustness
  • 38 篇 data mining
  • 37 篇 protocols

机构

  • 149 篇 department of co...
  • 77 篇 key laboratory o...
  • 75 篇 national key lab...
  • 66 篇 school of softwa...
  • 62 篇 shandong provinc...
  • 57 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 48 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 37 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 31 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 hai jin
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 14 篇 xin wang
  • 13 篇 wu yuan
  • 13 篇 ming gu

语言

  • 3,124 篇 英文
  • 550 篇 其他
  • 104 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3767 条 记 录,以下是981-990 订阅
排序:
A Privacy Protection Scheme for Consumer Electronics Data Based on Blockchain and AI
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Wang, Luping Yan, Chen Wu, Hongjie Zhu, Fa Kumari, Saru Alenazi, Mohammed J.F State Key Laboratory of Blockchain and Data Security Suzhou University of Science and Technology Suzhou215009 China Zhejiang University Hangzhou310027 China Suzhou University of Science and Technology Suzhou215009 China Nanjing Forestry University College of Information Science College of Artificial Intelligence Nanjing210037 China Chaudhary Charan Singh University Department of Mathematics Uttar Pradesh Meerut250001 India Department of Computer Engineering Riyadh11451 Saudi Arabia
As information technology advances, a significant amount of data related to consumer electronics has emerged, the consumer data is commonly stored on cloud servers, resulting in frequent data leaks and privacy breache... 详细信息
来源: 评论
JAX-CNV:A Whole-genome Sequencing-based Algorithm for Copy Number Detection at Clinical Grade Level
收藏 引用
Genomics, Proteomics & Bioinformatics 2022年 第6期20卷 1197-1206页
作者: Wan-Ping Lee Qihui Zhu Xiaofei Yang Silvia Liu Eliza Cerveira Mallory Ryan Adam Mil-Homens Lauren Bellfy Kai Ye Charles Lee Chengsheng Zhang Precision Medicine Center The First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China The Jackson Laboratory for Genomic Medicine FarmingtonCT 06032USA School of Cyber Science and Engineering Xi’an Jiaotong UniversityXi’an 710049China Department of Pathology and Laboratory Medicine Perelman School of MedicineUniversity of PennsylvaniaPhiladelphiaPA 19104USA School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China MOE Key Lab for Intelligent Networks&Networks Security Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China Department of Life Sciences Ewha Womans UniversitySeoul 03760South Korea
We aimed to develop a whole-genome sequencing(WGS)-based copy number variant(CNV)calling algorithm with the potential of replacing chromosomal microarray assay(CMA)for clinical ***-CNV is thus developed for CNV detect... 详细信息
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
computer systems science & Engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
Knowledge Distillation based Lightweight Adaptive Graph Convolutional Network for Skeleton-based action recognition  11
Knowledge Distillation based Lightweight Adaptive Graph Conv...
收藏 引用
11th International Conference on information technology in Medicine and Education, ITME 2021
作者: Qiu, Zhong-Xiang Zhang, Hong-Bo Lei, Qing Du, Ji-Xiang Huaqiao University Department of Computer Science and Technology Xiamen China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Xiamen China
Skeleton-based human action recognition has received extensive attention due to its easy access to human skeleton data. However, the current mainstream skeleton-based action recognition methods have more or less the p... 详细信息
来源: 评论
GraphEdge: Dynamic Graph Partition and Task Scheduling for GNNs Computing in Edge Network
arXiv
收藏 引用
arXiv 2025年
作者: Xiao, Wenjing Shi, Chenglong Chen, Miaojiang Liu, Zhiquan Chen, Min Song, H. Herbert Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning530004 China School of Computer Electronics and Information Guangxi University Nanning530004 China School of Computer Science and Engineering South China University of Technology Guangzhou510006 China Pazhou Laboratory Guangzhou510330 China College of Cyber Security Jinan University Guangzhou510632 China
With the exponential growth of Internet of Things (IoT) devices, edge computing (EC) is gradually playing an important role in providing cost-effective services. However, existing approaches struggle to perform well i... 详细信息
来源: 评论
A Federated Learning Network Intrusion Detection system for Multiple Imbalances
A Federated Learning Network Intrusion Detection System for ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yifan Zeng Peijia Zheng Jian Li School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Centralized training of deep learning-based network intrusion detection systems (DLNIDS) raises privacy concerns and incurs huge overhead. Federated learning (FL), while preserving privacy, confronts challenges includ... 详细信息
来源: 评论
High-Resolution Polymerization Network For Multi-Person Pose Estimation  11
High-Resolution Polymerization Network For Multi-Person Pose...
收藏 引用
11th International Conference on information technology in Medicine and Education, ITME 2021
作者: Bai, Yu-Fei Zhang, Hong-Bo Lei, Qing Du, Ji-Xiang Huaqiao University Department of Computer Science and Technology Xiamen China Huaqiao University Fujian Key Laboratory of Big Data Intelligence and Security Xiamen China
In this paper, we propose a High-Resolution Polymerization Network (HPN) for Multi-Person Pose Estimation. First, we use the separate channel convolution module High-Resolution Polymerization Block(HPB) in HPN to opti... 详细信息
来源: 评论
Skeleton Based Action Quality Assessment of Figure Skating Videos  11
Skeleton Based Action Quality Assessment of Figure Skating V...
收藏 引用
11th International Conference on information technology in Medicine and Education, ITME 2021
作者: Li, Hui-Ying Lei, Qing Zhang, Hong-Bo Du, Ji-Xiang Huaqiao University Department of Computer Science and Technology Xiamen China Huaqiao University Fujian Key Laboratory of Big Data Intelligence and Security Xiamen China
Action quality assessment(AQA) aims at achieving automatic evaluation the performance of human actions in video. Compared with action recognition problem, AQA focuses more on subtle differences both in spatial and tem... 详细信息
来源: 评论
Active Power Control for Off-Shore Wind Turbines Against FDI Attack
Active Power Control for Off-Shore Wind Turbines Against FDI...
收藏 引用
IEEE International Conference on Communications in China Workshops (ICCC)
作者: Xuguo Jiao Hao Luo Liuyang Jiang Lin Wang Xin Wang Zuqiang Huang State Key Laboratory of Industrial Control Technology College of Control Science and Engineering Zhejiang University Hangzhou China School of Information and Control Engineering Qingdao University of Technology Qingdao China Zhejiang Windey Co. Ltd. Hangzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Academy of Sciences Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Civil Engineering Zhengzhou University Zhengzhou China
Recently, offshore wind power has rapidly developed due to its low environmental interference and abundant wind resources. However, due to its remote geographical location and high demand for communication infrastruct... 详细信息
来源: 评论
Mel-S3R: Combining Mel-spectrogram and self-supervised speech representation with VQ-VAE for any-to-any voice conversion
收藏 引用
Speech Communication 2023年 151卷 52-63页
作者: Jichen Yang Yi Zhou Hao Huang School of Cyber Security Guangdong Polytechnic Normal University Guangzhou China School of Electronics and Information Engineering South China Normal University Foshan China Department of Electrical and Computer Engineering National University of Singapore Singapore School of Information Science and Engineering Xinjiang University and Xinjiang Provincial Key Laboratory of Multilingual Information Technology Urumqi China
The self-supervised speech representation (S3R) has succeeded in many downstream tasks, such as speaker recognition and voice conversion thanks to its high-level information. Voice conversion (VC) is a task to convert... 详细信息
来源: 评论