咨询与建议

限定检索结果

文献类型

  • 934 篇 期刊文献
  • 608 篇 会议
  • 11 册 图书

馆藏范围

  • 1,553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 966 篇 工学
    • 469 篇 计算机科学与技术...
    • 365 篇 软件工程
    • 256 篇 信息与通信工程
    • 186 篇 电气工程
    • 163 篇 电子科学与技术(可...
    • 106 篇 控制科学与工程
    • 100 篇 光学工程
    • 96 篇 生物工程
    • 82 篇 生物医学工程(可授...
    • 75 篇 机械工程
    • 75 篇 核科学与技术
    • 63 篇 仪器科学与技术
    • 62 篇 动力工程及工程热...
    • 48 篇 化学工程与技术
    • 38 篇 材料科学与工程(可...
    • 36 篇 航空宇航科学与技...
    • 32 篇 交通运输工程
    • 31 篇 土木工程
  • 664 篇 理学
    • 306 篇 物理学
    • 219 篇 数学
    • 136 篇 生物学
    • 66 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 47 篇 化学
  • 202 篇 管理学
    • 133 篇 管理科学与工程(可...
    • 67 篇 图书情报与档案管...
    • 62 篇 工商管理
  • 110 篇 医学
    • 86 篇 临床医学
    • 73 篇 基础医学(可授医学...
    • 35 篇 药学(可授医学、理...
  • 30 篇 农学
  • 27 篇 法学
  • 26 篇 经济学
  • 6 篇 教育学
  • 5 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 28 篇 w & z bosons
  • 28 篇 laboratories
  • 25 篇 deep learning
  • 24 篇 higgs bosons
  • 21 篇 computer archite...
  • 17 篇 semantics
  • 17 篇 feature extracti...
  • 17 篇 protocols
  • 17 篇 computer network...
  • 16 篇 computer science
  • 16 篇 reinforcement le...
  • 16 篇 optimization
  • 16 篇 cms
  • 15 篇 simulation
  • 15 篇 costs
  • 15 篇 artificial intel...
  • 15 篇 top quark
  • 14 篇 wireless communi...
  • 14 篇 neural networks

机构

  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 148 篇 istanbul technic...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 145 篇 academy of scien...
  • 144 篇 brunel universit...
  • 143 篇 indian institute...
  • 143 篇 charles universi...
  • 140 篇 imperial college...
  • 138 篇 university of de...
  • 138 篇 department of ph...
  • 137 篇 università di to...
  • 137 篇 rwth aachen univ...
  • 136 篇 indian institute...
  • 135 篇 infn sezione di ...
  • 132 篇 institute for nu...
  • 130 篇 zhejiang univers...
  • 129 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 1,431 篇 英文
  • 93 篇 其他
  • 29 篇 中文
检索条件"机构=Computer and Network System Research Laboratory Department of Computer Engineering"
1553 条 记 录,以下是151-160 订阅
排序:
Forward and Backward Private Searchable Encryption with Fine-grained Access Control
Forward and Backward Private Searchable Encryption with Fine...
收藏 引用
Cloud Computing, Big Data Applications and Software engineering (CBASE), International Conference on
作者: Peiming Xu Lingling Xu Xiang Jin Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute CSG Guangzhou China School of Computer Science and Engineering South China University of Technology Guangzhou China
With the rapid development of cloud computing, more and more data are stored in the cloud server. However, due to the increasing demands for security and user privacy, sensitive data are expected to be stored in an en...
来源: 评论
TPE-H2MWD:an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
收藏 引用
Frontiers of Information Technology & Electronic engineering 2023年 第8期24卷 1169-1180页
作者: Xiuli CHAI Xiuhui CHEN Yakun MA Fang ZUO Zhihua GAN Yushu ZHANG School of Artificial Intelligence Henan Engineering Research Center for Industrial Internet of ThingsHenan UniversityZhengzhou450046China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China School of Software Intelligent Data Processing Engineering Research Center of Henan ProvinceInstitute of Intelligent Network SystemHenan UniversityKaifeng475004China College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing211106China
With the substantial increase in image transmission,the demand for image security is ***-like images can be obtained by conventional encryption schemes,and although the security of the images can be guaranteed,the noi... 详细信息
来源: 评论
Applying system Thinking to Learn from Accident of Modern Automatic Control systems
收藏 引用
Chinese Journal of Electronics 2025年 第2期23卷 409-414页
作者: Ru Niu Yuan Cao Xiaocheng Ge Tao Tang State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing China School of Electronics and Information Engineering National Engineering Research Center of Rail Transportation Operation and Control System Beijing Jiaotong University Beijing China Department of Computer Science University of York York UK
Modern societies increasingly rely on automatic control systems. These systems are hardly pure technical systems; instead they are complex socio-technical systems, which consist of technical elements and social compon... 详细信息
来源: 评论
Online Learning in Blockchain-based Energy Trading systems  24
Online Learning in Blockchain-based Energy Trading Systems
收藏 引用
2024 International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile networks and Mobile Computing, MobiHoc 2024
作者: Liu, Yunshu Cheung, Man Hon Huang, Jianwei Pillar of Engineering Systems and Design Singapore University of Technology and Design Singapore Singapore Department of Computer Science City University of Hong Kong Hong Kong School of Science and Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen Key Laboratory of Crowd Intelligence Empowered Low-Carbon Energy Network CSIJRI Joint Research Centre on Smart Energy Storage The Chinese University of HongKong Guangdong Shenzhen518172 China
In this paper, we consider a blockchain-based energy trading (BBET) system with the proof-of-stake (PoS) protocol. The system designer aims to minimize system cost by considering the prosumers’ strategic token alloca... 详细信息
来源: 评论
Block-based fine-grained and publicly verifiable data deletion for cloud storage: Block-based fine-grained and publicly verifiable..: C. Yang et al.
收藏 引用
Soft Computing 2024年 第21期28卷 12491-12506页
作者: Yang, Changsong Liu, Yueling Ding, Yong Wu, Yongqiang Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China Lion Rock Labs of Cyberspace Security Institute of Cyberspace Technology HKCT Institute for Higher Education 999077 Hong Kong Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin541004 China School of Computer Guangdong University of Science & Technology Dongguan523083 China South China Technical Support Department Topsec Network Technology Inc. Guangzhou510000 China
One of the most important services provided by cloud service providers (CSPs), cloud storage is economically attractive and can provide on-demand data storage service to resource-constrained tenants in the manner of p... 详细信息
来源: 评论
Digital Over-the-Air Federated Learning in Multi-Antenna systems
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Sihua Chen, Mingzhe Shen, Cong Yin, Changchuan Brinton, Christopher G. The Beijing Laboratory of Advanced Information Network The Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing100876 China The Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral GablesFL33146 United States The Charles L. Brown Department of Electrical and Computer Engineering University of Virginia CharlottesvilleVA United States The School of Electrical and Computer Engineering Purdue University West LafayetteIN United States
In this paper, the performance optimization of federated learning (FL), when deployed over a realistic wireless multiple-input multiple-output (MIMO) communication system with digital modulation and over-the-air compu... 详细信息
来源: 评论
Design and Implementation of Links Generation for Inter Domain Routing system  12
Design and Implementation of Links Generation for Inter Doma...
收藏 引用
12th International Conference on Information Science and Technology, ICIST 2022
作者: Wang, Yu Qiao, Zhi Yin, Junru Zhang, Mingliang College of Software Henan University of Engineering Zhengzhou China College of Information and Electrical Engineering China Agriculture University Beijing China College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Network Research Department Zhengzhou China
Due to the inherent flaws of BGP protocol, the security of inter domain routing system has been regularly threatened. Since it is difficult to achieve collaborative defense against existing resources and strategies of... 详细信息
来源: 评论
Generative AI-Enhanced Cooperative MEC of UAVs and Ground Stations for Unmanned Surface Vehicles
Generative AI-Enhanced Cooperative MEC of UAVs and Ground St...
收藏 引用
Annual Conference on Information Sciences and systems (CISS)
作者: Jiahao You Ziye Jia Chao Dong Qihui Wu Zhu Han The Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics Nanjing China National Mobile Communications Research Laboratory Southeast University Nanjing China Department of Electrical and Computer Engineering University of Houston Houston TX USA Department of Computer Science and Engineering Kyung Hee University Seoul South Korea
The increasing deployment of unmanned surface vehicles (USVs) require computational support and coverage in applications such as maritime search and rescue. Unmanned aerial vehicles (UAVs) can offer low-cost, flexible... 详细信息
来源: 评论
Semantic and Emotional Dual Channel for Emotion Recognition in Conversation
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Yang, Zhenyu Zhang, Zhibo Cheng, Yuhu Zhang, Tong Wang, Xuesong Jinan250353 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China China University of Mining and Technology Engineering Research Center of Intelligent Control for Underground Space Ministry of Education Xuzhou Key Laboratory of Artificial Intelligence and Big Data School of Information and Control Engineering Xuzhou221116 China South China University of Technology Guangdong Provincial Key Laboratory of Computational Intelligence and Cyberspace Information School of Computer Science and Engineering Guangzhou510006 China Pazhou Lab Guangzhou510335 China Engineering Research Center Ministry of Education on Health Intelligent Perception and Paralleled Digital-Human Guangzhou China
Emotion recognition in conversation (ERC) aims at accurately identifying emotional states expressed in conversational content. Existing ERC methods, although relying on semantic understanding, often encounter challeng... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论