咨询与建议

限定检索结果

文献类型

  • 125 篇 期刊文献
  • 98 篇 会议
  • 1 册 图书

馆藏范围

  • 224 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 143 篇 工学
    • 97 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 39 篇 信息与通信工程
    • 31 篇 控制科学与工程
    • 23 篇 电气工程
    • 14 篇 生物工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 光学工程
    • 9 篇 安全科学与工程
    • 8 篇 机械工程
    • 8 篇 航空宇航科学与技...
    • 7 篇 建筑学
    • 7 篇 化学工程与技术
    • 7 篇 网络空间安全
    • 5 篇 力学(可授工学、理...
    • 5 篇 土木工程
    • 5 篇 交通运输工程
    • 5 篇 环境科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 仪器科学与技术
  • 73 篇 理学
    • 38 篇 数学
    • 21 篇 物理学
    • 16 篇 生物学
    • 14 篇 系统科学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
  • 30 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 5 篇 法学
  • 3 篇 农学
  • 3 篇 军事学
  • 2 篇 经济学
  • 2 篇 医学
  • 1 篇 教育学

主题

  • 12 篇 federated learni...
  • 8 篇 security
  • 7 篇 deep learning
  • 6 篇 robustness
  • 6 篇 training
  • 5 篇 neural networks
  • 5 篇 real-time system...
  • 5 篇 sensors
  • 4 篇 robust control
  • 4 篇 interference
  • 4 篇 computational mo...
  • 4 篇 sliding mode con...
  • 4 篇 data models
  • 4 篇 cryptography
  • 4 篇 australia
  • 4 篇 military communi...
  • 3 篇 sensor systems
  • 3 篇 reinforcement le...
  • 3 篇 optimization
  • 3 篇 visualization

机构

  • 12 篇 department of in...
  • 9 篇 department of in...
  • 9 篇 state key labora...
  • 9 篇 china industrial...
  • 6 篇 institute of inf...
  • 6 篇 cyber-defence ca...
  • 4 篇 school of cyber ...
  • 4 篇 department of ma...
  • 4 篇 nato cyber secur...
  • 4 篇 communication sy...
  • 4 篇 department of co...
  • 4 篇 school of inform...
  • 4 篇 school of artifi...
  • 4 篇 communication sy...
  • 4 篇 state key labora...
  • 4 篇 department of in...
  • 4 篇 school of comput...
  • 4 篇 secure communica...
  • 4 篇 school of cyber ...
  • 4 篇 information tech...

作者

  • 15 篇 stiller burkhard
  • 15 篇 bovet gérôme
  • 14 篇 celdrán alberto ...
  • 12 篇 choo kim-kwang r...
  • 10 篇 feng chao
  • 8 篇 gregorio martíne...
  • 8 篇 alberto huertas ...
  • 8 篇 dong daoyi
  • 8 篇 burkhard stiller
  • 8 篇 gérôme bovet
  • 7 篇 pan yu
  • 7 篇 sánchez pedro mi...
  • 7 篇 pérez gregorio m...
  • 5 篇 wang yue
  • 5 篇 kim-kwang raymon...
  • 5 篇 beltrán enrique ...
  • 4 篇 pedro miguel sán...
  • 4 篇 konrad wrona
  • 4 篇 jan von der asse...
  • 4 篇 xiong rong

语言

  • 175 篇 英文
  • 48 篇 其他
  • 1 篇 中文
检索条件"机构=Cyber and Information Systems Defence Science and Technology Laboratory"
224 条 记 录,以下是11-20 订阅
排序:
Temporal Refinement Graph Convolutional Network for Skeleton-Based Action Recognition
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1586-1598页
作者: Zhuang, Tianming Qin, Zhen Ding, Yi Deng, Fuhu Chen, Leduo Qin, Zhiguang Raymond Choo, Kim-Kwang University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu Sichuan610054 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu Sichuan610054 China School of Advanced Technology Suzhou Jiangsu215123 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
Human skeleton data, which has served in the aspect of human activity recognition, ought to be the most representative biometric characteristics due to its intuitivity and visuality. The state-of-the-art approaches ma... 详细信息
来源: 评论
Efficient and Secure Federated Knowledge Transfer Under Non-IID Settings in IoT
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24644-24655页
作者: Liu, Shuying Xie, Rongpeng Miao, Yinbin Peng, Jinye Leng, Tao Liu, Zhiquan Choo, Kim-Kwang Raymond Northwest University School of Information Science and Technology Xi’an710119 China Xian Yang Normal University Department of Computer Xian Yang712000 China Xidian University School of Cyber Engineering Xi’an710071 China Sichuan Police College Intelligent Policing Key Laboratory of Sichuan Province Luzhou646000 China Jinan University College of Cyber Security Guangzhou510632 China Technology Ltd Beijing100020 China The University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
In the era of Internet of Things (IoT) and Federated Learning (FL), where distributed training models are essential, the FL paradigm has come into the spotlight for researchers. However, the inconsistency in the sourc... 详细信息
来源: 评论
A Monte Carlo Tree Search Framework for Autonomous Source Term Estimation in Stone Soup
A Monte Carlo Tree Search Framework for Autonomous Source Te...
收藏 引用
International Conference on information Fusion
作者: Timothy J Glover Rohit V. Nanavati Matthew Coombes Cunjia Liu Wen-Hua Chen Nicola Perree Steven Hiscocks Department of Aeronautical and Automotive Engineering Loughborough University UK Cyber and Information Systems Defence Science and Technology Laboratory Salisbury UK
Source term estimation of a hazardous release remains a topic of significant interest in the robotics and state estimation communities, with application to many safety critical scenarios including gas or nuclear relea... 详细信息
来源: 评论
An activated variable parameter gradient‐based neural network for time‐variant constrained quadratic programming and its applications
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第3期8卷 670-679页
作者: Guancheng Wang Zhihao Hao Haisheng Li Bob Zhang PAMI Research Group Department of Computer and Information ScienceUniversity of MacaoTaipaMacaoChina China Industrial Control Systems Cyber Emergency Response Team BeijingChina Beijing Key Laboratory of Big Data Technology for Food Safety Beijing Technology and Business UniversityBeijingChina
This study proposes a novel gradient‐based neural network model with an activated variable parameter,named as the activated variable parameter gradient‐based neural network(AVPGNN)model,to solve time‐varying constr... 详细信息
来源: 评论
TMAS:A transaction misbehavior analysis scheme for blockchain
收藏 引用
Blockchain(Research and Applications) 2024年 第3期5卷 42-52页
作者: Shiyong Huang Xiaohan Hao Yani Sun Chenhuang Wu Huimin Li Wei Ren Kim-Kwang Raymond Choo School of Computer Science China University of GeosciencesWuhan430074China Artificial Intelligence Thrust Information HubHong Kong University of Science and TechnologyGuangzhou511400China Yunnan Key Laboratory of Blockchain Application Technology Yunnan Innovation Institute of Beihang UniversityKunming650233China Fujian Key Laboratory of Financial Information Processing Putian UniversityPutian351100China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX 78249-0631USA
Blockchain-based cryptocurrencies,such as Bitcoins,are increasingly ***,the decentralized and anonymous nature of these currencies can also be(ab)used for nefarious activities such as money laundering,thus reinforcing... 详细信息
来源: 评论
A Framework Quantifying Trustworthiness of Supervised Machine and Deep Learning Models
A Framework Quantifying Trustworthiness of Supervised Machin...
收藏 引用
2023 Workshop on Artificial Intelligence Safety, SafeAI 2023
作者: Celdran, Alberto Huertas Kreischer, Jan Demirci, Melike Leupp, Joel Sanchez Sanchez, Pedro M. Franco, Muriel Figueredo Bovet, Gérôme Perez, Gregorio Martinez Stiller, Burkhard Communication Systems Group CSG Department of Informatics IfI University of Zurich UZH Switzerland Department of Information and Communications Engineering University of Murcia Spain Cyber-Defence Campus Armasuisse Science & Technology
Trusting Artificial Intelligence (AI) is controversial since models and predictions might not be fair, understandable by humans, robust against adversaries, or trained appropriately. Existing toolkits help data scient... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
CASKA-CRT: Chinese Remainder Theorem Empowered Certificateless Aggregate Signcryption Scheme with Key Agreement in IoVs
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第11期9卷 1-16页
作者: Hou, Yingzhe Cao, Yue Xiong, Hu Sun, Zhili Mumtaz, Shahid Tian, Daxin School of Cyber Science and Engineering Wuhan University Wuhan China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Institute of Communication Systems University of Surrey Guildford U.K Department of Applied Informatics Silesian University of Technology Akademicka Gliwice Poland State Key Laboratory of Vehicle-Infrastructure Integrated ITS the State Key Laboratory of Intelligent Transportation System and the School of Transportation Science and Engineering Beihang University Beijing China
To enhance the privacy of messages in Internet of Vehicles (IoVs), it is critical to preserve the communication security between Road Side Unit (RSU) and numerous vehicles. The primitive of signcryption is introduced ... 详细信息
来源: 评论
Resilient Formation Control Based on Watermarks for Networked Quadrotors under Deception Attacks
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第6期74卷 8839-8850页
作者: Zhan, Weiwei Miao, Zhiqiang Zeng, Jianxin Chen, Yanjie Wu, Zheng-Guang He, Wei Wang, Yaonan Hunan University College of Electrical and Information Engineering Changsha410082 China Fuzhou University School of Mechanical Engineering and Automation Fuzhou350108 China National Engineering Research Center of Robot Visual Perception and Control Technology Changsha410082 China Zhejiang University Institute of Cyber-Systems and Control Hangzhou310027 China University of Science and Technology Beijing Key Laboratory of Intelligent Bionic Unmanned Systems Ministry of Education School of Intelligence Science and Technology Institute of Artificial Intelligence Beijing100083 China
This article addresses the problem of formation control of networked UAVs under deception attacks. A lightweight resilient formation control framework based on watermarks is proposed to achieve the desired formation c... 详细信息
来源: 评论
SSpose: Self-Supervised Spatial-Aware Model for Human Pose Estimation
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第11期5卷 5403-5417页
作者: Yu, Linfang Qin, Zhen Xu, Liqun Qin, Zhiguang Choo, Kim-Kwang Raymond University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Industrial Research Institute Chengdu610213 China University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering Chengdu610054 China Industrial Research Institute Chengdu610213 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
Human pose estimation (HPE) relies on the anatomical relationships among different body parts to locate keypoints. Despite the significant progress achieved by convolutional neural networks (CNN)-based models in HPE, ... 详细信息
来源: 评论