咨询与建议

限定检索结果

文献类型

  • 691 篇 会议
  • 584 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,282 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 892 篇 工学
    • 689 篇 计算机科学与技术...
    • 567 篇 软件工程
    • 229 篇 信息与通信工程
    • 113 篇 控制科学与工程
    • 90 篇 生物工程
    • 75 篇 电气工程
    • 73 篇 网络空间安全
    • 62 篇 机械工程
    • 59 篇 电子科学与技术(可...
    • 47 篇 生物医学工程(可授...
    • 40 篇 光学工程
    • 38 篇 仪器科学与技术
    • 28 篇 安全科学与工程
    • 26 篇 化学工程与技术
    • 17 篇 动力工程及工程热...
  • 383 篇 理学
    • 234 篇 数学
    • 96 篇 生物学
    • 86 篇 物理学
    • 69 篇 统计学(可授理学、...
    • 40 篇 系统科学
    • 26 篇 化学
  • 219 篇 管理学
    • 127 篇 管理科学与工程(可...
    • 99 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 65 篇 法学
    • 41 篇 社会学
    • 27 篇 法学
  • 41 篇 医学
    • 35 篇 临床医学
    • 27 篇 基础医学(可授医学...
    • 17 篇 药学(可授医学、理...
    • 16 篇 公共卫生与预防医...
  • 14 篇 经济学
  • 14 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 45 篇 training
  • 41 篇 semantics
  • 36 篇 cryptography
  • 33 篇 authentication
  • 33 篇 security
  • 30 篇 deep learning
  • 30 篇 feature extracti...
  • 29 篇 privacy
  • 25 篇 internet of thin...
  • 20 篇 object detection
  • 19 篇 convolution
  • 19 篇 graph neural net...
  • 19 篇 machine learning
  • 19 篇 federated learni...
  • 18 篇 computational mo...
  • 16 篇 reinforcement le...
  • 16 篇 blockchain
  • 16 篇 encryption
  • 15 篇 task analysis
  • 15 篇 wireless sensor ...

机构

  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 41 篇 school of comput...
  • 29 篇 key lab of educa...
  • 29 篇 school of cyber ...
  • 28 篇 pca lab key lab ...
  • 27 篇 security enginee...
  • 25 篇 college of compu...
  • 21 篇 key lab of infor...
  • 19 篇 school of comput...
  • 19 篇 school of cyber ...
  • 18 篇 department of el...
  • 18 篇 school of comput...
  • 18 篇 school of comput...
  • 16 篇 national enginee...
  • 16 篇 pca lab key lab ...
  • 16 篇 peng cheng labor...
  • 16 篇 hubei engineerin...
  • 15 篇 hubei key labora...
  • 15 篇 services computi...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 23 篇 xie jin
  • 22 篇 li xianxian
  • 19 篇 xianxian li
  • 19 篇 zhixin li
  • 18 篇 luo xudong
  • 18 篇 walid el-shafai
  • 18 篇 cao xiaochun
  • 16 篇 cheng minquan
  • 16 篇 li zhixin
  • 15 篇 canlong zhang
  • 15 篇 jinyan wang
  • 15 篇 huifang ma
  • 15 篇 zhang shichao
  • 15 篇 jiang haobo
  • 15 篇 jin hai
  • 15 篇 li hui
  • 14 篇 qian jianjun
  • 14 篇 xu qianqian

语言

  • 1,130 篇 英文
  • 117 篇 其他
  • 35 篇 中文
检索条件"机构=Information and Computer Security Lab"
1282 条 记 录,以下是1-10 订阅
排序:
GENOME:Genetic Encoding for Novel Optimization of Malware Detection and Classification in Edge Computing
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4021-4039页
作者: Sang-Hoon Choi Ki-Woong Park SysCore Lab Sejong UniversitySeoul05006Republic of Korea Department of Computer and Information Security Sejong UniversitySeoul05006Republic of Korea
The proliferation of Internet of Things(IoT)devices has established edge computing as a critical paradigm for real-time data analysis and low-latency ***,the distributed nature of edge computing presents substantial s... 详细信息
来源: 评论
Novel Feature Extractor Framework in Conjunction with Supervised Three Class-XGBoost Algorithm for Osteosarcoma Detection from Whole Slide Medical Histopathology Images
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3337-3353页
作者: Tanzila Saba Muhammad Mujahid Shaha Al-Otaibi Noor Ayesha Amjad Rehman Khan Artificial Intelligence&Data Analytics Lab College of Computer&Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Center of Excellence in Cyber Security(CYBEX) Prince Sultan UniversityRiyadh11586Saudi Arabia
Osteosarcomas are malignant neoplasms derived from undifferentiated osteogenic mesenchymal cells. It causes severe and permanent damage to human tissue and has a high mortality rate. The condition has the capacity to ... 详细信息
来源: 评论
Efficient multi-scale community search method based on spectral graph wavelet
收藏 引用
Frontiers of computer Science 2023年 第5期17卷 89-101页
作者: Cairui YAN Huifang MA Qingqing LI Fanyi YANG Zhixin LI College of Computer Science and Engineering Northwest Normal UniversityLanzhou 730070China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal UniversityGuilin 541004China
Community search is an important problem in network analysis,which has attracted much attention in recent *** a query-oriented variant of community detection problem,community search starts with some given nodes,pays ... 详细信息
来源: 评论
Aspect-level sentiment analysis based on semantic heterogeneous graph convolutional network
收藏 引用
Frontiers of computer Science 2023年 第6期17卷 87-99页
作者: Yufei ZENG Zhixin LI Zhenbin CHEN Huifang MA Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal UniversityGuilin 541004China College of Computer Science and Engineering Northwest Normal UniversityLanzhou 730070China
The deep learning methods based on syntactic dependency tree have achieved great success on Aspect-based Sentiment Analysis(ABSA).However,the accuracy of the dependency parser cannot be determined,which may keep aspec... 详细信息
来源: 评论
Task Offloading and Resource Allocation Based on Reinforcement Learning and Load Balancing in Vehicular Networking
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 2217-2230页
作者: Tian, Shujuan Xiang, Shuhuan Zhou, Ziqi Dai, Haipeng Yu, Enze Deng, Qingyong Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent network School of Computer Science and School of Cyberspace Security Xiangtan411105 China Nanjing University School of Computer Science and Technology Nanjing211189 China Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guilin541004 China Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining and Security Guilin541004 China
Due to limited on-board resources and the mobility characteristics of vehicles in a multi-access edge computing (MEC)-based vehicular network, efficient task offloading and resource allocation schemes are essential fo... 详细信息
来源: 评论
Phishing Classification Based on Text Content of an Email Body Using Transformers
Phishing Classification Based on Text Content of an Email Bo...
收藏 引用
International Conference on information security, Privacy, and Digital Forensics, 2022
作者: Somesha, M. Pais, Alwyn R. Department of Computer Science and Engineering Information Security Research Lab National Institute of Technology Karnataka Surathkal575025 India
Phishing attacks steal sensitive credentials using different techniques, tools, and some sophisticated methods. The techniques include content injection, information re-routing, social engineering, server hacking, soc... 详细信息
来源: 评论
CYBERSHIELD: A Competitive Simulation Environment for Training AI in Cybersecurity  11
CYBERSHIELD: A Competitive Simulation Environment for Traini...
收藏 引用
11th International Conference on Internet of Things: Systems, Management and security, IOTSMS 2024
作者: Carrasco, José Álvaro Fernández Pagola, Iñigo Amonarriz Urrutia, Raúl Orduna Román, Rodrigo San Sebastian Donostia20009 Spain University of Malaga Network Information and Computer Security Lab Malaga29071 Spain
Simulation environments are crucial in cybersecurity for training AI algorithms, providing a secure and controlled space to explore the impact derived from diverse cyber threads. They offer a flexible platform for acc... 详细信息
来源: 评论
Robust Hashing with Deep Features and Meixner Moments for Image Copy Detection
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2024年 第12期20卷 1-23页
作者: Yu, Mengzhu Tang, Zhenjun Liang, Xiaoping Zhang, Xianquan Li, Zhixin Zhang, Xinpeng Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin China School of Computer Science Fudan University Shanghai China
Copy detection is a key task of image copyright protection. Most robust hashing schemes do not make satisfied performance of image copy detection yet. To address this, a robust hashing scheme with deep features and Me... 详细信息
来源: 评论
Enhancing TrUStAPIS Methodology in the Web of Things with LLM-Generated IoT Trust Semantics  26th
Enhancing TrUStAPIS Methodology in the Web of Things with LL...
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Ferraris, Davide Kotis, Konstantinos Kalloniatis, Christos Network Information and Computer Security Lab University of Malaga Malaga Spain Department of Cultural Technology and Communication University of the Aegean Mytilene Greece
In the Internet of Things (IoT) there are ecosystems where their physical’smart’ entities virtually interact with each other. Often, this interaction occurs among unknown entities, making trust an essential requirem... 详细信息
来源: 评论
Robust Quantum Feature Selection With Sparse Optimization Circuit
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年 第7期44卷 2613-2626页
作者: Li, Jiaye Song, Jiagang Shi, Jinjing Xu, Hang Yu, Hao Chen, Gang Zhang, Shichao Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou310027 China Institute of Blockchain and Data Security China Central South University School of Computer Science and Engineering Changsha410083 China Central South University School of Electronic Information Changsha410083 China Xiangtan University School of Computer Science and School of Cyberspace Science Hunan Xiangtan411105 China Guangxi Normal University Guangxi Key Lab of Multisource Information Mining and Security Guilin541004 China
High-dimensional data has long been a notoriously challenging issue. Existing quantum dimension reduction technology primarily focuses on quantum principal component analysis. However, there are only a few studies on ... 详细信息
来源: 评论