咨询与建议

限定检索结果

文献类型

  • 254 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 471 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 337 篇 工学
    • 247 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 63 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 建筑学
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 440 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
471 条 记 录,以下是91-100 订阅
排序:
GUEST EDITORIAL
收藏 引用
China Communications 2023年 第2期 3-6页
作者: Yuan Wu Xu Chen Feng Lyu Xianfu Chen Xumin Huang Jie Gao Yueyue Dai Tony Q.S.Quek Yan Zhang the State Key Laboratory of Internet of Things for Smart City University of Macau the Department of Computer and Information Science University of Macau Sun Yat-sen University Sun Yat-sen University Institute of Advanced Networking and Computing Systems Sun Yat-sen University National and Local Joint Engineering Laboratory the School of Computer Science and Engineering Central South University the VTT Technical Research Centre of Finland the School of Automation Guangdong University of Technology the School of Information Technology Carleton University Huazhong University of Science and Technology Singapore University of Technology and Design(SUTD) the IEEE Communications Society Technical Committee on Green Communications and Computing(TCGCC)
With the growing maturity of the advanced edge-cloud collaboration and integrated sensing-communication-computing systems, edge intelligence has been envisioned as one of the enabling technologies for ubiquitous and l...
来源: 评论
An autoencoder-like nonnegative matrix co-factorization for improved student cognitive modeling  24
An autoencoder-like nonnegative matrix co-factorization for ...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Shenbao Yu Yinghui Pan Yifeng Zeng Prashant Doshi Guoquan Liu Kim-Leng Poh Mingwei Lin College of Computer and Cyber Security Fujian Normal University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer and Information Sciences Northumbria University UK Intelligent Thought and Action Lab School of Computing University of Georgia Financial Technology Research Institute Fudan University China College of Design and Engineering National University of Singapore Singapore
Student cognitive modeling (SCM) is a fundamental task in intelligent education, with applications ranging from personalized learning to educational resource allocation. By exploiting students' response logs, SCM ...
来源: 评论
Map2Schedule: An End-to-End Link Scheduling Method for Urban V2V Communications
Map2Schedule: An End-to-End Link Scheduling Method for Urban...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Lihao Zhang Haijian Sun Jin Sun Ramviyas Parasuraman Yinghui Ye Rose Qingyang Hu School of Electrical and Computer Engineering University of Georgia Athens GA USA School of Computing University of Georgia Athens GA USA Shanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications China Electrical and Computer Engineering Department at Utah State University Logan UT USA
Urban vehicle-to-vehicle (V2V) link scheduling with shared spectrum is a challenging problem. Its main goal is to find the scheduling policy that can maximize system performance (usually the sum capacity of each link ... 详细信息
来源: 评论
Ciphertext-only fault analysis of GIFT lightweight cryptosystem
收藏 引用
Science China(Information Sciences) 2022年 第3期65卷 263-265页
作者: Wei LI Shan CAO Dawu GU Jiayao LI Tianpei CAI Menglin WANG Li SUN Zhiqiang LIU Ya LIU School of Computer Science and Technology Donghua University Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai Key Laboratory of Computing and Systems Shanghai Jiao Tong University Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai Jiao Tong University Department of Computer Science and Engineering University of Shanghai for Science and Technology
Dear editor,The GIFT cryptosystem was proposed by Banik et al. [1]in CHES 2017. It can be widely applied to protect RFID tags and other low-resource devices. It has an SPN structure with a fixed 128-bit key size and t... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
An Imperceptible Adversarial Attack Against 3D Object Detectors in Autonomous Driving
收藏 引用
IEEE internet of Things Journal 2025年
作者: Wang, Yizhou Wu, Libing Jin, Jiong Wang, Enshu Zhang, Zhuangzhuang Zhao, Yu Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Swinburne University of Technology School of Engineering MelbourneVIC3122 Australia Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Hong Kong Department of Computer Science Hong Kong Hong Kong
As LiDAR-based 3D object detection gains attention, existing research on point cloud adversarial attacks has exposed vulnerabilities in 3D neural network models, which can further impact the reliability of perception ... 详细信息
来源: 评论
Joint Secure and Covert Communications for Active STAR-RIS Assisted ISAC Systems
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Guo, Liang Jia, Jie Mu, Xidong Liu, Yuanwei Chen, Jian Wang, Xingwei Northeastern University School of Computer Science and Engineering China Northeastern University Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China BelfastBT3 9DT United Kingdom Department of Electrical and Electronic Engineering China
This paper investigates the design of jointly supporting physical layer security (PLS) and covert communications (CCs) in an active simultaneously transmitting and reflecting reconfigurable intelligent surface (a-STAR... 详细信息
来源: 评论
VHASR: A Multimodal Speech Recognition System With Vision Hotwords
arXiv
收藏 引用
arXiv 2024年
作者: Hu, Jiliang Li, Zuchao Wang, Ping Ai, Haojun Zhang, Lefei Zhao, Hai Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China School of Computer Science Wuhan University Wuhan China School of Information Management Wuhan University Wuhan China Department of Computer Science and Engineering Shanghai Jiao Tong University China
The image-based multimodal automatic speech recognition (ASR) model enhances speech recognition performance by incorporating audio-related image. However, some works suggest that introducing image information to model... 详细信息
来源: 评论
Improved lattice-based CCA2-secure PKE in the standard model
收藏 引用
Science China(Information Sciences) 2020年 第8期63卷 147-168页
作者: Jiang ZHANG Yu YU Shuqin FAN Zhenfeng ZHANG State Key Laboratory of Cryptology Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Jinan University Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
Based on the identity-based encryption(IBE) from lattices by Agrawal et al.(Eurocrypt’10),Micciancio and Peikert(Eurocrypt’12) presented a CCA1-secure public-key encryption(PKE), which has the best known efficiency ... 详细信息
来源: 评论