咨询与建议

限定检索结果

文献类型

  • 252 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 246 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 62 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 化学工程与技术
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 438 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
469 条 记 录,以下是221-230 订阅
排序:
Robust, Private and secure cache-aided scalar linear function retrieval from coded servers
arXiv
收藏 引用
arXiv 2021年
作者: Yan, Qifa Tuninetti, Daniela The Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu611756 China The Electrical and Computer Engineering Department The University of Illinois Chicago ChicagoIL60607 United States The Electrical and Computer Engineering Department The University of Illinois Chicago ChicagoIL60607 United States
This work investigates a system where each user aims to retrieve a scalar linear function of the files of a library, which are Maximum Distance Separable coded and stored at multiple distributed servers. The system ne... 详细信息
来源: 评论
Performance Analysis of ZCC-Optical-CDMA over SMF for Fiber-To-The-Home Access Network  2
Performance Analysis of ZCC-Optical-CDMA over SMF for Fiber-...
收藏 引用
2nd Joint International Conference on Emerging computing Technology and Sports, JICETS 2019
作者: Ghazi, Alaan Aljunid, S.A. Fareed, Alaa Idrus, Syed Zulkarnain Syed Rashidi, C.B.M. Albayaty, Marwa Al-Dawoodi, Aras Fakhrudeen, Ahmed M. School of Human Development and Techno Communication University Malaysia Perlis Malaysia School of Computer and Communication Engineering University Malaysia Perlis Malaysia Computer Technical Engineering Alkitab University Iraq Internet Research Laboratory School of Computing University Utara Malaysia Malaysia Computer Science Department College of Computer Science and Information Technology Kirkuk University Iraq Networks Department College of Computer Science and Information Technology Kirkuk University Iraq
To provide a sustainable fiber-to-the-home (FTTH), several multiplexing techniques have been developed for this purpose. The correlation features are the main obstacle behind the network performance limitation, which ... 详细信息
来源: 评论
Intelligent decoding method for Ground-penetrating radar based on improved YOLOv5
Intelligent decoding method for Ground-penetrating radar bas...
收藏 引用
computer, Big Data and Artificial Intelligence (ICCBD+AI), International Conference on
作者: ZeYu Chen YongKang Wang HongLiang Liu Chuan Wang XinBo Jiang Ning Zhang Zhen Huang Lei Jiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) JiNan China Technological Innovation Department Shandong Hi-Speed Group Co Ltd JiNan China School of Qilu Transportation Shandong University JiNan China No.1 Engineering Development Co. Ltd. of China Railway 14Th Bureau Group RiZhao China
Ground-penetrating radar (GPR) is a non-invasive detection technique that effectively gathers information about subsurface materials. In tunneling projects, GPR can provide a fast and accurate forecast of the geologic... 详细信息
来源: 评论
Quantum continual learning of quantum data realizing knowledge backward transfer
arXiv
收藏 引用
arXiv 2022年
作者: Situ, Haozhen Lu, Tianxiang Pan, Minghua Li, Lvzhou College of Mathematics and Informatics South China Agricultural University Guangzhou510642 China Institute of Quantum Computing and Computer Theory School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China Department of Physics Tsinghua University Beijing100084 China
For the goal of strong artificial intelligence that can mimic human-level intelligence, AI systems would have the ability to adapt to ever-changing scenarios and learn new knowledge continuously without forgetting pre... 详细信息
来源: 评论
A Reconstruction Method for Cross-Cut Shredded Documents Based on the Extreme Learning Machine Algorithm
Research Square
收藏 引用
Research Square 2022年
作者: Zhang, Zhenghui Zou, Juan Zheng, Jinhua Yang, Shengxiang Gong, Dunwei Pei, Tingrui Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Hunan Xiangtan411105 China Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Information Engineering College of Xiangtan University Hunan Xiangtan411105 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China School of Computer Science and Informatics De Montfort University LeicesterLE1 9BH United Kingdom School of Information and Electronic Engineering China University of Mining and Technology Xuzhou221116 China
Reconstruction of cross-cut shredded text documents (RCCSTD) has important applications for information security and judicial evidence collection. The traditional method of manual construction is a very time-consuming... 详细信息
来源: 评论
The Initial Screening of Laryngeal Tumors via Voice Acoustic Analysis Based on Siamese Network Under Small Samples
收藏 引用
Journal of Voice 2025年
作者: You, Zhenzhen Sun, Delong Shi, Zhenghao Du, Shuangli Hei, Xinhong Kong, Demin Du, Xiaoying Yan, Jing Ren, Xiaoyong Hou, Jin Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China Department of Otolaryngology Second Affiliated Hospital of Medical College Xi'an Jiaotong University Xi'an China
Objective: The initial screening of laryngeal tumors via voice acoustic analysis is based on the clinician's experience that is subjective. This article introduces a Siamese network with an auxiliary gender classi... 详细信息
来源: 评论
Federated Client-tailored Adapter for Medical Image Segmentation
arXiv
收藏 引用
arXiv 2025年
作者: Hu, Guyue Song, Siyuan Kang, Yukun Yin, Zhu Zhao, Gangming Li, Chenglong Tang, Jin Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui Provincial Key Laboratory of Security Artificial Intelligence School of Artificial Intelligence Anhui University Hefei230601 China School of Internet Anhui University Hefei230601 China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China Department of Computer Science The University of Hong Kong Hong Kong
Medical image segmentation in X-ray images is beneficial for computer-aided diagnosis and lesion localization. Existing methods mainly fall into a centralized learning paradigm, which is inapplicable in the practical ... 详细信息
来源: 评论
Training, testing and benchmarking medical AI models using Clinical AIBench
收藏 引用
BenchCouncil Transactions on Benchmarks, Standards and Evaluations 2022年 第1期2卷 100037-100037页
作者: Huang, Yunyou Miao, Xiuxia Zhang, Ruchang Ma, Li Liu, Wenjing Zhang, Fan Guan, Xianglong Liang, Xiaoshuang Lu, Xiangjiang Tang, Suqing Zhang, Zhifei Guangxi Key Lab of Multi-Source Information Mining & Security School of Computer Science and Engineering & School of Software Guangxi Normal University Guilin China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Guilin Medical University Guilin China Department of Physiology and Pathophysiology Capital Medical University Beijing China Faculty of Education Guangxi Normal University Guilin China International Open Benchmark Council Beijing China
AI technology has been used in many clinical research fields, but most AI technologies are difficult to land in real-world clinical settings. In most current clinical AI research settings, the diagnosis task is to ide... 详细信息
来源: 评论
Achieving Privacy-Preserving Iris Identification Via El Gamal
收藏 引用
computers, Materials & Continua 2019年 第8期61卷 727-738页
作者: Yong Ding Lei Tian Bo Han Huiyong Wang Yujue Wang James Xi Zheng Guangxi Key Laboratory of Cryptography and Information Security School of Computer and Information SecurityGuilin University of Electronic TechnologyGuilin541004China School of Mathematics and Computer Science Guilin University of Electronic TechnologyGuilin541004China Software Engineering Department of Computing Macquarie UniversitySydneyNSW 2109 Australia
Currently,many biometric systems maintain the user’s biometrics and templates in plaintext format,which brings great privacy risk to uses’biometric *** are unique and almost unchangeable,which means it is a great co... 详细信息
来源: 评论
Abnormality Detection in Chest X-Ray Images Using Uncertainty Prediction Autoencoders  23rd
Abnormality Detection in Chest X-Ray Images Using Uncertaint...
收藏 引用
23rd International Conference on Medical Image computing and computer-Assisted Intervention, MICCAI 2020
作者: Mao, Yifan Xue, Fei-Fei Wang, Ruixuan Zhang, Jianguo Zheng, Wei-Shi Liu, Hongmei School of Data and Computer Science Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing MOE Guangzhou China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China Pazhou Lab Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China
Chest radiography is widely used in annual medical screening to check whether lungs are healthy or not. Therefore it would be desirable to develop an intelligent system to help clinicians automatically detect potentia... 详细信息
来源: 评论