咨询与建议

限定检索结果

文献类型

  • 252 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 246 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 62 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 化学工程与技术
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 438 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
469 条 记 录,以下是231-240 订阅
排序:
Double JPEG Compression Detection Based on Markov Model  18th
Double JPEG Compression Detection Based on Markov Model
收藏 引用
18th International Workshop on Digital Forensics and Watermarking, IWDW 2019
作者: Wang, Jinwei Huang, Wei Luo, Xiangyang Shi, Yung-Qing Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer and Software Nanjing University of Information Science and Technology NanjingJiangsu210044 China Shanxi Key Laboratory of Network and System Security Xidian University Xi’an710071 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China State Key Laboratory of Information Security Institute Information Engineering Chinese Academy of Sciences Beijing100093 China Department of Electrical Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States
In this paper, a feature based on the Markov model in quaternion discrete cosine transform (QDCT) domain is proposed for double JPEG compression detection. Firstly, a given JPEG image is extracted from blocked images ... 详细信息
来源: 评论
MedSteGAN: Medical Embedding-Optimized Steganography with Improved GAN
SSRN
收藏 引用
SSRN 2023年
作者: Peng, Yuxiang Fu, Chong Zheng, Yu Tian, Yunjia Cao, Guixing Chen, Junxin School of Computer Science and Engineering Northeastern University Liaoning Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Liaoning Shenyang110819 China Department of Information Engineering The Chinese University of Hong Kong Ma Liu Shui Shatin New Territories Hong Kong Institute of Telecommunication Satellite China Academy of Space Technology Beijing100094 China School of Software Dalian University of Technology Liaoning Dalian116621 China
Medical diagnosing systems contain sensitive information, especially the resulting certificate of diagnosis that involves the patient’s privacy, required to be protected carefully. An effective way is to secretly emb... 详细信息
来源: 评论
Sparse random compressive sensing based data aggregation in wireless sensor networks
Sparse random compressive sensing based data aggregation in ...
收藏 引用
作者: Yin, Li Liu, Cuiye Guo, Songtao Yang, Yuanyuan Key Laboratory of Networks and Cloud Computing Security of Universities in Chongqing College of Electronic and Information Engineering Southwest University Chongqing400715 China School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Department of Electrical and Computer Engineering Stony Brook University Stony BrookNY11794 United States
In wireless sensor networks (WSNs), the volume of data is increasing at an unpredictable rate, which inevitably leads to high spatial-temporal correlation. To eliminate data redundancy, some researchers have proposed ... 详细信息
来源: 评论
Crsanet: Class Representations Self-Attention Network for the Segmentation of Thyroid Nodules
SSRN
收藏 引用
SSRN 2023年
作者: Sun, Shiyao Fu, Chong Xu, Sen Wen, Yingyou Ma, Tao School of Computer Science and Engineering Northeastern University Shenyang110819 China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China General Hospital of Northern Theatre Command Shenyang110016 China Medical Imaging Research Department Neusoft Research of Intelligent Healthcare Technology Co. Ltd. Shenyang China Dopamine Group Ltd. Auckland1542 New Zealand
Segmenting accurate thyroid nodules in medical ultrasound images is always non-trivial due to the large variation in size, shape and texture of nodules, and also the presence of surrounding tissues and organs with sim... 详细信息
来源: 评论
Uncertainty-guided Boundary Learning for Imbalanced Social Event Detection
arXiv
收藏 引用
arXiv 2023年
作者: Ren, Jiaqian Peng, Hao Jiang, Lei Liu, Zhiwei Wu, Jia Yu, Zhengtao Yu, Philip S. The Institute of Information Engineering Chinese Academy of Sciences the School of Cyber Security University of Chinese Academy of Sciences Beijing China The School of Cyber Science and Technology Beihang University Beijing1000191 China Salesforce AI Research CA94301 United States The School of Computing Macquarie University Sydney Australia The Faculty of Information Engineering and Automation Yunnan Key Laboratory of Artificial Intelligence Kunming University of Science and Technology Kunming650500 China The Department of Computer Science University of Illinois at Chicago ChicagoIL60607 United States
Real-world social events typically exhibit a severe class-imbalance distribution, which makes the trained detection model encounter a serious generalization challenge. Most studies solve this problem from the frequenc... 详细信息
来源: 评论
OpenAPMax: Abnormal Patterns-based Model for Real-World Alzheimer’s Disease Diagnosis
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Yunyou Guan, Xianglong Lu, Xiangjiang Liang, Xiaoshuang Miao, Xiuxia Xie, Jiyue Liu, Wenjing Ma, Li Tang, Suqin Zhang, Zhifei Zhan, Jianfeng The Key Lab of Education Blockchain and Intelligent Technology Ministry of Education The Guangxi Key Laboratory of Multi-Source Information Mining and Security Guangxi Normal University China The School of Electronic and Information Engineering School of Integrated Circuits Guangxi Normal University Guilin530015 China The Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University China The State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100086 China The Department of Physiology and Pathophysiology Capital Medical University Beijing100069 China The Guilin Medical University Guilin541001 China The Guangxi Key Lab of Multi-Source Information Mining & Security China
Alzheimer’s disease (AD) cannot be reversed, but early diagnosis will significantly benefit patients’ medical treatment and care. In recent works, AD diagnosis has the primary assumption that all categories are know... 详细信息
来源: 评论
Some Sufficient Conditions Under Which a Non-Autonomous Discrete System or Semi-Flow is Sensitive
SSRN
收藏 引用
SSRN 2022年
作者: Li, Risong Wang, Hongqing Lu, Tianxiu Li, YongJiang Quan, Weizhen School of Mathematics and Computer Science Guangdong Ocean University Zhanjiang524025 China College of Mathematics and Statistics Sichuan University of Science and Engineering Zigong Sichuan 643000 China Bridge Non-destruction Detecting and Engineering Computing Key Laboratory of Sichuan Province Zigong Sichuan 643000 China Artificial Intelligence Key Laboratory of Sichuan Province Key Laboratory of Higher Education of Sichuan Province for Enterprise Informationalization and Internet of Things Zigong Sichuan 643000 China Department of Mathematics Zhanjiang Preschool Education College Zhanjiang524037 China
In this paper we are concerned withsensitivity for non-autonomous discrete systems and semi-flows. Somesufficient conditions of sensitivity for non-autonomous discretesystems and semi-flows are established, where it i... 详细信息
来源: 评论
A 2-bit graphene encoder based on the plasmon-induced transparency effect and its sensing characteristics
收藏 引用
Results in Physics 2024年 59卷
作者: Zhu, Aijun Li, Zongteng Hou, Weigang Yang, Xinghua Cheng, Lei Hu, Cong Qiao, Fei Mahapatra, Rabi Guangxi Key Laboratory of Automatic Detecting Technology and Instruments Guilin University of Electronic Technology Guilin 541004 China Shanxi Key Laboratory of Advanced Semiconductor Optoelectronic Devices and Integrated Systems Jincheng Shanxi 048000 China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing 400000 China College of Science Beijing Forestry University Beijing 100083 China Jincheng Research Institute of Opto-mechatronics Industry Jincheng Shanxi 048000 China Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips Guangxi Normal University Guilin 541004 China Department of Electronic Engineering Tsinghua University Beijing 100084 China Department of Computer Science and Engineering Texas A&M University College Station 77843-3112 TX United States
A 2-bit encoder based on the plasmon-induced transparency (PIT) effect was proposed and investigated in the range from 2 to 7 THz. The Lorentz oscillation coupling model was utilized to confirm the simulation. By tuni... 详细信息
来源: 评论
A many-objective evolutionary algorithm based on rotation and decomposition
收藏 引用
Swarm and Evolutionary Computation 2021年 60卷
作者: Zou, Juan Liu, Jing Yang, Shengxiang Zheng, Jinhua Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University XiangtanHunan411105 China Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Information Engineering College of Xiangtan University XiangtanHunan411105 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China School of Computer Science and Informatics De Montfort University LeicesterLE1 9BH United Kingdom
Evolutionary algorithms have shown their promise in addressing multiobjective problems (MOPs). However, the Pareto dominance used in multiobjective optimization loses its effectiveness when addressing many-objective p... 详细信息
来源: 评论
Detection of Deepfake videos using long distance attention
arXiv
收藏 引用
arXiv 2021年
作者: Lu, Wei Liu, Lingyi Luo, Junwei Zhao, Xianfeng Zhou, Yicong Huang, Jiwu School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100195 China School of Cyber Security University of Chinese Academy of Sciences Beijing100195 China Department of Computer and Information Science University of Macau 999078 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518055 China
With the rapid progress of deepfake techniques in recent years, facial video forgery can generate highly deceptive video contents and bring severe security threats. And detection of such forgery videos is much more ur... 详细信息
来源: 评论