咨询与建议

限定检索结果

文献类型

  • 252 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 246 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 62 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 化学工程与技术
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 438 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
469 条 记 录,以下是31-40 订阅
排序:
Atomic Smart Contract Interoperability with High Efficiency via Cross-Chain Integrated Execution
arXiv
收藏 引用
arXiv 2025年
作者: Yin, Chaoyue Li, Mingzhe Zhang, Jin Lin, You Wei, Qingsong Goh, Siow Mong Rick Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China Singapore
With the development of Ethereum, numerous blockchains compatible with Ethereum’s execution environment (i.e., Ethereum Virtual Machine, EVM) have emerged. Developers can leverage smart contracts to run various compl... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
DCGSD: Low-Light Image Enhancement with Dual-Conditional Guidance Sparse Diffusion Model
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Department of Computer Science and Engineering NO. 5 South Jinhua Road Shaanxi Xi'an710048 China
When restoring low-light images, most methods largely overlook the ambiguity due to dark noise and lack discrimination for region and shape representations, resulting in invalid feature enhancement. In this work, we p... 详细信息
来源: 评论
A Cloud computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm  18th
A Cloud Computing User Experience Focused Load Balancing Met...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud computing, GPC 2023
作者: Luo, Jihai Dong, Chen Chen, Zhenyi Xu, Li Chen, Tianci College of Computer and Data Science - Fuzhou University Xueyuan Road Fujian Fuzhou360108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Department of Computer Science and Engineering University of South Florida TampaFL33620 United States College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China
The development of the software and hardware has brought about the abundance and overflow of computing resources. Many internet companies can lease idle computing resources based on the peak and valley cycles of usage... 详细信息
来源: 评论
Brain-inspired artificial intelligence research: A review
收藏 引用
Science China(Technological Sciences) 2024年 第8期67卷 2282-2296页
作者: WANG GuoYin BAO HuaNan LIU Qun ZHOU TianGang WU Si HUANG TieJun YU ZhaoFei LU CeWu GONG YiHong ZHANG ZhaoXiang HE Sheng Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Computer and Information Science Chongqing Normal UniversityChongqing 401331China State Key Laboratory of Brain and Cognitive Science Institute of BiophysicsChinese Academy of SciencesBeijing 100101China School of Psychological and Cognitive Sciences Peking UniversityBeijing 100871China State Key Laboratory of Multimedia Information Processing School of Computer SciencePeking UniversityBeijing 100871China Department of Computer Science School of ElectronicsInformation and Electrical EngineeringShanghai Jiao Tong UniversityShanghai 200240China Faculty of Electronic and Information Engineering Xi’an Jiaotong UniversityXi’an 710049China The Center for Research on Intelligent Perception and Computing Institute of AutomationChinese Academy of SciencesBeijing 100190China Institute of Biophysics Chinese Academy of SciencesBeijing 100101China
Artificial intelligence(AI) systems surpass certain human intelligence abilities in a statistical sense as a whole, but are not yet the true realization of these human intelligence abilities and behaviors. There are d... 详细信息
来源: 评论
An efficient data aggregation scheme with local differential privacy in smart grid
收藏 引用
Digital Communications and Networks 2022年 第3期8卷 333-342页
作者: Na Gai Kaiping Xue Bin Zhu Jiayu Yang Jianqing Liu Debiao He School of Cyber Science and Technology University of Science and Technology of ChinaHefeiAnhui230027China Department of Electronic Engineering and Information Science University of Science and Technology of ChinaHefeiAnhui230027China Department of Electrical and Computer Engineering University of Alabama in HuntsvilleHuntsvilleAL35899USA Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education School of Cyber Science and EngineeringWuhan UniversityWuhanBeihu430072China
By integrating the traditional power grid with information and communication technology, smart grid achieves dependable, efficient, and flexible grid data processing. The smart meters deployed on the user side of the ... 详细信息
来源: 评论
Prepartition: Load Balancing Approach for Virtual Machine Reservations in a Cloud Data Center
收藏 引用
Journal of computer Science & Technology 2023年 第4期38卷 773-792页
作者: 田文洪 徐敏贤 周光耀 吴逵 须成忠 Rajkumar Buyya School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu 610054China Yangtze Delta Region Institute(Huzhou) University of Electronic Science and Technology of ChinaHuzhou 313001China Institute of Advanced Computing and Digital Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China Department of Computer Science University of VictoriaVictoriaBCV8W 3P6Canada State Key Laboratory of Internet of Things for Smart City University of MacaoMacao 999078China School of Computing and Information Systems University of MelbourneMelbourne 3010Australia
Load balancing is vital for the efficient and long-term operation of cloud data *** virtualization,post(reactive)migration of virtual machines(VMs)after allocation is the traditional way for load balancing and consoli... 详细信息
来源: 评论
Prediction of miRNA family based on class-incremental learning
Prediction of miRNA family based on class-incremental learni...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Lulu Qiu Aimin Li Rong Fei Junhuai Li Fang-Xiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Department of Mechanical Engineering Department of Computer Science Division of Biomedical Engineering Saskatoon Canada
With the development of deep sequencing, recent studies indicate that a miRNA precursor can generate multiple miRNA isoforms (isomiRs). The family prediction of canonical miRNAs and isomiRs could provide a basis for m... 详细信息
来源: 评论
Integrated Energy-Efficient Distributed Link Stability Algorithm for UAV Networks
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2357-2394页
作者: Altaf Hussain Shuaiyong Li Tariq Hussain Razaz Waheeb Attar Farman Ali Ahmed Alhomoud Babar Shah School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Industrial Internet of Things and Networked Control Ministry of EducationChongqing University of Posts and TelecommunicationsChongqing400065China School of Computer Science and Information Engineering Zhejiang Gongshang UniversityHangzhou310018China Management Department College of Business AdministrationPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Applied AI School of ConvergenceCollege of Computing and InformaticsSungkyunkwan UniversitySeoul03063Republic of Korea Department of Computer Science College of ScienceNorthern Border UniversityArar91431Saudi Arabia College of Technological Innovation Zayed UniversityDubai19282United Arab Emirates
Ad hoc networks offer promising applications due to their ease of use,installation,and deployment,as they do not require a centralized control *** these networks,nodes function as senders,receivers,and *** such networ... 详细信息
来源: 评论
AR-CNN: an attention ranking network for learning urban perception
收藏 引用
Science China(Information Sciences) 2022年 第1期65卷 164-174页
作者: Zhetao LI Ziwen CHEN Wei-Shi ZHENG Sangyoon OH Kien NGUYEN Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University School of Data and Computer Science Sun Yat-sen University Department of Computer and Information Engineering Ajou University Graduate School of Engineering Chiba University
An increasing number of deep learning methods is being applied to quantify the perception of urban environments, study the relationship between urban appearance and resident safety, and improve urban appearance. Most ... 详细信息
来源: 评论