咨询与建议

限定检索结果

文献类型

  • 254 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 471 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 337 篇 工学
    • 247 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 63 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 建筑学
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 440 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
471 条 记 录,以下是51-60 订阅
排序:
MRLATO: An Adaptive Task Offloading Mechanism Based on Meta Reinforcement Learning in Edge computing Environment
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Zhang, Peiying Liu, Jiamin Guizani, Maher Wang, Jian Kumar, Neeraj Tan, Lizhuang Qingdao Institute of Software College of Computer Science and Technology Qingdao266580 China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao266580 China Ministry of Education Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250014 China University of Texas Arlington Computer Science and Engineering Department TX United States College of Science Qingdao266580 China Thapar University Department of Computer Science and Engineering Patiala147004 India Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China
Traditional cloud computing models struggle to meet the requirements of latency-sensitive applications when processing large amounts of data. As a solution, Multi-access Edge computing (MEC) extends computing resource... 详细信息
来源: 评论
Energy Consumption Models for UAV Communications: A Brief Survey  15
Energy Consumption Models for UAV Communications: A Brief Su...
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on internet of Things, iThings 2022, 18th IEEE International Conferences on Green computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social computing, CPSCom 2022 and 8th IEEE International Conference on Smart Data, SmartData 2022
作者: Yan, Hua Yang, Shuang-Hua Ding, Yulong Chen, Yunfei Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet SUSTech Shenzhen China Department of Computer Science and Engineering SUSTech Shenzhen China Academy for Advanced Interdisciplinary Studies SUSTech Shenzhen China School of Engineering University of Warwick Coventry United Kingdom
Unmanned aerial vehicles (UAVs) have been widely used in wireless communications. However, limited by on-board energy, to achieve a full potential of UAV is a challenge. As a result, accurate energy consumption models... 详细信息
来源: 评论
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Xiaoyang Yang, Mengda Yi, Wenzhe Li, Ziang Wang, Juan Hu, Hongxin Zhuang, Yong Liu, Yaxin Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Department of Computer Science and Engineering University at Buffalo SUNY United States
Split Learning (SL) is a distributed learning framework renowned for its privacy-preserving features and minimal computational requirements. Previous research consistently highlights the potential privacy breaches in ... 详细信息
来源: 评论
internet of Digital Twin: Framework, Applications and Enabling Technologies
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Liu, Ruhan Luan, Tom H. Qu, Youyang Xiang, Yong Gao, Longxiang Zhao, Dongmei Deakin University School of Info Technology MelbourneVIC3125 Australia Xi'an Jiaotong University School of Cyber Science and Engineering Shaanxi Xi'an710049 China Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China McMaster University Department of Electrical and Computer Engineering HamiltonON Canada
Intelligent physical systems, such as smart vehicles and robotic arms, are increasingly integrated into both industrial and everyday applications. However, the systems typically face hardware limitations that constrai... 详细信息
来源: 评论
RaCMC: Residual-Aware Compensation Network with Multi-Granularity Constraints for Fake News Detection
arXiv
收藏 引用
arXiv 2024年
作者: Yu, Xinquan Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China State Key Laboratory of Internet of Things for Smart City The Department of Computer and Information Science Faculty of Science and Technology University of Macau 999078 China
Multimodal fake news detection aims to automatically identify real or fake news, thereby mitigating the adverse effects caused by such misinformation. Although prevailing approaches have demonstrated their effectivene... 详细信息
来源: 评论
Adaptive ELM-Based Time-Constrained Control of Uncertain Robotic Manipulators With Minimum Learning Computation
收藏 引用
IEEE Transactions on Emerging Topics in computing 2025年
作者: Jin, Xiaozheng Hou, Yuhan Wu, Xiaoming Chi, Jing Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Jinan250013 China Qilu Institute of Technology School of Intelligent Manufacturing and Control Engineering Shandong Jinan250200 China Shandong University of Finance and Economics School of Computing and Artificial Intelligence Shandong Jinan250014 China
This paper studies the extreme learning machine (ELM)-based time-constrained trajectory tracking control of a class of robotic manipulator systems with model/input uncertainties, matched and mismatched disturbances. A... 详细信息
来源: 评论
Retrofitting XoM for Stripped Binaries without Embedded Data Relocation
arXiv
收藏 引用
arXiv 2024年
作者: Luo, Chenke Ming, Jiang Xie, Mengfei Peng, Guojun Fu, Jianming Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Department of Computer Science School of Science and Engineering Tulane University United States
System programs are frequently coded in memory-unsafe languages such as C/C++, rendering them susceptible to a variety of memory corruption attacks. Among these, just-in-time return-oriented programming (JIT-ROP) stan... 详细信息
来源: 评论
SP-Chain: Boosting Intra-Shard and Cross-Shard security and Performance in Blockchain Sharding
arXiv
收藏 引用
arXiv 2024年
作者: Li, Mingzhe Lin, You Wang, Wei Zhang, Jin The Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China The Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong The Institute of High Performance Computing A*STAR Singapore The Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China The Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China
A promising way to overcome the scalability limitations of the current blockchain is to use sharding, which is to split the transaction processing among multiple, smaller groups of nodes. A well-performed blockchain s... 详细信息
来源: 评论
VULSEYE: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Ruichao Chen, Jing Wu, Cong He, Kun Wu, Yueming Cao, Ruochen Du, Ruiying Liu, Yang Zhao, Ziming Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Cyber Security Lab College of Computing and Data Science Nanyang Technological University Singapore Department of Computer Science and Engineering University at Buffalo New York United States
Smart contracts, the cornerstone of decentralized applications, have become increasingly prominent in revolutionizing the digital landscape. However, vulnerabilities in smart contracts pose great risks to user assets ... 详细信息
来源: 评论
T-M Net: A Fusion Convolutional Neural Network Method for Lung Aging Assessment
T-M Net: A Fusion Convolutional Neural Network Method for Lu...
收藏 引用
Medical Artificial Intelligence (MedAI), IEEE International Conference on
作者: Tangbin Tian Jingshan Pan Jing Ge Na Li Dexin Yu Liping Zuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Department of Radiology Qilu Hospital of Shandong University Jinan China
As the population ages, the precise assessment of pulmonary senescence becomes essential for the diagnosis and management of chronic respiratory diseases. However, existing medical imaging analysis techniques encounte... 详细信息
来源: 评论