咨询与建议

限定检索结果

文献类型

  • 252 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 246 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 62 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 化学工程与技术
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 438 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
469 条 记 录,以下是71-80 订阅
排序:
FireXnet: an explainable AI-based tailored deep learning model for wildfire detection on resource-constrained devices
收藏 引用
Fire Ecology 2023年 第1期19卷 1-19页
作者: Ahmad, Khubab Khan, Muhammad Shahbaz Ahmed, Fawad Driss, Maha Boulila, Wadii Alazeb, Abdulwahab Alsulami, Mohammad Alshehri, Mohammed S. Ghadi, Yazeed Yasin Ahmad, Jawad Faculty of Engineering and Technology Multimedia University Melaka Malaysia School of Computing Engineering and the Built Environment Edinburgh Napier University Edinburgh UK Department of Cyber Security Pakistan Navy Engineering College NUST Karachi Pakistan Robotics and Internet of Things Laboratory Prince Sultan University Riyadh Saudi Arabia RIADI Laboratory National School of Computer Sciences University of Manouba Manouba Tunisia Department of Computer Science College of Computer Science and Information Systems Najran University Najran Saudi Arabia Department of Software Engineering Computer Science Al Ain University Abu Dhabi United Arab Emirates
Forests cover nearly one-third of the Earth’s land and are some of our most biodiverse ecosystems. Due to climate change, these essential habitats are endangered by increasing wildfires. Wildfires are not just a risk...
来源: 评论
Clustering-Based Resource Management for Consumer Cost Optimization in IoT Edge computing Environments
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 1-1页
作者: Denden, Mohsen Jemmali, Mahdi Boulila, Wadii Soni, Mukesh Khan, Faheem Ahmad, Jawad Department of Computer and Information Technologies College of Telecommunication and Information CTI Riyadh Saudi Arabia Department of Computer Science College of Computing and Informatics University of Sharjah Sharjah UAE Robotics and Internet-of-Things Laboratory Prince Sultan University Riyadh Saudi Arabia Department of CSE University Centre for Research and Development Chandigarh University Mohali Punjab- India Department of Computer Engineering Gachon University Seongnam-si South Korea School of Computing Engineering and the Built Environment Edinburgh Napier University U.K
Edge computing emerges as a pivotal model in the era of next-generation consumer electronics and the emerging challenges of multimodal data-driven decision-making. Specifically, edge computing offers an open computing... 详细信息
来源: 评论
Achieving Distributed and Privacy-Preserving Cross-Chain Transactions in Account-Model Blockchain Systems
Achieving Distributed and Privacy-Preserving Cross-Chain Tra...
收藏 引用
2023 IEEE International Conference on Metaverse computing, Networking and Applications, MetaCom 2023
作者: Zhang, Chuan Wang, Weijie Zhang, Weiting Nie, Jiangtian Liang, Jinwen Zhu, Liehuang Beijing Institute of Technology School of Cyberspace Science and Technology Beijing China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Guangdong China Beijing Institute of Technology School of Computer Science & Technology Beijing China Beijing Jiaotong University School of Electronic and Information Engineering Beijing China Nanyang Technological University School of Computer Science and Engineering Singapore Hong Kong Polytechnic University Department of Computing Hong Kong
Cross-Chain is an emerging technology to enable transaction circulation across different blockchain systems, breaking down transaction isolation among decentralized ecosystems. Existing cross-chain solutions are often... 详细信息
来源: 评论
Solving partial differential equations based on preconditioning-pretraining physics-informed neural network
收藏 引用
computer Physics Communications 2025年 312卷
作者: Wang, Zihan Hu, Ziyue Yang, Mingwei Dong, Yalin Huang, Wenlong Ren, Haijun School of Computer Science and Technology Anhui Engineering Laboratory for Industrial Internet Intelligent Applications and Security Anhui University of Technology Anhui Ma'anshan243002 China Department of Mechanical Engineering The University of Akron AkronOH44325 United States CAS Key Laboratory of Geospace Environment Department of Engineering and Applied Physics School of Physical Sciences University of Science and Technology of China Anhui Hefei230026 China
Physics-Informed Neural Network (PINN) is a deep learning framework that has been widely employed to solve spatial-temporal partial differential equations (PDEs) across various fields. However, recent numerical experi... 详细信息
来源: 评论
A BTN-Based Method for Multi-Entity Bitcoin Transaction Analysis and Influence Assessment
收藏 引用
Distributed Ledger Technologies: Research and Practice 2024年 第4期3卷 1-23页
作者: Yan Wu Liuyang Zhao Jia Zhang Leilei Shi Lu Liu John Panneerselvam Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University Zhengjiang Jiangsu China and School of Computer Science and Communication Engineering Jiangsu University Zhengjiang Jiangsu China School of Computer Science and Communication Engineering Jiangsu University Zhengjiang Jiangsu China Department of Computer Science University of Exeter Exeter UK School of Computing and Mathematic Sciences University of Leicester Leicester UK
Bitcoin transaction analysis is valuable for examining Bitcoin events. However, most of the existing methods are inadequate for dealing with transactions involving multiple entities. Furthermore, existing Bitcoin tran... 详细信息
来源: 评论
Event-Guided Attention Network for Low Light Image Enhancement
Event-Guided Attention Network for Low Light Image Enhanceme...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Qiaobin Wang Haiyan Jin Haonan Su Zhaolin Xiao Department of Computer Science and Engineering Engineering Research Center Shaanxi Key Laboratory for Network Computing and Security Technology Human-Machine Integration Intelligent Robot Shaanxi University Xi'an University of Technology
In the low-light conditions, images are corrupted by low contrast and severe noise, but event cameras can capture event streams with clear edge structures. Therefore, we propose an Event-Guided Attention Network for L...
来源: 评论
View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Quan Wang, Lei Patel, Vishal M. Xie, Xiaohua Lai, Jianhuang School of Computer Science and Engineering Sun Yat-Sen University China Guangdong China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Department of Electrical and Computer Engineering Johns Hopkins University United States
Existing person re-identification methods have achieved remarkable advances in appearance-based identity association across homogeneous cameras, such as ground-ground matching. However, as a more practical scenario, a... 详细信息
来源: 评论
Risk Assessment for Nonlinear Cyber-Physical Systems under Stealth Attacks
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Guang Sun, Zhicong Ding, Yulong Yang, Shuang-Hua Department of Mechanical and Energy Engineering Southern University of Science and Technology China Department of Civil and Environmental Engineering Hong Kong Polytechnic University Hong Kong Institute of Advanced Computing and Digital Engineering Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet SUSTech Shenzhen518055 China Department of Computer Science and Engineering SUSTech Shenzhen518055 China Department of Computer Science University of Reading United Kingdom
Stealth attacks pose potential risks to cyber-physical systems because they are difficult to detect. Assessing the risk of systems under stealth attacks remains an open challenge, especially in nonlinear systems. To c... 详细信息
来源: 评论
Prediction of exosomal piRNAs based on deep learning for sequence embedding with attention mechanism
Prediction of exosomal piRNAs based on deep learning for seq...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Liu, Yajun Ding, Yulian Li, Aimin Fei, Rong Guo, Xie Wu, Fangxiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China University of Saskatchewan Division of Biomedical Engineering Saskatoon Canada Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
PIWI-interacting RNAs (piRNAs) are a type of small non-coding RNAs which bind with the PIWI proteins to exert biological effects in various regulatory mechanisms. A growing amount of evidence reveals that exosomal piR... 详细信息
来源: 评论
From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning
arXiv
收藏 引用
arXiv 2025年
作者: Li, Ziang Zhang, Hongguang Wang, Juan Chen, Meihui Hu, Hongxin Yi, Wenzhe Xu, Xiaoyang Yang, Mengda Ma, Chenjun Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Shanghai Innovation Institute China Ant Group China Department of Computer Science and Engineering University at Buffalo SUNY United States
Model Inversion Attacks (MIAs) aim to reconstruct private training data from models, leading to privacy leakage, particularly in facial recognition systems. Although many studies have enhanced the effectiveness of whi... 详细信息
来源: 评论