咨询与建议

限定检索结果

文献类型

  • 2,062 篇 会议
  • 1,777 篇 期刊文献
  • 24 册 图书

馆藏范围

  • 3,863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,443 篇 工学
    • 1,930 篇 计算机科学与技术...
    • 1,655 篇 软件工程
    • 605 篇 信息与通信工程
    • 392 篇 电气工程
    • 347 篇 生物工程
    • 315 篇 控制科学与工程
    • 186 篇 电子科学与技术(可...
    • 149 篇 机械工程
    • 143 篇 网络空间安全
    • 131 篇 光学工程
    • 124 篇 生物医学工程(可授...
    • 97 篇 安全科学与工程
    • 96 篇 化学工程与技术
    • 90 篇 交通运输工程
    • 78 篇 仪器科学与技术
    • 68 篇 动力工程及工程热...
  • 1,062 篇 理学
    • 565 篇 数学
    • 368 篇 生物学
    • 200 篇 物理学
    • 183 篇 统计学(可授理学、...
    • 98 篇 化学
    • 96 篇 系统科学
  • 625 篇 管理学
    • 380 篇 管理科学与工程(可...
    • 272 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 177 篇 法学
    • 120 篇 社会学
    • 61 篇 法学
  • 136 篇 医学
    • 110 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
  • 59 篇 经济学
  • 26 篇 教育学
  • 23 篇 农学
  • 18 篇 军事学
  • 8 篇 文学
  • 7 篇 艺术学
  • 1 篇 历史学

主题

  • 130 篇 feature extracti...
  • 124 篇 accuracy
  • 121 篇 deep learning
  • 119 篇 training
  • 103 篇 privacy
  • 102 篇 blockchain
  • 101 篇 security
  • 98 篇 semantics
  • 89 篇 computational mo...
  • 89 篇 machine learning
  • 75 篇 data models
  • 72 篇 internet of thin...
  • 63 篇 federated learni...
  • 57 篇 reinforcement le...
  • 56 篇 data privacy
  • 53 篇 predictive model...
  • 53 篇 cloud computing
  • 52 篇 protocols
  • 51 篇 object detection
  • 49 篇 deep neural netw...

机构

  • 267 篇 school of comput...
  • 214 篇 school of cyber ...
  • 208 篇 school of cyber ...
  • 204 篇 school of cyber ...
  • 157 篇 institute of inf...
  • 118 篇 school of cyber ...
  • 117 篇 school of cyber ...
  • 88 篇 school of comput...
  • 86 篇 school of comput...
  • 76 篇 school of cyber ...
  • 70 篇 school of cyber ...
  • 69 篇 school of cyber ...
  • 69 篇 school of comput...
  • 62 篇 school of comput...
  • 55 篇 school of cyber ...
  • 53 篇 wuhan university...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 45 篇 school of comput...
  • 43 篇 guangzhou univer...

作者

  • 61 篇 cao xiaochun
  • 43 篇 ma jianfeng
  • 43 篇 jianfeng ma
  • 43 篇 zhou pan
  • 38 篇 hai jin
  • 37 篇 huang qingming
  • 34 篇 wang qian
  • 34 篇 choo kim-kwang r...
  • 33 篇 liu yang
  • 31 篇 xu qianqian
  • 31 篇 jin hai
  • 29 篇 hu shengshan
  • 26 篇 peng hao
  • 26 篇 wang guojun
  • 25 篇 wang yuan-gen
  • 25 篇 yang zhiyong
  • 25 篇 luan tom h.
  • 25 篇 zhang yi
  • 25 篇 su zhou
  • 24 篇 zhou su

语言

  • 3,586 篇 英文
  • 262 篇 其他
  • 24 篇 中文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Cyber Engineering"
3863 条 记 录,以下是1-10 订阅
排序:
A blockchain-based privacy-preserving and collusion-resistant scheme(PPCR)for double auctions
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 116-125页
作者: Xuedan Jia Liangmin Wang Ke Cheng Pujie Jing Xiangmei Song School of Computer Science and Communication Engineering Jiangsu UniversityZhenjiang 212013China School of Cyber Science and Engineering Southeast UniversityNanjing 211102China School of Computer Science and Technology Xidian UniversityXi’an 710071China
Electronic auctions(e-auctions)remove the physical limitations of traditional auctions and bring this mechanism to the general ***,most e-auction schemes involve a trusted auctioneer,which is not always credible in **... 详细信息
来源: 评论
Existence and uniqueness of mean field equilibrium in continuous bandit game
收藏 引用
science China(Information sciences) 2025年 第3期68卷 395-396页
作者: Xiong WANG Yuqing LI Riheng JIA School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University Wuhan University Shenzhen Research Institute School of Computer Science and Technology Zhejiang Normal University
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent syst...
来源: 评论
Jamming-Resilient Consensus for Wireless Blockchain Networks
收藏 引用
Tsinghua science and Technology 2025年 第1期30卷 262-278页
作者: Yifei Zou Meng Hou Li Yang Minghui Xu Libing Wu Dongxiao Yu Xiuzhen Cheng School of Computer Science and Technology Shandong UniversityQingdao 266237China School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China
As the device complexity keeps increasing,the blockchain networks have been celebrated as the cornerstone of numerous prominent platforms owing to their ability to provide distributed and immutable ledgers and data-dr... 详细信息
来源: 评论
A metadata-aware detection model for fake restaurant reviews based on multimodal fusion
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 475-498页
作者: Jian, Yifei Chen, Xinyu Wang, Xiaoda Liu, Ying Chen, Xingshu Lan, Xiao Wang, Wenxian Wang, Haizhou School of Cyber Science and Engineering Sichuan University Chengdu China College of Computer Science Sichuan University Chengdu China Cyber Science Research Institute Sichuan University Chengdu China
Nowadays, online reviews have a significant impact on customers who purchase products or evaluate services, as well as merchants who do business. Unfortunately, there are a lot of fake reviews included in them, which ... 详细信息
来源: 评论
TCEC: Integrity Protection for Containers by Trusted Chip on IoT Edge Computing Nodes
收藏 引用
IEEE Sensors Journal 2025年 第9期25卷 16269-16280页
作者: Li, Weidong Zhao, Bo Zhu, Lingzi Wang, Yixuan Zhong, Qian Yu, Shui Wuhan University School of Cyber Science and Engineering Wuhan430000 China University of Technology Sydney School of Computer Science UltimoNSW 2007 Australia
In edge computing, an Internet of Things (IoT) node may employ container-based virtualization to manage and process data collected by sensors. Compared to cloud computing, containers on edge computing nodes have more ... 详细信息
来源: 评论
Layered Temporal Spatial Graph Attention Reinforcement Learning for Multiplex Networked Industrial Chains Energy Management
收藏 引用
Tsinghua science and Technology 2025年 第2期30卷 528-542页
作者: Yuanshuang Jiang Kai Di Xingyu Wu Zhongjian Hu Fulin Chen Pan Li Yichuan Jiang School of Computer Science and Engineering Southeast UniversityNanjing 211189China School of Software Southeast UniversityNanjing 211189China School of Cyber Science and Engineering Southeast UniversityNanjing 211189
Demand response has recently become an essential means for businesses to reduce production costs in industrial ***,the current industrial chain structure has also become increasingly complex,forming new characteristic... 详细信息
来源: 评论
Quantifying Bytes:Understanding Practical Value of Data Assets in Federated Learning
收藏 引用
Tsinghua science and Technology 2025年 第1期30卷 135-147页
作者: Minghao Yao Saiyu Qi Zhen Tian Qian Li Yong Han Haihong Li Yong Qi School of Computer Science and Technology Xi’an Jiaotong UniversityXi’an 710049China School of Cyber Science and Engineering Xi’an Jiaotong UniversityXi’an 710049China
The data asset is emerging as a crucial component in both industrial and commercial *** valuable knowledge from the data benefits decision-making and ***,the usage of data assets raises tension between sensitive infor... 详细信息
来源: 评论
Dynamic Certificateless Outsourced Data Auditing Mechanism Supporting Multi-Ownership Transfer via Blockchain Systems
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第2期22卷 2017-2030页
作者: Zhang, Xiaojun Liu, Qing Liu, Bingyun Zhang, Yuan Xue, Jingting Southwest Petroleum University School of Computer Science and Software Engineering Research Center for Cyber Security Chengdu610500 China Chengdu Neusoft University School of Computer and Software Chengdu611844 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China
Data auditing contributes to checking the integrity of outsourced data, promoting the vigorous development of cloud storage services. In actual scenarios, such as migration of electronic medical records or data transf... 详细信息
来源: 评论
Optimizing Risk-Aware Task Migration Algorithm Among Multiplex UAV Groups Through Hybrid Attention Multi-Agent Reinforcement Learning
收藏 引用
Tsinghua science and Technology 2025年 第1期30卷 318-330页
作者: Yuanshuang Jiang Kai Di Ruiyi Qian Xingyu Wu Fulin Chen Pan Li Xiping Fu Yichuan Jiang School of Computer Science and Engineering Southeast UniversityNanjing 211189 School of Software Engineering Southeast UniversityNanjing 211189 School of Cyber Science and Engineering Southeast UniversityNanjing 211189 PredictHQ Auckland 1010New Zealand
Recently,with the increasing complexity of multiplex Unmanned Aerial Vehicles(multi-UAVs)collaboration in dynamic task environments,multi-UAVs systems have shown new characteristics of inter-coupling among multiplex g... 详细信息
来源: 评论
CRT and PUF-based Self/Mutual-healing Key Distribution Protocol with Collusion Resistance and Revocation Capability
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4607-4622页
作者: Othman, Wajdy Hong, Zhong Fuyou, Miao Xue, Kaiping Hawbani, Ammar Amin, Ruhul Zhao, Liang Li, Tao Nankai University Haihe Lab of ITAI College of Cyber Science Tianjin China Anhui University School of Computer Science and Technology China University of Science and Technology of China School of Computer Science and Technology School of Information Science and Technology Anhui Hefei China Shenyang Aerospace University School of Computer Science Shenyang110136 China Department of Computer Science & Engineering IIIT-NR China Nankai University Haihe Lab of ITAI College of Cyber Science China
Self-healing group key distribution (SGKD) protocols guarantee the security of group communications by allowing authorized users to independently recover missed previous session keys from the current broadcast without... 详细信息
来源: 评论