咨询与建议

限定检索结果

文献类型

  • 13,940 篇 会议
  • 11,183 篇 期刊文献
  • 137 册 图书

馆藏范围

  • 25,260 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,032 篇 工学
    • 10,084 篇 计算机科学与技术...
    • 8,191 篇 软件工程
    • 4,606 篇 信息与通信工程
    • 2,386 篇 电子科学与技术(可...
    • 2,320 篇 控制科学与工程
    • 2,260 篇 电气工程
    • 1,644 篇 生物工程
    • 1,374 篇 光学工程
    • 1,236 篇 机械工程
    • 1,048 篇 仪器科学与技术
    • 911 篇 生物医学工程(可授...
    • 849 篇 化学工程与技术
    • 807 篇 动力工程及工程热...
    • 666 篇 网络空间安全
    • 598 篇 材料科学与工程(可...
    • 587 篇 交通运输工程
    • 520 篇 安全科学与工程
  • 9,264 篇 理学
    • 4,204 篇 数学
    • 3,553 篇 物理学
    • 1,856 篇 生物学
    • 1,450 篇 统计学(可授理学、...
    • 966 篇 化学
    • 760 篇 系统科学
  • 3,949 篇 管理学
    • 2,613 篇 管理科学与工程(可...
    • 1,490 篇 图书情报与档案管...
    • 952 篇 工商管理
  • 1,010 篇 医学
    • 776 篇 临床医学
    • 688 篇 基础医学(可授医学...
    • 438 篇 公共卫生与预防医...
  • 613 篇 法学
    • 508 篇 社会学
  • 338 篇 经济学
  • 222 篇 农学
  • 155 篇 教育学
  • 110 篇 文学
  • 94 篇 军事学
  • 69 篇 艺术学
  • 5 篇 历史学
  • 2 篇 哲学

主题

  • 514 篇 deep learning
  • 495 篇 feature extracti...
  • 387 篇 accuracy
  • 372 篇 internet of thin...
  • 343 篇 training
  • 324 篇 computational mo...
  • 293 篇 simulation
  • 287 篇 computer science
  • 282 篇 optimization
  • 278 篇 semantics
  • 245 篇 wireless communi...
  • 228 篇 machine learning
  • 205 篇 real-time system...
  • 191 篇 reinforcement le...
  • 186 篇 support vector m...
  • 177 篇 image segmentati...
  • 174 篇 object detection
  • 168 篇 neural networks
  • 166 篇 computer archite...
  • 160 篇 educational inst...

机构

  • 1,101 篇 cavendish labora...
  • 1,035 篇 department of ph...
  • 1,002 篇 school of comput...
  • 996 篇 physikalisches i...
  • 972 篇 oliver lodge lab...
  • 794 篇 university of ch...
  • 613 篇 fakultät physik ...
  • 560 篇 school of physic...
  • 552 篇 iccub universita...
  • 549 篇 horia hulubei na...
  • 541 篇 school of physic...
  • 530 篇 department of ph...
  • 528 篇 imperial college...
  • 522 篇 nikhef national ...
  • 520 篇 stfc rutherford ...
  • 519 篇 h.h. wills physi...
  • 515 篇 physik-institut ...
  • 507 篇 school of physic...
  • 507 篇 school of physic...
  • 504 篇 henryk niewodnic...

作者

  • 289 篇 barter w.
  • 269 篇 a. gomes
  • 266 篇 beiter a.
  • 251 篇 c. alexa
  • 251 篇 c. amelung
  • 251 篇 bellee v.
  • 249 篇 j. m. izen
  • 249 篇 g. bella
  • 249 篇 j. strandberg
  • 249 篇 d. calvet
  • 249 篇 s. chen
  • 248 篇 g. spigo
  • 248 篇 bowcock t.j.v.
  • 248 篇 blake t.
  • 245 篇 f. siegert
  • 242 篇 brundu d.
  • 230 篇 betancourt c.
  • 226 篇 y. tayalati
  • 226 篇 borsato m.
  • 224 篇 amato s.

语言

  • 23,611 篇 英文
  • 1,058 篇 其他
  • 590 篇 中文
  • 7 篇 法文
  • 6 篇 德文
  • 5 篇 日文
  • 3 篇 荷兰文
  • 1 篇 朝鲜文
检索条件"机构=School of Computer and Communication Engineering of University of Science and Technology Beijing"
25260 条 记 录,以下是41-50 订阅
排序:
Robust Detection of Malicious Encrypted Traffic via Contrastive Learning
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4228-4242页
作者: Shen, Meng Wu, Jinhe Ye, Ke Xu, Ke Xiong, Gang Zhu, Liehuang Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Beijing Institute of Technology School of Computer Science Beijing100081 China Tsinghua University Department of Computer Science and Technology Beijing100084 China Institute of Information Engineering Chinese Academy of Sciences Beijing100190 China
Traffic encryption is widely used to protect communication privacy but is increasingly exploited by attackers to conceal malicious activities. Existing malicious encrypted traffic detection methods rely on large amoun... 详细信息
来源: 评论
Multi-Expert Adaptive Selection: Task-Balancing for All-in-One Image Restoration
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年 第5期35卷 4619-4634页
作者: Yu, Xiaoyan Zhou, Shen Li, Huafeng Zhu, Liehuang Beijing Institute of Technology School of Computer Science and Technology Beijing100081 China Kunming University of Science and Technology Faculty of Information Engineering and Automation Kunming650500 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China
The use of a single image restoration framework to achieve multi-task image restoration has garnered significant attention from researchers. However, several practical challenges remain, including meeting the specific... 详细信息
来源: 评论
A verifiable variable threshold visual image secret sharing scheme
收藏 引用
Multimedia Systems 2025年 第3期31卷 1-18页
作者: Yang, Yu-Guang Cheng, Wen Xu, Guang-Bao Jiang, Dong-Huan Zhou, Yi-Hua Shi, Wei-Min Jiang, Dong-Hua College of Computer Science and Technology Beijing University of Technology Beijing100124 China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China College of Mathematics and Systems Science Shandong University of Science and Technology Qingdao266590 China School of Computer Science and Engineering Sun Yat-Sen University Guangzhou511400 China
This paper proposes a visual image encryption algorithm based on 2D compressive sensing and variable threshold secret sharing, aiming to achieve efficient, secure, and flexible image encryption and decryption. Firstly... 详细信息
来源: 评论
Joint Task Offloading and Resource Allocation Strategy for Space-Air-Ground Integrated Vehicular Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1027-1043页
作者: Yuanshuo Gang Yuexia Zhang Zhihai Zhuo School of Information and Communication Engineering Beijing Information Science and Technology UniversityBeijing 100101China Key Laboratory of Modern Measurement and Control Technology Ministry of EducationBeijing Information Science and Technology UniversityBeijing 100101China
Space-Air-Ground integrated Vehicular Network(SAGVN)aims to achieve ubiquitous connectivity and provide abundant computational resources to enhance the performance and efficiency of the vehicular ***,there are still c... 详细信息
来源: 评论
A Decoupling-Type Strategy for the Allen-Cahn Equation on Curved Surfaces
收藏 引用
Journal of Mathematical Research with Applications 2025年 第1期45卷 73-83页
作者: Xiaoman XIE Qing PAN School of Computer and Communication Engineering Changsha University of Science & Technology
In this paper, we construct an efficient decoupling-type strategy for solving the Allen-Cahn equation on curved surfaces. It is based on an FEM-EIEQ(Finite Element Method and explicit-Invariant Energy Quadratization) ... 详细信息
来源: 评论
RaSA: Robust and Adaptive Secure Aggregation for Edge-Assisted Hierarchical Federated Learning
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4280-4295页
作者: Wang, Lingling Huang, Mei Zhang, Zhengyin Li, Meng Wang, Jingjing Gai, Keke Qingdao University of Science and Technology School of Information Science and Technology Shandong Qingdao266061 China Hefei University of Technology School of Computer Science and Information Engineering Anhui Hefei230601 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China
Secure Aggregation (SA), in the Federated Learning (FL) setting, enables distributed clients to collaboratively learn a shared global model while keeping their raw data and local gradients private. However, when SA is... 详细信息
来源: 评论
Joint Watermarking and Encryption for Social Image Sharing
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2927-2946页
作者: Conghuan Ye Shenglong Tan Shi Li Jun Wang Qiankun Zuo Bing Xiong School of Information Engineering Hubei University of EconomicsWuhan430205China School of Computer and Communication Engineering Changsha University of Science&TechnologyChangsha410114China
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing ima... 详细信息
来源: 评论
NC-Load: On-Demand Program Loading and Running for Computing Sharing Among IoT Devices
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12242-12256页
作者: Dong, Yanhao Duan, Sijing Lyu, Feng Zhao, Peng Zhang, Yongmin Ren, Ju Zhang, Yaoxue Central South University School of Computer Science and Engineering Hunan Changsha410083 China Tsinghua University Department of Computer Science and Technology Beijing100084 China
The number of Internet of Things (IoT) devices has increased rapidly in recent years, but lack effective methods to integrate their computational power. In this article, we propose NC-Load, which couples IoT devices i... 详细信息
来源: 评论
Latency minimization for multiuser computation offloading in fog-radio access networks
收藏 引用
Digital communications and Networks 2025年 第1期11卷 160-171页
作者: Wei Zhang Shafei Wang Ye Pan Qiang Li Jingran Lin Xiaoxiao Wu School of Information and Communication Engineering University of Electronic Science and Technology of ChinaChengdu611731China Laboratory of Electromagnetic Space Cognition and Intelligent Control Beijing100089China
Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user *** this paper,computational offloading in F-RAN is considered,wher... 详细信息
来源: 评论
When Crypto Fails: Demystifying Cryptographic Defects in Ethereum Smart Contracts
收藏 引用
IEEE Transactions on Software engineering 2025年 第5期51卷 1381-1398页
作者: Zhang, Jiashuo Chen, Jiachi Shen, Yiming Zhang, Tao Wang, Yanlin Chen, Ting Gao, Jianbo Chen, Zhong Peking University School of Computer Science Beijing100871 China Sun Yat-sen University School of Software Engineering Zhuhai510275 China Macau University of Science and Technology School of Computer Science and Engineering 999078 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Kashi Institute of Electronics and Information Industry Kashi844000 China Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China
Ethereum has officially provided a set of system-level cryptographic APIs to enhance smart contracts with cryptographic capabilities. These APIs have been utilized in over 13.8% of Ethereum transactions, motivating de... 详细信息
来源: 评论