咨询与建议

限定检索结果

文献类型

  • 659 篇 会议
  • 357 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 676 篇 工学
    • 547 篇 计算机科学与技术...
    • 460 篇 软件工程
    • 155 篇 信息与通信工程
    • 91 篇 电气工程
    • 81 篇 生物工程
    • 79 篇 控制科学与工程
    • 51 篇 网络空间安全
    • 40 篇 机械工程
    • 34 篇 安全科学与工程
    • 33 篇 光学工程
    • 31 篇 交通运输工程
    • 27 篇 电子科学与技术(可...
    • 27 篇 生物医学工程(可授...
    • 24 篇 仪器科学与技术
    • 24 篇 化学工程与技术
    • 23 篇 建筑学
  • 303 篇 理学
    • 156 篇 数学
    • 88 篇 生物学
    • 59 篇 物理学
    • 50 篇 统计学(可授理学、...
    • 33 篇 化学
    • 29 篇 系统科学
  • 190 篇 管理学
    • 131 篇 管理科学与工程(可...
    • 81 篇 图书情报与档案管...
    • 48 篇 工商管理
  • 57 篇 法学
    • 30 篇 社会学
    • 28 篇 法学
  • 27 篇 医学
    • 25 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 23 篇 应用经济学
  • 9 篇 教育学
  • 8 篇 农学
  • 8 篇 军事学
  • 6 篇 艺术学

主题

  • 37 篇 deep learning
  • 37 篇 blockchain
  • 34 篇 feature extracti...
  • 27 篇 privacy
  • 26 篇 data models
  • 25 篇 security
  • 24 篇 training
  • 23 篇 machine learning
  • 22 篇 computational mo...
  • 21 篇 semantics
  • 20 篇 servers
  • 19 篇 internet of thin...
  • 19 篇 accuracy
  • 18 篇 data privacy
  • 17 篇 predictive model...
  • 17 篇 cloud computing
  • 16 篇 federated learni...
  • 15 篇 neural networks
  • 15 篇 smart contract
  • 14 篇 authentication

机构

  • 125 篇 school of comput...
  • 84 篇 school of cybers...
  • 70 篇 school of cybers...
  • 49 篇 cyberspace secur...
  • 42 篇 school of comput...
  • 32 篇 school of comput...
  • 25 篇 school of comput...
  • 25 篇 guangxi key labo...
  • 22 篇 school of comput...
  • 19 篇 hainan universit...
  • 18 篇 school of comput...
  • 18 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 school of comput...
  • 17 篇 school of cybers...
  • 16 篇 hangzhou innovat...
  • 16 篇 institute of inf...
  • 15 篇 jiangsu key labo...
  • 14 篇 school of inform...
  • 13 篇 key laboratory o...

作者

  • 29 篇 ye jun
  • 24 篇 ding yong
  • 20 篇 wang yujue
  • 19 篇 zhang yuqing
  • 15 篇 yuqing zhang
  • 15 篇 wang wei
  • 15 篇 jun ye
  • 14 篇 jieren cheng
  • 14 篇 liang hai
  • 13 篇 cheng jieren
  • 13 篇 yang changsong
  • 12 篇 zhu liehuang
  • 12 篇 jiangyuan yao
  • 12 篇 chen jinfu
  • 12 篇 guo zhen
  • 11 篇 xuan qi
  • 11 篇 yong ding
  • 10 篇 yujue wang
  • 10 篇 tang xiangyan
  • 9 篇 shen meng

语言

  • 974 篇 英文
  • 41 篇 其他
  • 7 篇 中文
检索条件"机构=School of Computer and Cyberspace Security"
1021 条 记 录,以下是1-10 订阅
排序:
SynthBendText3D: a framework for generating scene text data in arbitrary orientations using a 3D graphics engine
收藏 引用
International Journal of Information and Communication Technology 2025年 第1期26卷 38-54页
作者: Guan, Zhao Zhang, Weilong School of Cyberspace Security and Computer Hebei University Baoding071000 China
To address the domain distribution mismatch between synthetic scene text data and real-world scene text data in arbitrary orientations, we introduce SynthBendText3D – a framework based on a 3D graphics engine that sy... 详细信息
来源: 评论
Efficient and Secure Spatial Fuzzy Keyword Query
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14752-14770页
作者: Xie, Qingqing Zhu, Fatong Feng, Xia Jiangsu University School of Computer Science and Communication Engineering China Hainan University School of Cyberspace Security China
With the popularity of Location-based services and the explosive growth of spatial data, massive spatial data has been outsourced to cloud servers for storage and query services, such as spatial range and fuzzy keywor... 详细信息
来源: 评论
GSA-DT: A Malicious Traffic Detection Model Based on Graph Self-Attention Network and Decision Tree
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第2期22卷 2059-2073页
作者: Cai, Saihua Tang, Han Chen, Jinfu Lv, Tianxiang Zhao, Wenjun Huang, Chunlei Jiangsu University School of Computer Science and Communication Engineering Zhenjiang212013 China Jiangsu Provincial Key Laboratory of Industrial Cyberspace Security Technology Zhenjiang212013 China
Malicious attack has shown a rapid growth in recent years, it is very important to accurately detect malicious traffic to defend against malicious attacks. Compared with machine learning and deep learning technologies... 详细信息
来源: 评论
Blockchain-Based Framework for Secure Sharing of Cross-Border Trade Data
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2351-2373页
作者: Shenjian Xiao Xiaoli Qin Yanzhao Tian Zhongkai Dang School of Cyberspace Security Hainan UniversityHaikou570208China National Computer Network Emergency Response Technical Team Coordination Center of ChinaBeijing100029China
The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,inclu... 详细信息
来源: 评论
Adversarial Robustness Encoder as a Service for Classifiers on Internet of Things Devices
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 11690-11697页
作者: Guo, Enting Zhao, Hong Pan, Shengli Su, Chunhua Li, Peng University of Aizu Division of Computer Science Fukushima965-0053 Japan North University of China School of Computer Science and Technology Taiyuan030051 China Beijing University of Posts and Telecommunications School of Cyberspace Security Beijing100876 China
Within the Internet of Things (IoT) landscape, Encoder as a Service (EaaS) is a cloud-based service for many AI empowered scenarios, such as autopilot and face-scan payment, enabling IoT devices to keep a light classi... 详细信息
来源: 评论
Shorter ZK-SNARKs from square span programs over ideal lattices
收藏 引用
Cybersecurity 2025年 第1期8卷 208-226页
作者: Xi Lin Heyang Cao Feng‑Hao Liu Zhedong Wang Mingsheng Wang Key Laboratory of Cyberspace Security Defense Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina School of Electrical Engineering&Computer Science Washington State UniversityPullmanWAUSA School of Cyber Science and Engineering Shanghai Jiaotong UniversityShanghaiChina
Zero-knowledge succinct non-interactive arguments of knowledge(zk-SNARKs)are cryptographic protocols that ofer efcient and privacy-preserving means of verifying NP language relations and have drawn considerable atten‑... 详细信息
来源: 评论
Online Energy and Interference Management for Dynamic Target Tracking with Cellular-Connected UAV
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 5496-5510页
作者: Zhan, Cheng Yan, Huan Fan, Rongfei Hu, Han Xu, Shubin Yang, Jian Southwest University School of Computer and Information Science Chongqing400715 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Beijing Institute of Technology School of Information and Electronics Beijing China CETC Research Institute of Cyberspace Security Beijing100846 China University of Science and Technology of China School of Information Science and Technology Hefei China
Cellular-connected Unmanned Aerial Vehicles (UAVs) have significant potential for target tracking in future cellular networks due to their broad coverage and operational flexibility. In this paper, we consider a multi... 详细信息
来源: 评论
ICCG:low-cost and efficient consistency with adaptive synchronization for metadata replication
收藏 引用
Frontiers of computer Science 2025年 第1期19卷 53-70页
作者: Chenhao ZHANG Liang WANG Jing SHANG Zhiwen XIAO Limin XIAO Meng HAN Bing WEI Runnan SHEN Jinquan WANG State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Cyberspace Security Hainan UniversityHaikou 570228China China Mobile Information Technology Center Beijing 100033China
The rapid growth in the storage scale of wide-area distributed file systems (DFS) calls for fast and scalable metadata management. Metadata replication is the widely used technique for improving the performance and sc... 详细信息
来源: 评论
Chinese Character Component Segmentation Based on Character Structure Masks  17th
Chinese Character Component Segmentation Based on Character...
收藏 引用
17th Asian Conference on computer Vision, ACCV 2024
作者: Li, Haiyan Yang, Fang School of Cyberspace Security and Computer Hebei University Baoding China Intelligent graphic Information Processing Institute Hebei University Baoding China
To address the issue where rectangular anchor boxes in object detection-based Chinese character component segmentation cannot segment semi-enclosed Chinese characters, this paper proposes a method for segmenting Chine... 详细信息
来源: 评论
Blockchain-Assisted Anonymous Data Sharing Scheme with Full Accountability for CloudIoT  24th
Blockchain-Assisted Anonymous Data Sharing Scheme with Full...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Yu, Chuntang Feng, Xia Zhan, Yongzhao School of Computer Science and Communication Engineering Jiangsu University Jiangsu Zhenjiang212013 China School of Cyberspace Security Hainan University Hainan Haikou570228 China
The combination of cloud computing and the Internet of Things has created numerous possibilities for data sharing applications that prioritize privacy, accountability, and efficiency. Currently, many data sharing sche... 详细信息
来源: 评论