咨询与建议

限定检索结果

文献类型

  • 659 篇 会议
  • 362 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,026 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 681 篇 工学
    • 548 篇 计算机科学与技术...
    • 464 篇 软件工程
    • 153 篇 信息与通信工程
    • 89 篇 电气工程
    • 81 篇 控制科学与工程
    • 81 篇 生物工程
    • 49 篇 网络空间安全
    • 40 篇 机械工程
    • 34 篇 光学工程
    • 32 篇 安全科学与工程
    • 29 篇 交通运输工程
    • 28 篇 电子科学与技术(可...
    • 26 篇 生物医学工程(可授...
    • 24 篇 仪器科学与技术
    • 24 篇 化学工程与技术
    • 22 篇 建筑学
  • 302 篇 理学
    • 155 篇 数学
    • 87 篇 生物学
    • 60 篇 物理学
    • 50 篇 统计学(可授理学、...
    • 31 篇 化学
    • 29 篇 系统科学
  • 191 篇 管理学
    • 129 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 47 篇 工商管理
  • 57 篇 法学
    • 30 篇 社会学
    • 28 篇 法学
  • 27 篇 医学
    • 25 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 23 篇 应用经济学
  • 9 篇 教育学
  • 9 篇 农学
  • 8 篇 军事学
  • 6 篇 艺术学

主题

  • 37 篇 deep learning
  • 36 篇 blockchain
  • 34 篇 feature extracti...
  • 27 篇 data models
  • 27 篇 privacy
  • 25 篇 security
  • 24 篇 training
  • 23 篇 machine learning
  • 22 篇 computational mo...
  • 21 篇 semantics
  • 20 篇 internet of thin...
  • 20 篇 servers
  • 19 篇 accuracy
  • 18 篇 data privacy
  • 17 篇 predictive model...
  • 17 篇 federated learni...
  • 17 篇 cloud computing
  • 15 篇 neural networks
  • 15 篇 smart contract
  • 14 篇 authentication

机构

  • 125 篇 school of comput...
  • 84 篇 school of cybers...
  • 72 篇 school of cybers...
  • 49 篇 cyberspace secur...
  • 42 篇 school of comput...
  • 32 篇 school of comput...
  • 26 篇 school of comput...
  • 25 篇 guangxi key labo...
  • 23 篇 school of comput...
  • 20 篇 hainan universit...
  • 18 篇 school of comput...
  • 18 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 school of comput...
  • 16 篇 hangzhou innovat...
  • 16 篇 school of cybers...
  • 16 篇 institute of inf...
  • 15 篇 jiangsu key labo...
  • 14 篇 school of inform...
  • 13 篇 key laboratory o...

作者

  • 29 篇 ye jun
  • 24 篇 ding yong
  • 20 篇 wang yujue
  • 19 篇 zhang yuqing
  • 15 篇 yuqing zhang
  • 15 篇 wang wei
  • 15 篇 jun ye
  • 14 篇 jieren cheng
  • 14 篇 liang hai
  • 13 篇 cheng jieren
  • 13 篇 yang changsong
  • 12 篇 jiangyuan yao
  • 12 篇 chen jinfu
  • 12 篇 guo zhen
  • 11 篇 xuan qi
  • 11 篇 yong ding
  • 11 篇 zhu liehuang
  • 10 篇 yujue wang
  • 10 篇 tang xiangyan
  • 9 篇 shen meng

语言

  • 973 篇 英文
  • 46 篇 其他
  • 8 篇 中文
检索条件"机构=School of Computer and Cyberspace Security"
1026 条 记 录,以下是31-40 订阅
排序:
Threshold Password-Hardening Updatable Oblivious Key Management
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4799-4814页
作者: Jiang, Changsong Xu, Chunxiang Liu, Zhen Dong, Xinfeng Zhang, Wenzheng University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Singapore Management University School of Computing and Information Systems Bras Basah 188065 Singapore Huzhou313001 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Science and Technology on Communication Security Laboratory Chengdu610041 China
We propose a threshold password-hardening updatable oblivious key management system dubbed TPH-UOKM for cloud storage. In TPH-UOKM, a group of key servers share a user-specific secret key for a user, and assist the us... 详细信息
来源: 评论
Few-Sample Video Captioning Using Pre-Trained Language Model with Gated Bidirectional Fusion
SSRN
收藏 引用
SSRN 2025年
作者: Wang, Tao Li, Ping Pan, Zeyu Wang, Hao School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China School of Cyberspace Security Hangzhou Dianzi University Hangzhou China
Video captioning generates sentences for describing the video content. Previous works mostly rely on a large number of video samples for training the model, but annotating those videos is very costly, limiting the wid... 详细信息
来源: 评论
FeedbackFuzz: Fuzzing Processors via Intricate Program Generation with Feedback Engine
FeedbackFuzz: Fuzzing Processors via Intricate Program Gener...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jiashun Wang Baojiang Cui Renhai Dong Rundi Zhai School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China School of Computer Science Beijing University of Posts and Telecommunications Beijing China
As modern processor designs become increasingly complex, detecting hardware vulnerabilities has become more challenge. Recently, hardware fuzzing techniques have shown promising results in generating complex programs ... 详细信息
来源: 评论
Performance Limits of Shadowing Effects-Based Passive Target Localization Assisted by Active Sensor Calibration via Visible Light Positioning
收藏 引用
IEEE Transactions on Communications 2025年
作者: Bao, Xu Zhou, Jiawei Zhang, Licheng The School of Computer Science and Communication Engineering Jiangsu University Zhenjiang212013 China The Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Zhenjiang212013 China
In this paper, we aim at exploring the performance limits of passive indoor target localization utilizing multiple light-emitting diode (LED) transmitters embedded into the ceiling and multiple photodiode (PD) sensors... 详细信息
来源: 评论
Enhancing Scalability: A Complete Tree Sharding Architecture Towards IoT  18th
Enhancing Scalability: A Complete Tree Sharding Architecture...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Zhang, Luyi Wang, Yujue Ding, Yong Liang, Hai Yang, Changsong Zheng, Haibin Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Hangzhou Innovation Institute of Beihang University Hangzhou310052 China Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Shenzhen518055 China Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin541004 China
With the rapid proliferation of integration of blockchain and IoT, traditional centralized architectures and single-node processing have been effectively solved, but scalability of blockchain have become inadequate to... 详细信息
来源: 评论
DPCZK: Enhancing Device Privacy Through Certificate-Free Encryption and Zero Knowledge Proof in Multi-Domain IoT Environments
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ma, Hongmei Liu, Yifan Leu, Yi Feng, Fan Liu, Zhenpeng Hebei University School of Cyberspace Security and Computer Baoding071000 China Hebei University School of Management Baoding071000 China Hebei University Information Technology Center Baoding071000 China
The vast number of IoT devices is distributed across multiple trust domains, each with distinct security policies, trust models, and permission management methods. This diversity increases the risk of privacy exposure... 详细信息
来源: 评论
A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT  24th
A Verifiable Decentralized Data Modification Mechanism Suppo...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Yang, Changsong Wu, Junfu Liang, Hai Ding, Yong Wang, Yujue Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Digital Infrastructure Guangxi Zhuang Autonomous Region Information Center Nanning China Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong Hangzhou Innovation Institute of Beihang University Hangzhou China
The widespread application of Industrial Internet of Things (IIoT) has profoundly transformed modern industrial production methods. However, the large scale of industrial data, the diversity of data sources, and the h... 详细信息
来源: 评论
New MRA Schemes Based on The CRT for Polynomial Rings
收藏 引用
IEEE Transactions on Information Theory 2025年 第6期71卷 4671-4685页
作者: Yang, Jing Wang, Xianfang Xiang, Can Fu, Fang-Wei Xia, Shu-Tao Shandong Technology and Business University School of Computer Science and Technology Shandong Yantai264005 China CETC Cyberspace Security Technology Co. Ltd Westone Cryptologic Research Center Beijing100070 China South China Agricultural University College of Mathematics and Informatics Guangdong Guangzhou510642 China Nankai University Chern Institute of Mathematics LPMC Tianjin300071 China Tsinghua University Tsinghua Shenzhen International Graduate School Guangdong Shenzhen518055 China
At present, existing multi-receiver authentication (MRA) schemes can only handle situations where the capacities of all receivers in the schemes are the same. However, in reality, different receivers may need to have ... 详细信息
来源: 评论
M3-AGIQA: Multimodal, Multi-Round, Multi-Aspect AI-Generated Image Quality Assessment
arXiv
收藏 引用
arXiv 2025年
作者: Cui, Chuan Chen, Kejiang Wei, Zhihua Shen, Wen Zhang, Weiming Yu, Nenghai School of Computer Science and Technology Tongji University Shanghai China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation China
The rapid advancement of AI-generated image (AGI) models has introduced significant challenges in evaluating their quality, which requires considering multiple dimensions such as perceptual quality, prompt corresponde... 详细信息
来源: 评论
A Novel Vulnerability-Detection Method Based on the Semantic Features of Source Code and the LLVM Intermediate Representation
收藏 引用
Journal of Software: Evolution and Process 2025年 第5期37卷
作者: Chen, Jinfu Zhou, Jiapeng Lin, Wei Towey, Dave Cai, Saihua Chen, Haibo Chen, Jingyi Yin, Yemin School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University Zhenjiang China School of Computer Science University of Nottingham Ningbo China Ningbo China
With the increasingly frequent attacks on software systems, software security is an issue that must be addressed. Within software security, automated detection of software vulnerabilities is an important subject. Most... 详细信息
来源: 评论