咨询与建议

限定检索结果

文献类型

  • 659 篇 会议
  • 357 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 677 篇 工学
    • 545 篇 计算机科学与技术...
    • 463 篇 软件工程
    • 153 篇 信息与通信工程
    • 91 篇 电气工程
    • 81 篇 生物工程
    • 80 篇 控制科学与工程
    • 49 篇 网络空间安全
    • 40 篇 机械工程
    • 34 篇 光学工程
    • 32 篇 安全科学与工程
    • 29 篇 交通运输工程
    • 26 篇 电子科学与技术(可...
    • 26 篇 生物医学工程(可授...
    • 25 篇 化学工程与技术
    • 24 篇 仪器科学与技术
    • 23 篇 建筑学
  • 303 篇 理学
    • 155 篇 数学
    • 87 篇 生物学
    • 59 篇 物理学
    • 50 篇 统计学(可授理学、...
    • 32 篇 化学
    • 29 篇 系统科学
  • 191 篇 管理学
    • 129 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 48 篇 工商管理
  • 57 篇 法学
    • 30 篇 社会学
    • 28 篇 法学
  • 27 篇 医学
    • 25 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 23 篇 应用经济学
  • 9 篇 教育学
  • 9 篇 农学
  • 8 篇 军事学
  • 6 篇 艺术学

主题

  • 37 篇 deep learning
  • 36 篇 blockchain
  • 34 篇 feature extracti...
  • 27 篇 privacy
  • 26 篇 data models
  • 25 篇 security
  • 24 篇 training
  • 23 篇 machine learning
  • 22 篇 computational mo...
  • 21 篇 semantics
  • 20 篇 servers
  • 19 篇 internet of thin...
  • 19 篇 accuracy
  • 18 篇 data privacy
  • 17 篇 predictive model...
  • 17 篇 cloud computing
  • 16 篇 federated learni...
  • 15 篇 neural networks
  • 15 篇 smart contract
  • 14 篇 authentication

机构

  • 125 篇 school of comput...
  • 85 篇 school of cybers...
  • 70 篇 school of cybers...
  • 49 篇 cyberspace secur...
  • 42 篇 school of comput...
  • 32 篇 school of comput...
  • 25 篇 school of comput...
  • 25 篇 guangxi key labo...
  • 22 篇 school of comput...
  • 19 篇 hainan universit...
  • 18 篇 school of comput...
  • 18 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 school of comput...
  • 17 篇 school of cybers...
  • 16 篇 hangzhou innovat...
  • 16 篇 institute of inf...
  • 15 篇 jiangsu key labo...
  • 14 篇 school of inform...
  • 13 篇 key laboratory o...

作者

  • 29 篇 ye jun
  • 24 篇 ding yong
  • 20 篇 wang yujue
  • 19 篇 zhang yuqing
  • 15 篇 yuqing zhang
  • 15 篇 wang wei
  • 15 篇 jun ye
  • 14 篇 jieren cheng
  • 14 篇 liang hai
  • 13 篇 cheng jieren
  • 13 篇 yang changsong
  • 12 篇 zhu liehuang
  • 12 篇 jiangyuan yao
  • 12 篇 chen jinfu
  • 12 篇 guo zhen
  • 11 篇 xuan qi
  • 11 篇 yong ding
  • 10 篇 yujue wang
  • 10 篇 tang xiangyan
  • 9 篇 shen meng

语言

  • 973 篇 英文
  • 42 篇 其他
  • 7 篇 中文
检索条件"机构=School of Computer and Cyberspace Security"
1021 条 记 录,以下是61-70 订阅
排序:
Task Offloading and Resource Allocation Based on Reinforcement Learning and Load Balancing in Vehicular Networking
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Tian, Shujuan Xiang, Shuhuan Zhou, Ziqi Dai, Haipeng Yu, Enze Deng, Qingyong Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent network School of Computer Science and School of Cyberspace Security Xiangtan411105 China Nanjing University School of Computer Science and Technology Nanjing211189 China Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guilin541004 China Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining and Security Guilin541004 China
Due to limited on-board resources and the mobility characteristics of vehicles in a multi-access edge computing (MEC)-based vehicular network, efficient task offloading and resource allocation schemes are essential fo... 详细信息
来源: 评论
HMCGeo: IP Region Prediction Based on Hierarchical Multi-label Classification
arXiv
收藏 引用
arXiv 2025年
作者: Zhao, Tianzi Liu, Xinran Zhang, Zhaoxin Zhao, Dong Li, Ning Zhang, Zhichao Wang, Xinye School of Computer Science and Technology Harbin Institute of Technology Harbin China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Tianhe Cyberspace Security Technology Research Institute Co. Ltd. Weihai China
Fine-grained IP geolocation plays a critical role in applications such as location-based services and cybersecurity. Most existing fine-grained IP geolocation methods are regression-based;however, due to noise in the ... 详细信息
来源: 评论
Cross-Layer-Optimized Link Selection for Hologram Video Streaming Over Millimeter Wave Networks
Cross-Layer-Optimized Link Selection for Hologram Video Stre...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Yiming Jiang Yanwei Liu Jinxia Liu Antonios Argyriou Yifei Chen Wen Zhang State Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Zhejiang Wanli University Ningbo China Department of Electrical and Computer Engineering University of Thessaly Greece
Holographic-type communication brings an immersive tele-holography experience by delivering holographic contents to users. As the direct representation of holographic contents, hologram videos are naturally three-dime... 详细信息
来源: 评论
Cross-Layer-Optimized Link Selection for Hologram Video Streaming over Millimeter Wave Networks
arXiv
收藏 引用
arXiv 2025年
作者: Jiang, Yiming Liu, Yanwei Liu, Jinxia Argyriou, Antonios Chen, Yifei Zhang, Wen State Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Zhejiang Wanli University Ningbo China Department of Electrical and Computer Engineering University of Thessaly Greece
Holographic-type communication brings an immersive tele-holography experience by delivering holographic contents to users. As the direct representation of holographic contents, hologram videos are naturally three-dime... 详细信息
来源: 评论
DEEPCON: Improving Distributed Deep Learning Model Consistency in Edge-Cloud Environments via Distillation
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2025年
作者: Qian, Bin Qian, Jiaxu Wen, Zhenyu Wu, Di He, Shibo Chen, Jiming Ranjan, Rajiv Zhejiang University State Key Laboratory of Industrial Control Technology Hangzhou China Zhejiang University of Technology Institute of Cyberspace Security College of Information Engineering Hangzhou China University of St Andrews School of Computer Science United Kingdom Newcastle University United Kingdom
In a typical distributed Deep Learning (DL) based application, models are configured differently to meet the requirements of resource constraints. For instance, a large ResNet56 model is deployed on the cloud server w... 详细信息
来源: 评论
Interactive multi-hypergraph inferring and channel-enhanced and attribute-enhanced learning for drug-related side effect prediction
收藏 引用
computers in Biology and Medicine 2025年 184卷 109321-109321页
作者: Xuan, Ping Wu, Shien Cui, Hui Li, Peiru Nakaguchi, Toshiya Zhang, Tiangang Department of Computer Science and Technology Shantou University Shantou China School of Cyberspace Security Hainan University Haikou China Department of Computer Science and Information Technology La Trobe University Australia Australian Centre for AI in Medical Innovation La Trobe University Australia School of Computer Science and Technology Heilongjiang University Harbin China Center for Frontier Medical Engineering Chiba University Japan
Identifying the potential side effects for the interested drugs can help reduce harm to patients caused by drugs in clinical use and decrease the risk of drug development failure. Multiple functionally similar drugs o... 详细信息
来源: 评论
Constraint-Pareto Dominance and Diversity Enhancement Strategy based Evolutionary Algorithm for Solving Constrained Multiobjective Optimization Problems
收藏 引用
IEEE Transactions on Evolutionary Computation 2025年
作者: Liu, Zhe Han, Fei Ling, Qinghua Han, Henry Jiang, Jing Jiangsu University School of Computer Science and Communication Engineering Zhenjiang212013 China Hefei Comprehensive National Science Center Anhui Energy Laboratory Institute of Energy China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Zhenjiang212013 China Jiangsu University of Science and Technology School of Computer Science Zhenjiang212003 China Baylor University School of Engineering and Computer Science Waco76798 United States Anqing Normal University School of Computer and Information Anqing246011 China
The utilization of both constrained and unconstrained-based optimization for solving constrained multi-objective optimization problems (CMOPs) has become prevalent among recently proposed constrained multiobjective ev... 详细信息
来源: 评论
RobustPFL: Robust Personalized Federated Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Chen, Guorong Wang, Wei Wu, Yufang Li, Chao Xu, Guangquan Ji, Shouling Li, Tao Shen, Meng Han, Yufei Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China Beijing Jiaotong University 3 Shangyuancun Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University Tianjin Key Laboratory of Advanced Networking College of Intelligence and Computing Tianjin300350 China Zhejiang University College of Computer Science and Technology Hangzhou310027 China ITAI Haihe Lab Tianjin China Nankai University College of Computer Science Tianjin300350 China Beijing Institute of Technology School of Cyberspace Security Beijing100081 China Peng Cheng Laboratory Cyberspace Security Research Center Shenzhen518066 China INRIA Bretagne Rennes35042 France
Conventional federated learning (FL) coordinated by a central server focuses on training a global model and protecting the privacy of clients' training data by storing it locally. However, the statistical heteroge... 详细信息
来源: 评论
Joint Optimization of Offloading and Caching in Full-Duplex-Enabled Edge Computing Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Dai, Xingxia Tian, Shujuan Liu, Haolin Li, Zhetao Jiang, Hongbo Deng, Qingyong Xiangtan University School of Computer Science School of Cyberspace Security Xiangtan411105 China Jinan University College of Information Science and Technology Guangzhou510632 China Hunan University College of Computer Science and Electronic Engineering Changsha Hunan410082 China Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guilin541004 China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin541004 China
Edge computing (EC) reduces task processing and content download delay by providing computation and caching resources directly to task offloading (TO) users and content request (CR) users. However, existing studies of... 详细信息
来源: 评论
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Jinhuan Chen, Pengtao Xu, Xinyao Wu, Jiajing Shen, Meng Xuan, Qi Yang, Xiaoniu Zhejiang University of Technology Institute of Cyberspace Security College of Information Engineering Hangzhou310023 China ZJUT Binjiang Institute of Artificial Intelligence Hangzhou310056 China Fudan University Adaptive Networks and Control Lab Department of Electronic Engineering School of Information Science and Technology Shanghai200433 China Sun Yat-sen University School of Computer Science and Engineering Guangzhou510006 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Shenzhen518066 China National Key Laboratory of Electromagnetic Space Security Jiaxing314033 China
Due to the decentralized and public nature of the blockchain ecosystem, malicious activities on the Ethereum platform impose immeasurable losses on users. At the same time, the transparency of cryptocurrency transacti... 详细信息
来源: 评论