咨询与建议

限定检索结果

文献类型

  • 8,672 篇 会议
  • 5,953 篇 期刊文献
  • 113 册 图书

馆藏范围

  • 14,738 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,825 篇 工学
    • 7,656 篇 计算机科学与技术...
    • 6,265 篇 软件工程
    • 2,355 篇 信息与通信工程
    • 1,145 篇 控制科学与工程
    • 1,015 篇 生物工程
    • 915 篇 电气工程
    • 697 篇 电子科学与技术(可...
    • 627 篇 机械工程
    • 550 篇 网络空间安全
    • 500 篇 光学工程
    • 484 篇 生物医学工程(可授...
    • 373 篇 安全科学与工程
    • 331 篇 化学工程与技术
    • 326 篇 动力工程及工程热...
    • 321 篇 仪器科学与技术
    • 262 篇 建筑学
    • 262 篇 交通运输工程
  • 4,477 篇 理学
    • 2,586 篇 数学
    • 1,105 篇 生物学
    • 978 篇 物理学
    • 709 篇 统计学(可授理学、...
    • 451 篇 系统科学
    • 357 篇 化学
  • 2,766 篇 管理学
    • 1,632 篇 管理科学与工程(可...
    • 1,255 篇 图书情报与档案管...
    • 615 篇 工商管理
  • 514 篇 法学
    • 336 篇 社会学
  • 454 篇 医学
    • 380 篇 临床医学
    • 343 篇 基础医学(可授医学...
  • 248 篇 经济学
    • 247 篇 应用经济学
  • 183 篇 教育学
  • 145 篇 农学
  • 100 篇 军事学
  • 70 篇 文学
  • 42 篇 艺术学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 379 篇 feature extracti...
  • 304 篇 deep learning
  • 301 篇 semantics
  • 289 篇 computational mo...
  • 263 篇 authentication
  • 215 篇 computer science
  • 203 篇 data mining
  • 195 篇 security
  • 191 篇 internet of thin...
  • 190 篇 training
  • 176 篇 optimization
  • 176 篇 information secu...
  • 174 篇 machine learning
  • 158 篇 servers
  • 156 篇 accuracy
  • 150 篇 neural networks
  • 146 篇 cryptography
  • 143 篇 predictive model...
  • 137 篇 software enginee...
  • 132 篇 wireless sensor ...

机构

  • 470 篇 school of comput...
  • 277 篇 school of inform...
  • 216 篇 school of cyber ...
  • 207 篇 institute of inf...
  • 198 篇 school of comput...
  • 158 篇 school of comput...
  • 140 篇 school of softwa...
  • 139 篇 school of softwa...
  • 131 篇 college of compu...
  • 110 篇 department of co...
  • 89 篇 state key labora...
  • 82 篇 school of comput...
  • 71 篇 guilin universit...
  • 71 篇 school of inform...
  • 68 篇 tsinghua nationa...
  • 64 篇 school of comput...
  • 60 篇 school of comput...
  • 58 篇 school of softwa...
  • 57 篇 school of comput...
  • 57 篇 school of softwa...

作者

  • 73 篇 luo xiaonan
  • 47 篇 ding yong
  • 42 篇 yang yang
  • 41 篇 zheng wei-shi
  • 39 篇 li li
  • 39 篇 qi lianyong
  • 36 篇 wang wei
  • 33 篇 qi liu
  • 33 篇 liu yang
  • 33 篇 tao dacheng
  • 31 篇 ma jianfeng
  • 29 篇 wang lei
  • 29 篇 liu qi
  • 29 篇 jin wang
  • 28 篇 li ji
  • 28 篇 sun xingming
  • 27 篇 wang guojun
  • 27 篇 shen jian
  • 26 篇 chen zhong
  • 26 篇 zhang lei

语言

  • 13,877 篇 英文
  • 550 篇 其他
  • 326 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Information Security/School of Software"
14738 条 记 录,以下是1-10 订阅
排序:
Witness encryption with updatable ciphertexts
收藏 引用
Science China(information Sciences) 2025年 第3期68卷 181-196页
作者: Yuzhu WANG Mingwu ZHANG School of Computer Science and Information Security Guilin University of Electronic Technology School of Computer Science Hubei University of Technology
Witness encryption(WE) is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance. Anyone who possesses a solution to this instance(i.e., a witness) can then recover the messa... 详细信息
来源: 评论
Deep learning-based software engineering: progress,challenges, and opportunities
收藏 引用
Science China(information Sciences) 2025年 第1期68卷 57-144页
作者: Xiangping CHEN Xing HU Yuan HUANG He JIANG Weixing JI Yanjie JIANG Yanyan JIANG Bo LIU Hui LIU Xiaochen LI Xiaoli LIAN Guozhu MENG Xin PENG Hailong SUN Lin SHI Bo WANG Chong WANG Jiayi WANG Tiantian WANG Jifeng XUAN Xin XIA Yibiao YANG Yixin YANG Li ZHANG Yuming ZHOU Lu ZHANG School of Journalism and Communication Sun Yat-sen University School of Software Technology Zhejiang University School of Software Engineering Sun Yat-sen University School of Software Dalian University of Technology School of Computer Science and Technology Beijing Institute of Technology Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of EducationSchool of Computer Science Peking University State Key Laboratory for Novel Software Technology Nanjing University School of Computer Science and Engineering Beihang University Institute of Information Engineering Chinese Academy of Sciences School of Computer Science Fudan University State Key Laboratory of Complex & Critical Software Environment (CCSE) School of Software Beihang University School of Computer and Information Technology Beijing Jiaotong University School of Computer Science and Technology Harbin Institute of Technology School of Computer Science Wuhan University Huawei Technologies
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech r... 详细信息
来源: 评论
Multi-label, Classification-based Prediction of Breast Cancer Metastasis Directions
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer Science 2025年 第1期52卷 1-10页
作者: Wang, Tingting Fan, Qi Tan, Liang Zhang, Beier School of Computer and Software Engineering Anhui Institute of Information Technology China School of Computer Science and Technology Huaibei Normal University China School of Computer and Software Engineering Anhui Institute of Information Technology China School of Computer Science and Technology Huaibei Normal University China
Predicting the metastatic direction of primary breast cancer (BC), thus assisting physicians in precise treatment, strict follow-up, and effectively improving the prognosis. The clinical data of 293,946 patients with ... 详细信息
来源: 评论
DIEONet:Domain-Invariant information Extraction and Optimization Network for Visual Place Recognition
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5019-5033页
作者: Shaoqi Hou Zebang Qin Chenyu Wu Guangqiang Yin Xinzhong Wang Zhiguo Wang School of Computer Science and Technology Xinjiang UniversityUrumqi830046China School of Information and Software Engineering University of Electronic Science and Technology ofChinaChengdu611731China Institute of Public Security Kash Institute of Electronics and Information IndustryKashi844000China
Visual Place Recognition(VPR)technology aims to use visual information to judge the location of agents,which plays an irreplaceable role in tasks such as loop closure detection and *** is well known that previous VPR ... 详细信息
来源: 评论
FedCLCC:A personalized federated learning algorithm for edge cloud collaboration based on contrastive learning and conditional computing
收藏 引用
Defence Technology(防务技术) 2025年 第1期43卷 80-93页
作者: Kangning Yin Xinhui Ji Yan Wang Zhiguo Wang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Institute of Public Security Kash Institute of Electronics and Information IndustryKashi844000China
Federated learning(FL)is a distributed machine learning paradigm for edge cloud *** can facilitate data-driven decision-making in tactical scenarios,effectively addressing both data volume and infrastructure challenge... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
Extractable Witness Encryption for Arithmetic Circuit Satisfiability Problem
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18137-18148页
作者: Wang, Yuzhu Zhang, Mingwu Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China Hubei University of Technology School of Computer Science Wuhan430068 China
Witness encryption (WE) (Garg et al, STOC 2013) allows a message to be encrypted using a description of a difficult problem (an NP instance), while anyone who knows a solution to the problem (a witness) can decrypt th... 详细信息
来源: 评论
ICCG:low-cost and efficient consistency with adaptive synchronization for metadata replication
收藏 引用
Frontiers of computer Science 2025年 第1期19卷 53-70页
作者: Chenhao ZHANG Liang WANG Jing SHANG Zhiwen XIAO Limin XIAO Meng HAN Bing WEI Runnan SHEN Jinquan WANG State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Cyberspace Security Hainan UniversityHaikou 570228China China Mobile Information Technology Center Beijing 100033China
The rapid growth in the storage scale of wide-area distributed file systems (DFS) calls for fast and scalable metadata management. Metadata replication is the widely used technique for improving the performance and sc... 详细信息
来源: 评论
Efficient Quantum Secure Vector Dominance and Its Applications in Computational Geometry
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 2129-2143页
作者: Liu, Wenjie Su, Bingmei Sun, Feiyang Nanjing University of Information Science and Technology School of Software Nanjing210044 China Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China
Secure vector dominance is a key cryptographic primitive in secure computational geometry (SCG), determining the dominance relationship of vectors between two participants without revealing their private information. ... 详细信息
来源: 评论
Robust copy-move detection and localization of digital audio based CFCC feature
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9573-9589页
作者: Wang, Dongyu Li, Xiaojie Shi, Canghong Niu, Xianhua Xiong, Ling Wu, Hanzhou Qian, Qing Qi, Chao School of Computer and Software Engineering Xihua University Chengdu610039 China The College of Computer Science Chengdu University of Information Technology Chengdu610225 China School of Information Shanghai University Shanghai200444 China School of Information Guizhou University of Finance and Economics Guiyang550000 China
Copy-move forgery is a common audio tampering technique in which users copy the contents of one speech and paste them into another region of the same speech signal, thus achieving the effect of tampering with the sema... 详细信息
来源: 评论