咨询与建议

限定检索结果

文献类型

  • 8,676 篇 会议
  • 6,088 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 14,876 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,954 篇 工学
    • 7,761 篇 计算机科学与技术...
    • 6,316 篇 软件工程
    • 2,405 篇 信息与通信工程
    • 1,179 篇 控制科学与工程
    • 1,015 篇 生物工程
    • 990 篇 电气工程
    • 728 篇 电子科学与技术(可...
    • 643 篇 机械工程
    • 574 篇 网络空间安全
    • 506 篇 光学工程
    • 486 篇 生物医学工程(可授...
    • 378 篇 安全科学与工程
    • 333 篇 化学工程与技术
    • 326 篇 动力工程及工程热...
    • 325 篇 仪器科学与技术
    • 272 篇 交通运输工程
    • 262 篇 建筑学
  • 4,529 篇 理学
    • 2,617 篇 数学
    • 1,112 篇 生物学
    • 998 篇 物理学
    • 724 篇 统计学(可授理学、...
    • 453 篇 系统科学
    • 360 篇 化学
  • 2,792 篇 管理学
    • 1,646 篇 管理科学与工程(可...
    • 1,273 篇 图书情报与档案管...
    • 617 篇 工商管理
  • 515 篇 法学
    • 334 篇 社会学
  • 461 篇 医学
    • 383 篇 临床医学
    • 346 篇 基础医学(可授医学...
  • 248 篇 经济学
    • 247 篇 应用经济学
  • 184 篇 教育学
  • 146 篇 农学
  • 100 篇 军事学
  • 70 篇 文学
  • 42 篇 艺术学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 382 篇 feature extracti...
  • 307 篇 deep learning
  • 306 篇 semantics
  • 290 篇 computational mo...
  • 262 篇 authentication
  • 215 篇 computer science
  • 205 篇 data mining
  • 194 篇 training
  • 191 篇 internet of thin...
  • 189 篇 security
  • 176 篇 optimization
  • 172 篇 machine learning
  • 171 篇 information secu...
  • 160 篇 servers
  • 157 篇 accuracy
  • 152 篇 neural networks
  • 144 篇 cryptography
  • 143 篇 predictive model...
  • 137 篇 software enginee...
  • 132 篇 wireless sensor ...

机构

  • 470 篇 school of comput...
  • 280 篇 school of inform...
  • 214 篇 school of cyber ...
  • 207 篇 institute of inf...
  • 199 篇 school of comput...
  • 160 篇 school of comput...
  • 140 篇 school of softwa...
  • 138 篇 school of softwa...
  • 133 篇 college of compu...
  • 110 篇 department of co...
  • 88 篇 state key labora...
  • 82 篇 school of comput...
  • 73 篇 guilin universit...
  • 71 篇 school of inform...
  • 68 篇 tsinghua nationa...
  • 64 篇 school of comput...
  • 60 篇 school of comput...
  • 59 篇 school of softwa...
  • 58 篇 school of softwa...
  • 57 篇 school of comput...

作者

  • 73 篇 luo xiaonan
  • 46 篇 ding yong
  • 42 篇 yang yang
  • 41 篇 zheng wei-shi
  • 40 篇 li li
  • 39 篇 qi lianyong
  • 39 篇 wang wei
  • 35 篇 liu yang
  • 33 篇 qi liu
  • 33 篇 tao dacheng
  • 31 篇 ma jianfeng
  • 30 篇 wang lei
  • 29 篇 liu qi
  • 29 篇 jin wang
  • 28 篇 li ji
  • 28 篇 sun xingming
  • 27 篇 chen zhong
  • 27 篇 wei li
  • 27 篇 wang guojun
  • 26 篇 zhang lei

语言

  • 13,988 篇 英文
  • 573 篇 其他
  • 325 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Information Security/School of Software"
14876 条 记 录,以下是1-10 订阅
排序:
Witness encryption with updatable ciphertexts
收藏 引用
Science China(information Sciences) 2025年 第3期68卷 181-196页
作者: Yuzhu WANG Mingwu ZHANG School of Computer Science and Information Security Guilin University of Electronic Technology School of Computer Science Hubei University of Technology
Witness encryption(WE) is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance. Anyone who possesses a solution to this instance(i.e., a witness) can then recover the messa... 详细信息
来源: 评论
Deep learning-based software engineering: progress,challenges, and opportunities
收藏 引用
Science China(information Sciences) 2025年 第1期68卷 57-144页
作者: Xiangping CHEN Xing HU Yuan HUANG He JIANG Weixing JI Yanjie JIANG Yanyan JIANG Bo LIU Hui LIU Xiaochen LI Xiaoli LIAN Guozhu MENG Xin PENG Hailong SUN Lin SHI Bo WANG Chong WANG Jiayi WANG Tiantian WANG Jifeng XUAN Xin XIA Yibiao YANG Yixin YANG Li ZHANG Yuming ZHOU Lu ZHANG School of Journalism and Communication Sun Yat-sen University School of Software Technology Zhejiang University School of Software Engineering Sun Yat-sen University School of Software Dalian University of Technology School of Computer Science and Technology Beijing Institute of Technology Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of EducationSchool of Computer Science Peking University State Key Laboratory for Novel Software Technology Nanjing University School of Computer Science and Engineering Beihang University Institute of Information Engineering Chinese Academy of Sciences School of Computer Science Fudan University State Key Laboratory of Complex & Critical Software Environment (CCSE) School of Software Beihang University School of Computer and Information Technology Beijing Jiaotong University School of Computer Science and Technology Harbin Institute of Technology School of Computer Science Wuhan University Huawei Technologies
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech r... 详细信息
来源: 评论
Multi-label, Classification-based Prediction of Breast Cancer Metastasis Directions
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer Science 2025年 第1期52卷 1-10页
作者: Wang, Tingting Fan, Qi Tan, Liang Zhang, Beier School of Computer and Software Engineering Anhui Institute of Information Technology China School of Computer Science and Technology Huaibei Normal University China School of Computer and Software Engineering Anhui Institute of Information Technology China School of Computer Science and Technology Huaibei Normal University China
Predicting the metastatic direction of primary breast cancer (BC), thus assisting physicians in precise treatment, strict follow-up, and effectively improving the prognosis. The clinical data of 293,946 patients with ... 详细信息
来源: 评论
Learning Distinguishable Degradation Maps for Unknown Image Super-Resolution
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 2530-2542页
作者: Liu, Zhenbing Huang, Jieyu Wang, Wenhao Lu, Haoxiang Lan, Rushi Guilin University of Electronic Technology School of Computer and Information Security Guilin541004 China
Most existing super-resolution (SR) methods assume that the degradation is fixed (e.g., bicubic downsampling), whereas their performance would be degraded if the actual degradation differs from this assumption. To dea... 详细信息
来源: 评论
DIEONet:Domain-Invariant information Extraction and Optimization Network for Visual Place Recognition
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5019-5033页
作者: Shaoqi Hou Zebang Qin Chenyu Wu Guangqiang Yin Xinzhong Wang Zhiguo Wang School of Computer Science and Technology Xinjiang UniversityUrumqi830046China School of Information and Software Engineering University of Electronic Science and Technology ofChinaChengdu611731China Institute of Public Security Kash Institute of Electronics and Information IndustryKashi844000China
Visual Place Recognition(VPR)technology aims to use visual information to judge the location of agents,which plays an irreplaceable role in tasks such as loop closure detection and *** is well known that previous VPR ... 详细信息
来源: 评论
FedCLCC:A personalized federated learning algorithm for edge cloud collaboration based on contrastive learning and conditional computing
收藏 引用
Defence Technology(防务技术) 2025年 第1期43卷 80-93页
作者: Kangning Yin Xinhui Ji Yan Wang Zhiguo Wang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Institute of Public Security Kash Institute of Electronics and Information IndustryKashi844000China
Federated learning(FL)is a distributed machine learning paradigm for edge cloud *** can facilitate data-driven decision-making in tactical scenarios,effectively addressing both data volume and infrastructure challenge... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
Extractable Witness Encryption for Arithmetic Circuit Satisfiability Problem
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18137-18148页
作者: Wang, Yuzhu Zhang, Mingwu Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China Hubei University of Technology School of Computer Science Wuhan430068 China
Witness encryption (WE) (Garg et al, STOC 2013) allows a message to be encrypted using a description of a difficult problem (an NP instance), while anyone who knows a solution to the problem (a witness) can decrypt th... 详细信息
来源: 评论
Dynamic Certificateless Outsourced Data Auditing Mechanism Supporting Multi-Ownership Transfer via Blockchain Systems
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第2期22卷 2017-2030页
作者: Zhang, Xiaojun Liu, Qing Liu, Bingyun Zhang, Yuan Xue, Jingting Southwest Petroleum University School of Computer Science and Software Engineering Research Center for Cyber Security Chengdu610500 China Chengdu Neusoft University School of Computer and Software Chengdu611844 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China
Data auditing contributes to checking the integrity of outsourced data, promoting the vigorous development of cloud storage services. In actual scenarios, such as migration of electronic medical records or data transf... 详细信息
来源: 评论
NumScout: Unveiling Numerical Defects in Smart Contracts Using LLM-Pruning Symbolic Execution
收藏 引用
IEEE Transactions on software Engineering 2025年 第5期51卷 1538-1553页
作者: Chen, Jiachi Shao, Zhenzhe Yang, Shuo Shen, Yiming Wang, Yanlin Chen, Ting Shan, Zhenyu Zheng, Zibin Hangzhou Normal University Intelligent Transportation and Information Security Laboratory Hangzhou311121 China Sun Yat-sen University School of Software Engineering Zhuhai519082 China University of Electronic Science and Technology of China School of Computer Science and Engineering School of Cyber Security Chengdu611731 China Kashi Institute of Electronics and Information Industry Kashi844000 China
In recent years, the Ethereum platform has witnessed a proliferation of smart contracts, accompanied by exponential growth in total value locked (TVL). High-TVL smart contracts often require complex numerical computat... 详细信息
来源: 评论