咨询与建议

限定检索结果

文献类型

  • 807 篇 会议
  • 622 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 960 篇 工学
    • 692 篇 计算机科学与技术...
    • 557 篇 软件工程
    • 226 篇 信息与通信工程
    • 136 篇 电气工程
    • 115 篇 控制科学与工程
    • 91 篇 电子科学与技术(可...
    • 67 篇 生物工程
    • 60 篇 机械工程
    • 57 篇 网络空间安全
    • 42 篇 生物医学工程(可授...
    • 34 篇 仪器科学与技术
    • 32 篇 建筑学
    • 31 篇 光学工程
    • 31 篇 安全科学与工程
    • 27 篇 交通运输工程
    • 26 篇 化学工程与技术
    • 25 篇 动力工程及工程热...
    • 24 篇 土木工程
  • 427 篇 理学
    • 257 篇 数学
    • 108 篇 物理学
    • 76 篇 生物学
    • 76 篇 统计学(可授理学、...
    • 53 篇 系统科学
  • 233 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 107 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 60 篇 法学
    • 36 篇 社会学
    • 25 篇 法学
  • 40 篇 医学
    • 35 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 19 篇 军事学
  • 14 篇 经济学
  • 13 篇 农学
  • 9 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 46 篇 feature extracti...
  • 40 篇 semantics
  • 40 篇 information secu...
  • 39 篇 cryptography
  • 35 篇 authentication
  • 32 篇 laboratories
  • 28 篇 accuracy
  • 28 篇 privacy
  • 27 篇 training
  • 23 篇 security
  • 20 篇 computer science
  • 20 篇 deep learning
  • 19 篇 computational mo...
  • 17 篇 access control
  • 17 篇 optimization
  • 17 篇 cloud computing
  • 17 篇 data models
  • 16 篇 public key crypt...
  • 16 篇 data mining
  • 16 篇 protocols

机构

  • 104 篇 school of softwa...
  • 64 篇 tsinghua nationa...
  • 62 篇 department of co...
  • 54 篇 advanced cryptog...
  • 46 篇 key laboratory f...
  • 43 篇 state key labora...
  • 41 篇 national key lab...
  • 34 篇 school of cybers...
  • 27 篇 state key labora...
  • 26 篇 university of ch...
  • 26 篇 school of cyber ...
  • 25 篇 hubei key labora...
  • 25 篇 school of comput...
  • 24 篇 guangxi key labo...
  • 22 篇 hubei engineerin...
  • 21 篇 national enginee...
  • 20 篇 services computi...
  • 20 篇 state key labora...
  • 20 篇 school of softwa...
  • 19 篇 key laboratory f...

作者

  • 19 篇 wang jianmin
  • 18 篇 ming gu
  • 18 篇 hu shengshan
  • 17 篇 jin hai
  • 15 篇 yunhao liu
  • 14 篇 zhang leo yu
  • 14 篇 li minghui
  • 13 篇 zhang shibin
  • 13 篇 shen linlin
  • 12 篇 wang chaokun
  • 12 篇 jianmin wang
  • 12 篇 wang bin
  • 12 篇 kuang xiaohui
  • 12 篇 zhou ziqi
  • 11 篇 shibin zhang
  • 11 篇 zhang hui
  • 10 篇 huang yuanyuan
  • 10 篇 xiong hu
  • 10 篇 jiaguang sun
  • 10 篇 liu yan

语言

  • 1,310 篇 英文
  • 64 篇 中文
  • 57 篇 其他
检索条件"机构=School of Software and Key Laboratory for Information System Security"
1431 条 记 录,以下是31-40 订阅
排序:
Exploring Global and Local information for Anomaly Detection with Normal Samples
Exploring Global and Local Information for Anomaly Detection...
收藏 引用
2023 IEEE International Conference on systems, Man, and Cybernetics, SMC 2023
作者: Xu, Fan Wang, Nan Zhao, Xibin School of Computer Science and Technology University of Science and Technology of China Hefei230026 China School of Software Beijing Jiaotong University Beijing100044 China Key Laboratory for Information System Security Beijing100084 China
Anomaly detection aims to detect data that do not conform to regular patterns, and such data is also called outliers. The anomalies to be detected are often tiny in proportion, containing crucial information, and are ...
来源: 评论
Temporal Refinement Graph Convolutional Network for Skeleton-Based Action Recognition
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1586-1598页
作者: Zhuang, Tianming Qin, Zhen Ding, Yi Deng, Fuhu Chen, Leduo Qin, Zhiguang Raymond Choo, Kim-Kwang University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu Sichuan610054 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu Sichuan610054 China School of Advanced Technology Suzhou Jiangsu215123 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
Human skeleton data, which has served in the aspect of human activity recognition, ought to be the most representative biometric characteristics due to its intuitivity and visuality. The state-of-the-art approaches ma... 详细信息
来源: 评论
HRNet-U: Combining the Strengths of U-Net and HRNet for Efficient Pose Estimation  2
HRNet-U: Combining the Strengths of U-Net and HRNet for Effi...
收藏 引用
2nd International Conference on Algorithm, Image Processing and Machine Vision, AIPMV 2024
作者: Guo, Biao Guo, Fangmin He, Qian Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guilin China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China
High-resolution network (HRNet) shows excellent performance in 2D multi-person pose estimation tasks. It can maintain high-resolution representation in the network and exchange information between multi-scale features... 详细信息
来源: 评论
DMCPose: A Binocular 3D Pose Estimation Network Integrating Disparity and Multi-View Consistency via Attention
DMCPose: A Binocular 3D Pose Estimation Network Integrating ...
收藏 引用
2024 International Symposium on Digital Home, ISDH 2024
作者: Zhang, Jialun Guo, Biao School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guilin China
In 3D human pose estimation, binocular vision typically relies on stereo matching to obtain depth information and calculates 3D keypoints using the disparity principle. However, the high computational cost of stereo m... 详细信息
来源: 评论
A Review on Binary Code Analysis Datasets  18th
A Review on Binary Code Analysis Datasets
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing systems and Applications, WASA 2024
作者: Huang, Zhijian Song, Shuguang Liu, Han Kuang, Hongyu Zhang, Jingjing Hu, Pengfei National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute Academy of Military Sciences Beijing China School of Computer Science and Technology Shandong University Qingdao China
Binary code analysis serves as the foundation for research in vulnerability discovery, software protection, and malicious code analysis. However, analyzing binary files is challenging due to the lack of high-level sem... 详细信息
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论
A generalized reliability analysis of 3-ary n-cubes  16
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
16th International Conference on Communication software and Networks, ICCSN 2024
作者: Bai, Zefang Wang, Guijuan Ma, Meijie School of Mathematics and Statistics Jinan250353 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
Deployment optimization for target perpetual coverage in energy harvesting wireless sensor network
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 498-508页
作者: Zhenkun Jin Yixuan Geng Chenlu Zhu Yunzhi Xia Xianjun Deng Lingzhi Yi Xianlan Wang Wuhan Business University 430056China Wuhan Research Institute of Post and Telecommunication Wuhan430074China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data SecuritySchool of Cyber Science and EngineeringHuazhong University of Science and TechnologyWuhan430074China Hubei Chutian Expressway Digital Technology Co.Ltd Wuhan430074China School of Information and Safety Engineering Zhongnan University of Economics and LawWuhan430073China
Energy limitation of traditional Wireless Sensor Networks(WSNs)greatly confines the network lifetime due to generating and processing massive sensing data with a limited *** energy harvesting WSN is a novel network ar... 详细信息
来源: 评论
Quantum Fuzzy Support Vector Machine for Binary Classification
收藏 引用
Computer systems Science & Engineering 2023年 第6期45卷 2783-2794页
作者: Xi Huang Shibin Zhang Chen Lin Jinyue Xia School of Cybersecurity Chengdu University of Information TechnologyChengdu610225China Sichuan Key Laboratory of Advanced Cryptography and System Security Chengdu610225China International Business Machines Corporation(IBM) New York14201USA
In the objective world,how to deal with the complexity and uncertainty of big data efficiently and accurately has become the premise and key to machine *** support vector machine(FSVM)not only deals with the classifi-... 详细信息
来源: 评论
On-chain is not enough:Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1053-1060页
作者: Yilei Wang Zhaojie Wang Guoyu Yang Shan Ai Xiaoyu Xiang Chang Chen Minghao Zhao School of Computer Science Qufu Normal UniversityRizhao276826China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin541004China Institute of Artificial Intelligence and Blockchain Guangzhou UniversityGuangzhou510006China School of Software Tsinghua UniversityTsinghua UniversityBeijing100191China
The blockchain provides a reliable and scalable method for enabling source-tracing functionality in large-scale Internet of Things(IoT)*** blockchain-based source tracing applications are generally based on the hypoth... 详细信息
来源: 评论