咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science Technology on Communication Information Security Control Laboratory"
1455 条 记 录,以下是561-570 订阅
排序:
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
A Novel Blockchain-Based Revocable Permission Management on CP-ABE Scheme  7th
A Novel Blockchain-Based Revocable Permission Management on ...
收藏 引用
7th International Conference on Artificial Intelligence and security, ICAIS 2021
作者: Xv, Qianchuan Song, Yubo Li, Xuan Hu, Aiqun Wang, Junbo Key Laboratory of Computer Networking Technology of Jiangsu Province Nanjing211189 China Purple Mountain Laboratory of Network Communication and Security Nanjing211189 China School of Information Science and Engineering Nanjing211189 China National Mobile Communications Research Laboratory Nanjing211189 China
Relying on the characteristics of decentralized, tamper-proof, and traceable, blockchain technology has begun to be widely used in permission management. It can be used for access control by using smart contracts to d... 详细信息
来源: 评论
Ranking on Heterogeneous Manifold for Multimodal information Retrieval
Ranking on Heterogeneous Manifold for Multimodal Information...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Zhenkun Jin Xingshi Wan Xin Nie Xinlei Zhou Yuanyuan Yi Gefei Zhou Wuhan Business University Wuhan Research Institute of Posts and Telecommunications Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan China School of Journalism and Information Communication Huazhong University of Science and Technology Wuhan China School of Computer Science & Technology Huazhong University of Science and Technology Wuhan China
In light of recent advancements in Internet of Multimedia Things (IoMT) and 5G technology, both the variety and quantity of data have been rapidly increasing. Consequently, handling zero-shot cross-modal retrieval (ZS...
来源: 评论
Towards Faster Fully Homomorphic Encryption Implementation with Integer and Floating-point Computing Power of GPUs
Towards Faster Fully Homomorphic Encryption Implementation w...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Guang Fan Fangyu Zheng Lipeng Wan Lili Gao Yuan Zhao Jiankuo Dong Yixuan Song Yuewu Wang Jingqiang Lin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing China School of Cryptography University of Chinese Academy of Sciences Beijing China Department of Computer and Software Nanjing University of Information Science and Technology Nanjing China Ant Group Hangzhou China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Cyber Security University of Science and Technology of China Hefei China
Fully Homomorphic Encryption (FHE) allows computations on encrypted data without knowledge of the plaintext message and currently has been the focus of both academia and industry. However, the performance issue hinder...
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
A Unified NOMA Framework in Beam-Hopping Satellite communication Systems
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Xuyang Yue, Xinwei Li, Tian Han, Zhihao Wang, Yafei Ding, Yong Liu, Rongke The Key Laboratory of Information and Communication Systems Ministry of Information Industry The Key Laboratory of Modern Measurement & Control Technology Ministry of Education Beijing Information Science and Technology University Beijing100101 China The 54th Research Institute of China Electronics Technology Group Corporation Hebei Shijiazhuang050081 China The School of Electronic and Information Engineering Beihang University Beijing100191 China Shenzhen Institution of Beihang University Shenzhen518063 China The Baicells Technologies Co. Ltd Beijing100095 China
This paper investigates the application of a unified non-orthogonal multiple access framework in beam hopping (U-NOMA-BH) based satellite communication systems. More specifically, the proposed U-NOMA-BH framework can ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
Integrated communication and Learned Recognizer with Customized RIS Phases and Sensing Durations
arXiv
收藏 引用
arXiv 2025年
作者: Huang, Yixuan Yang, Jie Wen, Chao-Kai Jin, Shi National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education Southeast University Nanjing210096 China Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China Institute of Communications Engineering National Sun Yat-sen University Kaohsiung80424 Taiwan
Future wireless communication networks are expected to be smarter and more aware of their surroundings, enabling a wide range of context-aware applications. Reconfigurable intelligent surfaces (RISs) are set to play a... 详细信息
来源: 评论
Energy-Age Tradeoff in Status Update communication Systems Based on HARQ  13
Energy-Age Tradeoff in Status Update Communication Systems B...
收藏 引用
13th International Conference on Wireless communications and Signal Processing, WCSP 2021
作者: Huang, Jiajie Gong, Jie Zhan, Wen School of Computer Science and Engineering Sun Yat-sen University Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China School of Electronics and Communication Engineering Sun Yat-sen University 518107 China
The development of the Internet of Things (IoT) has given birth to many real-time applications, which have strict requirements for fresh data. Therefore, a new indicator, age-of-information (AoI), is defined to measur... 详细信息
来源: 评论
SALAD: Self-adaptive lightweight anomaly detection for real-time recurrent time series
arXiv
收藏 引用
arXiv 2021年
作者: Lee, Ming-Chang Lin, Jia-Chun Gran, Ernst Gunnar Depart. of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway Depart. of Information Security and Communication Technology Norwegian University of Science and Technology Simula Research Laboratory Gjøvik Norway
Real-world time series data often present recurrent or repetitive patterns and it is often generated in real time, such as transportation passenger volume, network traffic, system resource consumption, energy usage, a... 详细信息
来源: 评论