咨询与建议

限定检索结果

文献类型

  • 6,442 篇 会议
  • 5,204 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 11,653 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,461 篇 工学
    • 4,237 篇 计算机科学与技术...
    • 3,368 篇 软件工程
    • 1,685 篇 信息与通信工程
    • 1,160 篇 电子科学与技术(可...
    • 1,068 篇 电气工程
    • 1,059 篇 控制科学与工程
    • 629 篇 机械工程
    • 617 篇 光学工程
    • 594 篇 生物工程
    • 575 篇 仪器科学与技术
    • 471 篇 化学工程与技术
    • 375 篇 材料科学与工程(可...
    • 364 篇 网络空间安全
    • 320 篇 生物医学工程(可授...
    • 285 篇 动力工程及工程热...
    • 251 篇 安全科学与工程
    • 227 篇 交通运输工程
    • 226 篇 建筑学
    • 225 篇 土木工程
  • 4,307 篇 理学
    • 1,918 篇 数学
    • 1,472 篇 物理学
    • 681 篇 生物学
    • 611 篇 统计学(可授理学、...
    • 465 篇 化学
    • 400 篇 系统科学
    • 319 篇 大气科学
  • 1,576 篇 管理学
    • 989 篇 管理科学与工程(可...
    • 632 篇 图书情报与档案管...
    • 317 篇 工商管理
  • 296 篇 医学
    • 241 篇 临床医学
  • 260 篇 法学
  • 159 篇 农学
  • 134 篇 军事学
  • 132 篇 经济学
  • 62 篇 教育学
  • 22 篇 艺术学
  • 18 篇 文学
  • 1 篇 历史学

主题

  • 322 篇 feature extracti...
  • 203 篇 semantics
  • 188 篇 computational mo...
  • 184 篇 deep learning
  • 139 篇 accuracy
  • 133 篇 optimization
  • 132 篇 security
  • 121 篇 neural networks
  • 116 篇 authentication
  • 115 篇 training
  • 110 篇 data mining
  • 108 篇 simulation
  • 106 篇 object detection
  • 95 篇 visualization
  • 91 篇 convolution
  • 89 篇 laboratories
  • 88 篇 predictive model...
  • 86 篇 machine learning
  • 84 篇 protocols
  • 84 篇 federated learni...

机构

  • 204 篇 shandong provinc...
  • 181 篇 university of ch...
  • 140 篇 key laboratory o...
  • 134 篇 science and tech...
  • 123 篇 hubei province k...
  • 116 篇 department of co...
  • 113 篇 school of comput...
  • 89 篇 acoustic science...
  • 87 篇 college of compu...
  • 79 篇 national key lab...
  • 78 篇 key laboratory o...
  • 73 篇 school of softwa...
  • 71 篇 school of comput...
  • 70 篇 hubei province k...
  • 69 篇 tsinghua nationa...
  • 67 篇 state key labora...
  • 66 篇 cas key laborato...
  • 65 篇 advanced cryptog...
  • 62 篇 science and tech...
  • 62 篇 school of cyber ...

作者

  • 56 篇 shuxiang guo
  • 49 篇 qizhen sun
  • 47 篇 sun qizhen
  • 45 篇 li li
  • 44 篇 chen zhibo
  • 43 篇 yang yang
  • 43 篇 ding yong
  • 43 篇 wang wei
  • 41 篇 zheng wei-shi
  • 37 篇 li yang
  • 37 篇 ming tang
  • 36 篇 bin wang
  • 33 篇 hao li
  • 30 篇 liu yang
  • 29 篇 li chen
  • 28 篇 liu dong
  • 28 篇 wei li
  • 26 篇 liu xin
  • 25 篇 wang lei
  • 25 篇 li xin

语言

  • 9,728 篇 英文
  • 1,521 篇 其他
  • 422 篇 中文
  • 5 篇 日文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Science and Technology Laboratory of Information System Security"
11653 条 记 录,以下是51-60 订阅
排序:
Driving into Danger: Adversarial Patch Attack on End-To-End Autonomous Driving systems Using Deep Learning  28
Driving into Danger: Adversarial Patch Attack on End-To-End ...
收藏 引用
28th IEEE Symposium on Computers and Communications, ISCC 2023
作者: Wang, Tong Kuang, Xiaohui Li, Hu Du, Qianjin Hu, Zhanhao Deng, Huan Zhao, Gang Institute of System Engineering Academy of Military Sciences Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Deep learning-based autonomous driving systems have been extensively researched due to their superior performance compared to traditional methods. Specifically, end-To-end deep learning systems have been developed, wh... 详细信息
来源: 评论
A comprehensive survey of visible infrared person re-identification from an application perspective
收藏 引用
Multimedia Tools and Applications 2024年 第42期83卷 90243-90270页
作者: Chang, Hua Xu, Xin Liu, Wei Lu, Lingyi Li, Weigang School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology Wuhan430065 China School of Information Science and Engineering Wuhan University of Science and Technology Wuhan China
Person re-identification (ReID) is a significant issue in computer vision, aiming to match the same pedestrian across various cameras. Recent research on this issue has successfully reached a satisfactory performance ... 详细信息
来源: 评论
Code-Based Conjunction Obfuscation
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 237-247页
作者: ZHANG Zheng ZHANG Zhuoran ZHANG Fangguo School of Computer Science and Engineering Sun Yat-sen University Guangdong Province Key Laboratory of Information Security Technology
The pattern-matching problem with wildcards can be formulated as a conjunction where an accepting string is same as the pattern for all non-wildcards. A scheme of conjunction obfuscation is a algorithm that “encrypt... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of Computer science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论
3D laser structuring of supermetalphobic microstructures inside elastomer for multilayer high-density interconnect soft electronics
收藏 引用
International Journal of Extreme Manufacturing 2025年 第3期7卷 337-348页
作者: Chengjun Zhang Qing Yang Haoyu Li Zexiang Luo Yu Lu Jialiang Zhang Cheng Li Feng Chen School of Instrument Science and Technology Xi’an Jiaotong UniversityXi’an 710049People’s Republic of China State Key Laboratory for Manufacturing System Engineering and Shaanxi Key Laboratory of Photonics Technology for Information School of Electronic Science and EngineeringXi’an Jiaotong UniversityXi’an 710049People’s Republic of China
High-density interconnect(HDI)soft electronics that can integrate multiple individual functions into one miniaturized monolithic system is promising for applications related to smart healthcare,soft robotics,and human... 详细信息
来源: 评论
Impacts of Land–Atmosphere Coupling on Summer Extreme Hot-Humid Compound Events over Southern Eurasia under Different Sea Surface Temperature Backgrounds
收藏 引用
Advances in Atmospheric sciences 2025年 第4期42卷 744-760页
作者: Yajing QI Haishan CHEN Siguang ZHU State Key Laboratory of Climate System Prediction and Risk Management/Key Laboratory of Meteorological Disaster Ministry of Education/Collaborative Innovation Center on Forecast and Evaluation of Meteorological DisastersNanjing University of Information Science and TechnologyNanjing 210044China School of Atmospheric Sciences Nanjing University of Information Science and TechnologyNanjing 210044China
Land–atmosphere coupling and sea surface temperature(SST)anomalies both have essential impacts on weather and climate *** on the ERA5 reanalysis dataset and the CESM1.2.2 model,this study investigates the influence o... 详细信息
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
Collaborative Service Provisioning for UAV-Assisted Mobile Edge Computing
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1504-1514页
作者: Yuben QU Zhenhua WEI Zhen QIN Tao WU Jinghao MA Haipeng DAI Chao DONG The Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Colllege of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Xi'an Research Institute of High Technology Department of Information and Communication Noncommissioned Officer Academy of PAP National University of Defense Technology Department of Computer Science and Technology Nanjing University
Unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC), as a way of coping with delaysensitive and computing-intensive tasks, is considered to be a key technology to solving the challenges of terrestrial MEC... 详细信息
来源: 评论
Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains
收藏 引用
Tsinghua science and technology 2023年 第1期28卷 13-26页
作者: Ruizhong Du Caixia Ma Mingyue Li School of Cyberspace Security and Computer and Hebei Province Key Laboratory of High Confidence Information SystemHebei UniversityBaoding 071002China College of Cyber Science Nankai UniversityTianjin 300350China
While users enjoy the convenience of data outsourcing in the cloud,they also face the risks of data modification and private information *** encryption technology can perform keyword searches over encrypted data while... 详细信息
来源: 评论
DiffTSN: Scheduling Mixed Flows in Time-Sensitive Networks with Diffusion-Based Method
收藏 引用
Journal of Computer science and technology 2025年 1-15页
作者: Chang, Wei-Ming Li, Jing-Yi Chen, Lin Chen, Xu School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Provincial Key Laboratory of Information Security Technology Guangzhou510006 China
Deterministic transmission plays a vital role in industrial networks. The time-sensitive network (TSN) protocol family offers a promising paradigm for transmitting time-critical data. To achieve low latency and high Q... 详细信息
来源: 评论