咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 642 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 947 篇 工学
    • 512 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 365 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 152 篇 电气工程
    • 97 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 556 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,344 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1438 条 记 录,以下是551-560 订阅
排序:
Factored Trace Lasso Based Linear Regression Methods: Optimizations and Applications  5th
Factored Trace Lasso Based Linear Regression Methods: Optimi...
收藏 引用
5th International Conference on Cognitive Systems and Signal Processing, ICCSIP 2020
作者: Zhang, Hengmin Du, Wenli Liu, Xiaoqian Zhang, Bob Qian, Feng School of Information Science and Engineering Key Laboratory of Advanced Control and Optimization for Chemical Processes Ministry of Education East China University of Science and Technology Shanghai200237 China Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Department of Computer and Information Science University of Macau 999078 China
Consider that matrix trace lasso regularized convex p -norm with p= 1, 2 regression methods usually have the higher computational complexity due to the singular value decomposition (SVD) of larger size matrix in big d... 详细信息
来源: 评论
Twitter Bot Detection with Multi-Head Attention and Supervised Contrastive Learning
Twitter Bot Detection with Multi-Head Attention and Supervis...
收藏 引用
International Conference on Wavelet Active Media technology and information Processing (ICWAMTIP)
作者: Liu Qiang Lu Jiazhong Huang Yuanyuan Zhang Weisha Lv Jun School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China SUGON Industrial Control and Security Center Chengdu China School of Foreign Languages University of Electronic Science and Technology of China Chengdu China MetaX Integrated Circuits (Shanghai) Co. Ltd
The task of detecting bots on Twitter is an indispensable task for combating social network disinformation, curbing rumors, and managing online public opinion. However, today's social bots often disguise themselve... 详细信息
来源: 评论
Node Locations-based Ad-Hoc Topology Analysis Using Minimum Connected Dominating Set
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2022年 第1期7卷 231-242页
作者: Xu, Jian-Liang Lou, Hua-Xun Wang, Zhe Lu, Zhe-Ming The 36th Research Institute of China Electronics Technology Group Corporation Jiaxing314033 China Key Laboratory of Communication Information Control and Security Technology Jiaxing314033 China School of Aeronautics and Astronautics Zhejiang University Hangzhou310027 China
In the battlefield environment, sometimes only the location information of the battlefield network nodes can be obtained, but it is difficult to obtain the communication relationship information between the nodes. In ... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
A Novel Blockchain-Based Revocable Permission Management on CP-ABE Scheme  7th
A Novel Blockchain-Based Revocable Permission Management on ...
收藏 引用
7th International Conference on Artificial Intelligence and security, ICAIS 2021
作者: Xv, Qianchuan Song, Yubo Li, Xuan Hu, Aiqun Wang, Junbo Key Laboratory of Computer Networking Technology of Jiangsu Province Nanjing211189 China Purple Mountain Laboratory of Network Communication and Security Nanjing211189 China School of Information Science and Engineering Nanjing211189 China National Mobile Communications Research Laboratory Nanjing211189 China
Relying on the characteristics of decentralized, tamper-proof, and traceable, blockchain technology has begun to be widely used in permission management. It can be used for access control by using smart contracts to d... 详细信息
来源: 评论
Ranking on Heterogeneous Manifold for Multimodal information Retrieval
Ranking on Heterogeneous Manifold for Multimodal Information...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Zhenkun Jin Xingshi Wan Xin Nie Xinlei Zhou Yuanyuan Yi Gefei Zhou Wuhan Business University Wuhan Research Institute of Posts and Telecommunications Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan China School of Journalism and Information Communication Huazhong University of Science and Technology Wuhan China School of Computer Science & Technology Huazhong University of Science and Technology Wuhan China
In light of recent advancements in Internet of Multimedia Things (IoMT) and 5G technology, both the variety and quantity of data have been rapidly increasing. Consequently, handling zero-shot cross-modal retrieval (ZS...
来源: 评论
Towards Faster Fully Homomorphic Encryption Implementation with Integer and Floating-point Computing Power of GPUs
Towards Faster Fully Homomorphic Encryption Implementation w...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Guang Fan Fangyu Zheng Lipeng Wan Lili Gao Yuan Zhao Jiankuo Dong Yixuan Song Yuewu Wang Jingqiang Lin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing China School of Cryptography University of Chinese Academy of Sciences Beijing China Department of Computer and Software Nanjing University of Information Science and Technology Nanjing China Ant Group Hangzhou China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Cyber Security University of Science and Technology of China Hefei China
Fully Homomorphic Encryption (FHE) allows computations on encrypted data without knowledge of the plaintext message and currently has been the focus of both academia and industry. However, the performance issue hinder...
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
A Unified NOMA Framework in Beam-Hopping Satellite communication Systems
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Xuyang Yue, Xinwei Li, Tian Han, Zhihao Wang, Yafei Ding, Yong Liu, Rongke The Key Laboratory of Information and Communication Systems Ministry of Information Industry The Key Laboratory of Modern Measurement & Control Technology Ministry of Education Beijing Information Science and Technology University Beijing100101 China The 54th Research Institute of China Electronics Technology Group Corporation Hebei Shijiazhuang050081 China The School of Electronic and Information Engineering Beihang University Beijing100191 China Shenzhen Institution of Beihang University Shenzhen518063 China The Baicells Technologies Co. Ltd Beijing100095 China
This paper investigates the application of a unified non-orthogonal multiple access framework in beam hopping (U-NOMA-BH) based satellite communication systems. More specifically, the proposed U-NOMA-BH framework can ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论