咨询与建议

限定检索结果

文献类型

  • 918 篇 期刊文献
  • 538 篇 会议
  • 13 册 图书

馆藏范围

  • 1,469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,006 篇 工学
    • 688 篇 计算机科学与技术...
    • 547 篇 软件工程
    • 244 篇 信息与通信工程
    • 166 篇 电气工程
    • 123 篇 控制科学与工程
    • 116 篇 生物工程
    • 114 篇 电子科学与技术(可...
    • 101 篇 光学工程
    • 74 篇 生物医学工程(可授...
    • 61 篇 机械工程
    • 43 篇 动力工程及工程热...
    • 37 篇 网络空间安全
    • 36 篇 仪器科学与技术
    • 29 篇 交通运输工程
    • 28 篇 化学工程与技术
  • 602 篇 理学
    • 259 篇 数学
    • 246 篇 物理学
    • 126 篇 生物学
    • 89 篇 统计学(可授理学、...
    • 54 篇 系统科学
    • 44 篇 化学
  • 248 篇 管理学
    • 157 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 86 篇 医学
    • 76 篇 临床医学
    • 66 篇 基础医学(可授医学...
    • 38 篇 药学(可授医学、理...
    • 30 篇 公共卫生与预防医...
  • 35 篇 法学
    • 24 篇 社会学
  • 19 篇 经济学
  • 17 篇 农学
  • 15 篇 教育学
  • 9 篇 军事学
  • 7 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 38 篇 machine learning
  • 35 篇 deep learning
  • 34 篇 computer science
  • 30 篇 grid computing
  • 29 篇 computational mo...
  • 26 篇 semantics
  • 26 篇 feature extracti...
  • 24 篇 training
  • 20 篇 cloud computing
  • 19 篇 computer archite...
  • 19 篇 internet
  • 18 篇 data mining
  • 18 篇 artificial intel...
  • 17 篇 protocols
  • 16 篇 resource managem...
  • 16 篇 distributed comp...
  • 16 篇 quantum cryptogr...
  • 16 篇 computer network...
  • 15 篇 bandwidth
  • 15 篇 servers

机构

  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 tomsk state univ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 37 篇 faculté des scie...

作者

  • 33 篇 chao-tung yang
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic

语言

  • 1,305 篇 英文
  • 141 篇 其他
  • 22 篇 中文
  • 2 篇 德文
检索条件"机构=Web Computing Laboratory Computer Science and Information Engineering Department"
1469 条 记 录,以下是121-130 订阅
Achieving Distributed and Privacy-Preserving Cross-Chain Transactions in Account-Model Blockchain Systems
Achieving Distributed and Privacy-Preserving Cross-Chain Tra...
收藏 引用
2023 IEEE International Conference on Metaverse computing, Networking and Applications, MetaCom 2023
作者: Zhang, Chuan Wang, Weijie Zhang, Weiting Nie, Jiangtian Liang, Jinwen Zhu, Liehuang Beijing Institute of Technology School of Cyberspace Science and Technology Beijing China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Guangdong China Beijing Institute of Technology School of Computer Science & Technology Beijing China Beijing Jiaotong University School of Electronic and Information Engineering Beijing China Nanyang Technological University School of Computer Science and Engineering Singapore Hong Kong Polytechnic University Department of Computing Hong Kong
Cross-Chain is an emerging technology to enable transaction circulation across different blockchain systems, breaking down transaction isolation among decentralized ecosystems. Existing cross-chain solutions are often... 详细信息
来源: 评论
2021 Monthly Rice Production in Chinese Coastal Provinces  3
2021 Monthly Rice Production in Chinese Coastal Provinces
收藏 引用
3rd International Conference on Big Data Analytics and Practices, IBDAP 2022
作者: Parmar, Ajeet Munasinghe, Thilanka Tubbs, Heidi Anyamba, Assaf Rensselaer Polytechnic Institute Department of Electrical Computer and Systems Engineering Troy United States Rensselaer Polytechnic Institute Department of Information Technology and Web Science Troy United States Oak Ridge National Laboratory Geospatial Science and Human Security Division Oak Ridge United States
This paper explores the dynamics of rice production in the Chinese provinces of Liaoning, Jilin, Heilongjiang, Shanghai, Jiangsu, and Zhejiang and seeks to predict monthly rice production in the months of April throug... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
arXiv
收藏 引用
arXiv 2024年
作者: Deng, Kaijun Zheng, Dezhi Xie, Jindong Wang, Jinbao Xie, Weicheng Shen, Linlin Song, Siyang Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China Department of Computer Science University of Exeter United Kingdom
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
Learning From Single-Expert Annotated Labels for Automatic Sleep Staging  48
Learning From Single-Expert Annotated Labels for Automatic S...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Luan, Zhiheng Ren, Yanzhen Peng, Li Chen, Xiong Yang, Xiuping Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China Wuhan University School of Cyber Science and Engineering China Zhongnan Hospital of Wuhan University Head and Neck Surgery Department of Otorhinolaryngology China Zhongnan Hospital of Wuhan University Sleep Medicine Centre China Wuhan University School of Computer Science China
Existing automatic sleep staging algorithms rely on accurately labeled data. However, due to the subjectivity of sleep experts, accurate labels must be obtained through joint labeling by multiple experts, which result... 详细信息
来源: 评论
SUMI-IFL: An information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints  39
SUMI-IFL: An Information-Theoretic Framework for Image Forge...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao Cao, Xiaochun School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University China State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau Macao School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University China
Image forgery localization (IFL) is a crucial technique for preventing tampered image misuse and protecting social safety. However, due to the rapid development of image tampering technologies, extracting more compreh... 详细信息
来源: 评论
GLCF: A Global-Local Multimodal Coherence Analysis Framework for Talking Face Generation Detection  39
GLCF: A Global-Local Multimodal Coherence Analysis Framework...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Chen, Xiaocan Yin, Qilin Liu, Jiarui Lu, Wei Luo, Xiangyang Zhou, Jiantao School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou 510006 China Alibaba Group Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science Faculty of Science and Technology University of Macau 999078 Macao
Talking face generation (TFG) allows for producing lifelike talking videos of any character using only facial images and accompanying text. Abuse of this technology could pose significant risks to society, creating th... 详细信息
来源: 评论
Towards Evidence-Based Cybersecurity Assessment of Programmable Systems to Ensure the Protection of Critical IT Infrastructure  12
Towards Evidence-Based Cybersecurity Assessment of Programma...
收藏 引用
12th IEEE International Conference on Intelligent Data Acquisition and Advanced computing Systems: Technology and Applications, IDAACS 2023
作者: Illiashenko, Oleg Kharchenko, Vyacheslav Odarushchenko, Oleg National Aerospace University 'KhAI' Department of Computer Systems and Networks Kharkiv61070 Ukraine Institute of Information Science and Technologies 'Alessandro Faedo' - Isti Cnr Software Engineering & Dependable Computing Laboratory Pisa56124 Italy Research and Production Enterprise Rpc Radics Llc Kropyvnytskyi25009 Ukraine
The paper is devoted to developing scientific principles, methods, means, and information technology of model-oriented verification and evidence-based assessment using functional safety and cybersecurity cases for pro... 详细信息
来源: 评论
Cross-Modality Perturbation Synergy Attack for Person Re-identification  38
Cross-Modality Perturbation Synergy Attack for Person Re-ide...
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Gong, Yunpeng Zhong, Zhun Qu, Yansong Luo, Zhiming Ji, Rongrong Jiang, Min School of Informatics Xiamen University China School of Computer Science and Information Engineering Hefei University of Technology China The Department of Artificial Intelligence Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China School of Informatics Key Laboratory of Digital Protection and Intelligent Processing of Intangible CulturalHeritage of Fujian and Taiwan Ministry of Culture and Tourism Xiamen University Fujian Xiamen361005 China
In recent years, there has been significant research focusing on addressing security concerns in single-modal person re-identification (ReID) systems that are based on RGB images. However, the safety of cross-modality...
来源: 评论
GAN you see me? enhanced data reconstruction attacks against split inference  23
GAN you see me? enhanced data reconstruction attacks against...
收藏 引用
Proceedings of the 37th International Conference on Neural information Processing Systems
作者: Ziang Li Mengda Yang Yaxin Liu Juan Wang Hongxin Hu Wenzhe Yi Xiaoyang Xu Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Department of Computer Science and Engineering University at Buffalo SUNY
Split Inference (SI) is an emerging deep learning paradigm that addresses computational constraints on edge devices and preserves data privacy through collaborative edge-cloud approaches. However, SI is vulnerable to ...
来源: 评论