咨询与建议

限定检索结果

文献类型

  • 30 篇 会议
  • 29 篇 期刊文献

馆藏范围

  • 59 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 36 篇 计算机科学与技术...
    • 28 篇 软件工程
    • 15 篇 信息与通信工程
    • 13 篇 电气工程
    • 8 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 光学工程
    • 5 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 生物工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
  • 17 篇 理学
    • 14 篇 数学
    • 3 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 1 篇 化学
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
    • 1 篇 医学技术(可授医学...
  • 1 篇 法学
    • 1 篇 法学

主题

  • 5 篇 speech processin...
  • 4 篇 compressed sensi...
  • 4 篇 magnetic resonan...
  • 4 篇 signal processin...
  • 4 篇 federated learni...
  • 3 篇 deep learning
  • 3 篇 mri reconstructi...
  • 3 篇 optimization
  • 3 篇 graph neural net...
  • 3 篇 feature extracti...
  • 3 篇 biomedical imagi...
  • 3 篇 clustering algor...
  • 3 篇 accuracy
  • 3 篇 sensors
  • 2 篇 antenna arrays
  • 2 篇 equivalence clas...
  • 2 篇 big data
  • 2 篇 face recognition
  • 2 篇 contrastive lear...
  • 2 篇 granular computi...

机构

  • 18 篇 key laboratory o...
  • 12 篇 chongqing key la...
  • 9 篇 chongqing key la...
  • 8 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 key laboratory o...
  • 6 篇 national center ...
  • 5 篇 chongqing key la...
  • 5 篇 college of compu...
  • 4 篇 college of compu...
  • 3 篇 key laboratory o...
  • 3 篇 key laboratory o...
  • 3 篇 chongqing key la...
  • 3 篇 the chongqing ke...
  • 2 篇 school of scienc...
  • 2 篇 chongqing key la...
  • 2 篇 purple mountain ...
  • 2 篇 school of cyber ...
  • 2 篇 emergency depart...
  • 1 篇 department of el...

作者

  • 18 篇 wang guoyin
  • 9 篇 xia shuyin
  • 7 篇 xiao bin
  • 7 篇 li weisheng
  • 6 篇 liu qun
  • 5 篇 qiao xiaoyu
  • 5 篇 weisheng li
  • 5 篇 huang yuping
  • 4 篇 guoyin wang
  • 4 篇 yang lijian
  • 4 篇 lian xiaoyu
  • 4 篇 bin xiao
  • 3 篇 yuping huang
  • 3 篇 xiaoyu qiao
  • 3 篇 gong yihong
  • 3 篇 yu hong
  • 3 篇 gao xinbo
  • 3 篇 zhang qinghua
  • 3 篇 lijian yang
  • 2 篇 shao xiaodan

语言

  • 51 篇 英文
  • 8 篇 其他
检索条件"机构=2Key Laboratory of Cyberspace Big Data Intelligent Security"
59 条 记 录,以下是1-10 订阅
排序:
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 157-175页
作者: Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of EducationChongqing400065China Artificial Intelligence and Big Data College Chongqing Polytechnic University of Electronic TechnologyChongqing401331China
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i... 详细信息
来源: 评论
Accelerated Feature Selection Based on Granular-Ball Rough Sets  11th
Accelerated Feature Selection Based on Granular-Ball Rough ...
收藏 引用
11th International Joint Conference on Rough Sets, IJCRS 2025
作者: Lian, Xiaoyu Xia, Shuyin He, Hongxuan The Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China
Although the existing granular-ball rough set (GBRS) model can use equivalence classes to represent knowledge and can process continuous and discrete data at the same time, it fails to make full use of the information... 详细信息
来源: 评论
Subsampling Decomposition based k-Space Refinement for Accelerated MRI Reconstruction
Subsampling Decomposition based k-Space Refinement for Accel...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
In accelerated MRI reconstruction problem, directly recovering all the missing k-space data from undersampled measurements is highly ill-posed and often leads to suboptimal performance. To address the problem, we prop... 详细信息
来源: 评论
Learning Preconditioners in Gates-controlled Deep Unfolding Networks based on Quasi-Newton Methods For Accelerated MRI Reconstruction
Learning Preconditioners in Gates-controlled Deep Unfolding ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Deep unfolding networks (DUNs) have made significant progress in MRI reconstruction, successfully tackling the problem of prolonged imaging time. However, the ill-conditioned nature of MRI reconstruction often causes ... 详细信息
来源: 评论
Stacking U-Nets in U-shape: Redesigning the Information Flow in Model-based Networks for MRI Reconstruction
Stacking U-Nets in U-shape: Redesigning the Information Flow...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Model-based networks have shown convincing performance in MRI reconstruction. However, the unrolled cascades within the networks are constrained to solely obtain information from the preceding counterpart, resulting i... 详细信息
来源: 评论
CMIF: A Cross-Modal Information Fusion Approach for Molecular Property Prediction  11th
CMIF: A Cross-Modal Information Fusion Approach for Molecul...
收藏 引用
11th International Joint Conference on Rough Sets, IJCRS 2025
作者: Zang, Maoyuan Gong, Xu Han, Rui Liu, Qun Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China
Molecular property prediction is vital in bioinformatics, as accurate and efficient predictions can greatly speed up drug discovery and lower R&D costs. In recent years, the development of deep learning has driven... 详细信息
来源: 评论
A Feature Fusion Network with Multiscale Adaptively Attentional for Object Detection in Complex Traffic Scenes
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on intelligent Vehicles 2024年
作者: Cai, Fei Qu, Zhong Yin, Xuehui Chongqing Key Laboratory of Computational Intelligence The Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education The Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China
Currently, small object detection in complex traffic scenarios remains a major challenge due to variations in object shape, scales, and external environment, as well as a high inter-class similarity. Although the late... 详细信息
来源: 评论
Anatomical Prior Guided Spatial Contrastive Learning for Few-Shot Medical Image Segmentation  24
Anatomical Prior Guided Spatial Contrastive Learning for Few...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Huang, Wendong Hu, Jinwu Bi, Xiuli Xiao, Bin Chongqing Key Laboratory of Image Cognition Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Post and Telecommunications Chongqing China Pazhou Lab School of Software Engineering South China University of Technology Guangzhou China
Few-shot semantic segmentation has considerable potential for low-data scenarios, especially for medical images that require expert-level dense annotations. Existing few-shot medical image segmentation methods strive ... 详细信息
来源: 评论
Auxiliary Attributes-Guided Face Age Estimation  11th
Auxiliary Attributes-Guided Face Age Estimation
收藏 引用
11th International Joint Conference on Rough Sets, IJCRS 2025
作者: You, Fan Zhong, Fujin Yu, Hong Hu, Jun Yang, Yan Liu, Mengqi School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing400065 China
Facial age estimation is a critical task within computer vision, with wide-ranging applications in demographic analysis, video retrieval, and access control. Prior research has highlighted that facial aging is signifi... 详细信息
来源: 评论
PriFU: Capturing Task-Relevant Information Without Adversarial Learning  24
PriFU: Capturing Task-Relevant Information Without Adversari...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Bi, Xiuli Hu, Yang Liu, Bo Li, Weisheng Cosman, Pamela Xiao, Bin Chongqing Key Laboratory of Image Cognition Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing China Department of Electrical and Computer Engineering University of California San Diego San Diego United States
As machine learning advances, machine learning as a service (MLaaS) in the cloud brings convenience to human lives but also privacy risks, as powerful neural networks used for generation, classification or other tasks... 详细信息
来源: 评论