咨询与建议

限定检索结果

文献类型

  • 108 篇 会议
  • 92 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 201 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 145 篇 工学
    • 114 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 29 篇 信息与通信工程
    • 25 篇 生物工程
    • 13 篇 控制科学与工程
    • 12 篇 电子科学与技术(可...
    • 8 篇 安全科学与工程
    • 8 篇 网络空间安全
    • 7 篇 生物医学工程(可授...
    • 6 篇 机械工程
    • 6 篇 光学工程
    • 6 篇 电气工程
    • 5 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 交通运输工程
  • 71 篇 理学
    • 31 篇 数学
    • 26 篇 生物学
    • 22 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 7 篇 系统科学
    • 6 篇 化学
  • 42 篇 管理学
    • 25 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
  • 3 篇 经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 8 篇 access control
  • 8 篇 trusted computin...
  • 6 篇 semantics
  • 6 篇 cloud computing
  • 5 篇 training
  • 4 篇 indexes
  • 4 篇 authentication
  • 4 篇 hash functions
  • 4 篇 network security
  • 4 篇 quantum cryptogr...
  • 4 篇 cryptography
  • 3 篇 data privacy
  • 3 篇 public key crypt...
  • 3 篇 deep learning
  • 3 篇 side channel att...
  • 3 篇 contrastive lear...
  • 3 篇 computational mo...
  • 3 篇 feature extracti...
  • 3 篇 security
  • 3 篇 protocols

机构

  • 48 篇 beijing key labo...
  • 38 篇 faculty of infor...
  • 20 篇 key laboratory o...
  • 15 篇 college of compu...
  • 13 篇 trusted computin...
  • 12 篇 key laboratory o...
  • 11 篇 school of inform...
  • 11 篇 beijing key labo...
  • 10 篇 national enginee...
  • 9 篇 university of ch...
  • 8 篇 tencent youtu la...
  • 8 篇 guangxi key labo...
  • 8 篇 school of comput...
  • 6 篇 school of medici...
  • 6 篇 beijing key labo...
  • 5 篇 peng cheng labor...
  • 5 篇 china industrial...
  • 5 篇 state key labora...
  • 5 篇 state key labora...
  • 4 篇 national enginee...

作者

  • 18 篇 duan lijuan
  • 14 篇 zhang jianbiao
  • 12 篇 ji rongrong
  • 9 篇 zhang yan
  • 9 篇 zheng xiawu
  • 8 篇 hu runze
  • 8 篇 shen yunhang
  • 8 篇 li xudong
  • 8 篇 li ke
  • 7 篇 lijuan duan
  • 6 篇 liu yutao
  • 6 篇 tu shanshan
  • 6 篇 qiao yuanhua
  • 6 篇 jianbiao zhang
  • 6 篇 feng dengguo
  • 5 篇 zhan jing
  • 5 篇 zheng jingyuan
  • 5 篇 dai pingyang
  • 5 篇 dengguo feng
  • 5 篇 yang zhen

语言

  • 190 篇 英文
  • 8 篇 其他
  • 3 篇 中文
检索条件"机构=Beijing Key Laboratory of Trusted Computing"
201 条 记 录,以下是21-30 订阅
排序:
A Feature-Reconstruction Based Multi-task Learning Model for Sleep Staging
A Feature-Reconstruction Based Multi-task Learning Model for...
收藏 引用
Information Communication and Software Engineering (ICICSE), IEEE International Conference on
作者: Chengyu Zhang Lijuan Duan Bian Ma Zhi Gong Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
Sleep staging plays a significant role in diagnosing sleep-related diseases and assessing sleep quality. Recent years have witnessed a remarkable advancement in deep learning for automatic sleep staging. However, the ... 详细信息
来源: 评论
Integrating Global Context Contrast and Local Sensitivity for Blind Image Quality Assessment  41
Integrating Global Context Contrast and Local Sensitivity fo...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Xudong Hu, Runze Zheng, Jingyuan Zhang, Yan Zhang, Shengchuan Zheng, Xiawu Li, Ke Shen, Yunhang Liu, Yutao Dai, Pingyang Ji, Rongrong Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University 361005 China School of Information and Electronics Beijing Institute of Technology Beijing100080 China School of Medicine Xiamen University China Tencent Youtu Lab China School of Computer Science and Technology Ocean University of China China
Blind Image Quality Assessment (BIQA) mirrors subjective made by human observers. Generally, humans favor comparing relative qualities over predicting absolute qualities directly. However, current BIQA models focus on... 详细信息
来源: 评论
Multi-attribute Context-Aware Item Recommendation Method Based on Deep Learning  5
Multi-attribute Context-Aware Item Recommendation Method Bas...
收藏 引用
5th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2022
作者: Li, Shuxin Duan, Lijuan Zhang, Wenbo Wang, Wenjian Beijing University of Technology Beijing Key Laboratory of Trusted Computing Faculty of Information Technology Beijing China Beijing University of Technology China Natl. Eng. Laboratory for Critical Technologies of Information Security Classified Protection Faculty of Information Technology Beijing China
With the wide application of deep learning in the field of recommendation, item recommendation has gradually become a new hotspot. The existing item recommendation methods ignore the context relationship between multi... 详细信息
来源: 评论
Adaptive Feature Selection for No-Reference Image Quality Assessment by Mitigating Semantic Noise Sensitivity  41
Adaptive Feature Selection for No-Reference Image Quality As...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Xudong Gao, Timin Hu, Runze Zhang, Yan Zhang, Shengchuan Zheng, Xiawu Zheng, Jingyuan Shen, Yunhang Li, Ke Liu, Yutao Dai, Pingyang Ji, Rongrong Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University 361005 China School of Information and Electronics Beijing Institute of Technology Beijing100080 China School of Medicine Xiamen University China Tencent Youtu Lab China School of Computer Science and Technology Ocean University of China China
The current state-of-the-art No-Reference Image Quality Assessment (NR-IQA) methods typically rely on feature extraction from upstream semantic backbone networks, assuming that all extracted features are relevant. How... 详细信息
来源: 评论
A research framework for constructing the knowledge database of public security information
收藏 引用
International Journal of Wireless and Mobile computing 2021年 第3期21卷 191-197页
作者: Zhong, Han Zhang, Shiqiang Liu, Jianli College of Information Technology and Network Security People’s Public Security University of China Xicheng Beijing China Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China
At present, the public security organs in China have accumulated a great deal of public security data. These data have broad sources, complex structures, large and increasing scales. How to effectively integrate, mana... 详细信息
来源: 评论
Participant attack on the deterministic measurement-device-independent quantum secret sharing protocol
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2021年 第6期64卷 121-124页
作者: Yu-Guang Yang Yue-Chao Wang Yong-Li Yang Xiu-Bo Chen Dan Li Yi-Hua Zhou Wei-Min Shi Faculty of Information Technology Beijing University of TechnologyBeijing 100124China Beijing Key Laboralory of Trusted Computing Beijing 100124China Guangxi Key Laboratory of Crptography and Information Security Guilin 541004China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing 100876China College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing 211106China
In a recent article[Gao et al.,***.63,120311(2020)],a two-receiver measurement-deviceindependent quantum secret sharing(MDI-QSS)protocol was *** was proven to be secure against eavesdropping and generalized to the mul... 详细信息
来源: 评论
Boosting CLIP Adaptation for Image Quality Assessment via Meta-Prompt Learning and Gradient Regularization
arXiv
收藏 引用
arXiv 2024年
作者: Li, Xudong Huang, Zihao Hu, Runze Zhang, Yan Cao, Liujuan Ji, Rongrong Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University China School of Information and Electronics Beijing Institute of Technology China
Image Quality Assessment (IQA) remains an unresolved challenge in the field of computer vision, due to complex distortion conditions, diverse image content, and limited data availability. The existing Blind IQA (BIQA)... 详细信息
来源: 评论
Dmscts: Dynamic Measurement Scheme for the Containers-Hybrid-Deployment Based on trusted Subsystem
SSRN
收藏 引用
SSRN 2024年
作者: Han, Yufei Li, Chao Jianbiao, Zhang Wang, Yifan Yu, Lehao Cao, Yihao Shen, Hong Hou, Weixing Luo, Hailin College of Computer Science Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China Ant Group China The School of Engineering and Technology Central Queensland University Australia
The hybrid deployment of containers with different kernel types offers a novel solution for cloud service providers. While extensive research has been conducted on shared kernel containers, the security risks associat... 详细信息
来源: 评论
A federated sleep staging method based on adaptive re-aggregation and double prototype-contrastive using single-channel electroencephalogram
收藏 引用
Engineering Applications of Artificial Intelligence 2025年 156卷
作者: Ma, Bian Duan, Lijuan Huang, Zhaoyang Qiao, Yuanhua College of Computer Science Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China Department of Neurology Xuanwu Hospital Capital Medical University Beijing100053 China Beijing Key Laboratory of Neuromodulation Beijing100053 China School of Mathematics Statistics and Mechanics Beijing University of Technology Beijing100124 China
The limited availability of sleep data collected by individual institutions poses a significant challenge in developing automatic sleep staging models, especially given that most existing models rely heavily on data-d... 详细信息
来源: 评论
Multi-Granular Multimodal Clue Fusion for Meme Understanding  39
Multi-Granular Multimodal Clue Fusion for Meme Understanding
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zheng, Li Fei, Hao Dai, Ting Peng, Zuquan Li, Fei Ma, Huisheng Teng, Chong Ji, Donghong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China National University of Singapore Singapore Singapore Laboratory for Advanced Computing and Intelligence Engineering Wuxi China North China Institute of Computing Technology beijing China
With the continuous emergence of various social media platforms frequently used in daily life, the multimodal meme understanding (MMU) task has been garnering increasing attention. MMU aims to explore and comprehend t... 详细信息
来源: 评论