咨询与建议

限定检索结果

文献类型

  • 310 篇 期刊文献
  • 227 篇 会议
  • 1 册 图书

馆藏范围

  • 538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 364 篇 工学
    • 262 篇 计算机科学与技术...
    • 216 篇 软件工程
    • 64 篇 信息与通信工程
    • 53 篇 控制科学与工程
    • 45 篇 生物工程
    • 44 篇 电气工程
    • 33 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 25 篇 光学工程
    • 25 篇 电子科学与技术(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 13 篇 材料科学与工程(可...
    • 12 篇 交通运输工程
    • 11 篇 仪器科学与技术
    • 10 篇 土木工程
  • 175 篇 理学
    • 72 篇 数学
    • 54 篇 生物学
    • 53 篇 物理学
    • 26 篇 统计学(可授理学、...
    • 23 篇 化学
    • 11 篇 系统科学
  • 100 篇 管理学
    • 58 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 38 篇 医学
    • 31 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 15 篇 药学(可授医学、理...
    • 11 篇 公共卫生与预防医...
  • 26 篇 法学
    • 18 篇 社会学
  • 5 篇 农学
  • 4 篇 经济学
  • 4 篇 教育学
  • 3 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 18 篇 deep learning
  • 18 篇 graph neural net...
  • 16 篇 machine learning
  • 16 篇 blockchain
  • 15 篇 federated learni...
  • 15 篇 privacy
  • 14 篇 semantics
  • 14 篇 training
  • 12 篇 computational mo...
  • 12 篇 accuracy
  • 11 篇 feature extracti...
  • 10 篇 security
  • 9 篇 data privacy
  • 8 篇 object detection
  • 8 篇 scalability
  • 8 篇 deep neural netw...
  • 8 篇 contrastive lear...
  • 8 篇 blockchains
  • 8 篇 adaptation model...
  • 7 篇 recommender syst...

机构

  • 30 篇 key lab of educa...
  • 29 篇 school of comput...
  • 18 篇 guangxi key lab ...
  • 16 篇 guangxi key lab ...
  • 15 篇 school of comput...
  • 12 篇 school of cyber ...
  • 12 篇 institute of art...
  • 11 篇 institute of sci...
  • 11 篇 guangxi normal u...
  • 10 篇 college of compu...
  • 10 篇 zhangjiang fudan...
  • 10 篇 school of comput...
  • 9 篇 zju-hangzhou glo...
  • 9 篇 moe frontiers ce...
  • 9 篇 key lab of educa...
  • 9 篇 zhejiang lab
  • 8 篇 ministry of educ...
  • 8 篇 cas key laborato...
  • 8 篇 school of softwa...
  • 8 篇 deqing alpha inn...

作者

  • 16 篇 fu xingcheng
  • 16 篇 li xianxian
  • 15 篇 li jianxin
  • 15 篇 sun qingyun
  • 11 篇 luo xudong
  • 11 篇 yuan haonan
  • 9 篇 xianxian li
  • 9 篇 gao yisen
  • 9 篇 muhammad adnan k...
  • 8 篇 hao zhou
  • 8 篇 jinyan wang
  • 8 篇 shen yulong
  • 8 篇 wang jinyan
  • 8 篇 dong xuewen
  • 7 篇 jiang yu-gang
  • 7 篇 sagheer abbas
  • 7 篇 qu qiang
  • 7 篇 chunhe xia
  • 7 篇 tianbo wang
  • 6 篇 xian youquan

语言

  • 459 篇 英文
  • 73 篇 其他
  • 10 篇 中文
检索条件"机构=Blockchain Innovation Lab/School of Computer Science and Technology"
538 条 记 录,以下是21-30 订阅
排序:
Nowhere to Hide: Detecting Live Video Forgery via Vision-WiFi Silhouette Correspondence  42
Nowhere to Hide: Detecting Live Video Forgery via Vision-WiF...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Fang, Xinyue Liu, Jianwei Chen, Yike Han, Jinsong Ren, Kui Chen, Gang Zhejiang University School of Cyber Science and Technology China ZJU-Hangzhou Global Scientific and Technological Innovation Center China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China Zhejiang University College of Computer Science and Technology China
For safety guard and crime prevention, video surveillance systems have been pervasively deployed in many security-critical scenarios, such as the residence, retail stores, and banks. However, these systems could be in... 详细信息
来源: 评论
Introducing on-chain graph data to consortium blockchain for commercial transactions
收藏 引用
Frontiers of computer science 2024年 第2期18卷 255-257页
作者: Pengyi ZHANG Yuchen YUAN Jie SONG Yu GU Qiang QU Yongjie BAI Software College Northeastern UniversityShenyang 110819China School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518055China Blockchain Lab Huawei Cloud Computing Technologies Co.Ltd.Shenzhen 518101China
1 Introduction A blockchain can be referred to as a distributed ledger[1].Nowadays,according to our previous work[2],the graphrelated blockchain grows efficiently in both academic studies and commercial *** data,algor... 详细信息
来源: 评论
Boosting Transferability of Adversarial Examples by Joint Training and Dual Feature Mixup
Boosting Transferability of Adversarial Examples by Joint Tr...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Mengmeng Tang Shuhong Chen Guojun Wang Hanjun Li Zhuyi Yao Sheng Wen School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China Blockchain Innovation Lab Swinburne University of Technology Victoria Australia
The transferability of adversarial examples is pivotal in black-box attacks on deep learning models. The existing transfer-based attacks typically rely on a single data augmentation technique, which hampers the divers... 详细信息
来源: 评论
FedDCT: A Dynamic Cross-Tier Federated Learning Framework in Wireless Networks  18th
FedDCT: A Dynamic Cross-Tier Federated Learning Framework in...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Xian, Youquan Gan, Xiaoyun Yao, Chuanjian Li, Dongcheng Wang, Peng Liu, Peng Zhao, Ying Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin54104 China School of Computer Science and Engineering Guangxi Normal University Guilin54104 China School of Business Guilin University of Electronic Technology Guilin54104 China
Federated Learning (FL), as a privacy-preserving machine learning paradigm, trains a global model across devices without exposing local data. However, resource heterogeneity and inevitable stragglers in wireless netwo... 详细信息
来源: 评论
A multiple sensitive attributes data publishing method with guaranteed information utility
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第2期8卷 288-296页
作者: Haibin Zhu Tong Yi Songtao Shang Minyong Shi Zhucheng Li Wenqian Shang Department of Computer Science and Mathematics Nipissing UniversityNorth BayOntarioCanada Key Lab of Education Blockchain and Intelligent Technology Ministry of EducationGuangxi Normal UniversityGuilinChina Guangxi Key Lab of Multi‐Source Information Mining and Security Guangxi Normal UniversityGuilinChina School of Computer and Communication Engineering Zhengzhou University of Light IndustryZhengzhouChina School of Computer Science Communication University of ChinaBeijingChina Business College Beijing Union UniversityBeijingChina
Data publishing methods can provide available information for analysis while preserving *** multiple sensitive attributes data publishing,which preserves the relationship between sensitive attributes,may keep many rec... 详细信息
来源: 评论
Two-Stage, Global-Local Approach for Cell Nuclei Segmentation in Histopathology Images  8
Two-Stage, Global-Local Approach for Cell Nuclei Segmentatio...
收藏 引用
8th IEEE International Conference on Information and Communication technology, CICT 2024
作者: Shakya, Amit Saharan, Revat Gupta, Chetan Kumar, Rupesh Sharma, Lalit Naidu, Srivatsava Murala, Subrahmanyam Arora, Chetan Yamaha Motor Solutions Emerging Technology and Innovation Lab India Indian Institute of Technology Ropar Department of Biomedical Engineering India School of Computer Science and Statistics Trinity College Dublin Ireland Indian Institute of Technology Delhi Department of Computer Science and Engineering India
Effective management of high-resolution, and spatially wide contextual cues is fundamental to the accurate semantic segmentation. Traditional approaches like multi-resolution feature maps, and skip-connection are effe... 详细信息
来源: 评论
BuildEnVR: An Immersive Analysis System for Environmental Field  30
BuildEnVR: An Immersive Analysis System for Environmental Fi...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Zhou, Zhenghan Liu, Kebin Xie, Yantong Jin, Hangxu Liu, Shi Wang, Ruiqing Zhao, Haitian Lin, Borong Mu, Xiaofang Qi, Hui Tsinghua University Global Innovation Exchange China Fuzhou Fuyao Institute for Advanced Study China Carnegie Mellon University School of Architecture United States Tsinghua University School of Architecture China Taiyuan Normal University College of Computer Science and Technology China Shanxi Key Laboratory of Intelligent Optimization Computing and Blockchain Technology China
Amidst global warming and escalating extreme weather events, indoor environmental quality's impact on human health and public hygiene gains prominence. Environmental parameters exist essentially as fields, which a... 详细信息
来源: 评论
CNNRF-Ensemble: A Multifaced Approach For Predicting White Spot Syndrome Virus In Shrimp Farming  4
CNNRF-Ensemble: A Multifaced Approach For Predicting White S...
收藏 引用
4th International Conference on Robotics, Electrical and Signal Processing Techniques, ICREST 2025
作者: Tanvir, Kazi Al Huda, Sadi Opee, Shaiful Ajam Kabir, Sayem Ali, Asraf Bhuiyan, Touhid School of Advanced Sciences Vellore Institute of Technology Department of Mathematics Tamil Nadu Vellore India Department of Computer Science Dhaka Bangladesh Artificial Intelligence Research and Innovation Lab Dhaka Bangladesh School of Information Technology Washington University of Science and Technology AlexandriaVA22314 United States
Shrimp farming has traditionally served as a crucial source of seafood and revenue for coastal countries, filling the rapid growth demand, especially in Bangladesh. However, the White Spot Syndrome Virus(WSSV) creates... 详细信息
来源: 评论
Hyperbolic Geometric Latent Diffusion Model for Graph Generation  41
Hyperbolic Geometric Latent Diffusion Model for Graph Genera...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Fu, Xingcheng Gao, Yisen Wei, Yuecen Sun, Qingyun Peng, Hao Li, Jianxin Li, Xianxian Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Institute of Artificial Intelligence Beihang University Beijing China School of Software Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing School of Computer Science and Engineering Beihang University Beijing China
Diffusion models have made significant contributions to computer vision, sparking a growing interest in the community recently regarding the application of them to graph generation. Existing discrete graph diffusion m... 详细信息
来源: 评论
BackLip: Passphrase-Independent Lip-reading User Authentication with Backscatter Signals  31
BackLip: Passphrase-Independent Lip-reading User Authenticat...
收藏 引用
31st IEEE/ACM International Symposium on Quality of Service, IWQoS 2023
作者: Tian, Ye Zhou, Hao Du, Haohua Xu, Chenren Hou, Jiahui Ren, Dong Li, Xiang-Yang School of Computer Science and Technology University of Science and Technology of China China University of Science and Technology of China Cas Key Lab of Wireless-Optical Communications China USTC-Deqing Alpha Innovation Research Institute Zhejiang China School of Cyber Science and Technology Beihang University China Peking University Department of Computer Science and Technology China
User authentication is essential for threat defense and data protection. Existed authentication systems have some known limitations, such as spoofing attacks, privacy leakage, and user-unfriendliness. In this paper, w... 详细信息
来源: 评论