咨询与建议

限定检索结果

文献类型

  • 73 篇 期刊文献
  • 29 篇 会议

馆藏范围

  • 102 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 61 篇 计算机科学与技术...
    • 55 篇 软件工程
    • 25 篇 电气工程
    • 17 篇 信息与通信工程
    • 13 篇 生物工程
    • 12 篇 生物医学工程(可授...
    • 9 篇 控制科学与工程
    • 7 篇 光学工程
    • 5 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 环境科学与工程(可...
  • 44 篇 理学
    • 22 篇 数学
    • 14 篇 生物学
    • 7 篇 系统科学
    • 7 篇 统计学(可授理学、...
    • 4 篇 物理学
    • 3 篇 化学
  • 18 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 9 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 6 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 3 篇 药学(可授医学、理...
  • 5 篇 法学
    • 4 篇 社会学
  • 3 篇 教育学
    • 3 篇 教育学
  • 1 篇 经济学
  • 1 篇 文学

主题

  • 4 篇 semantics
  • 4 篇 feature extracti...
  • 3 篇 image fusion
  • 3 篇 deep learning
  • 3 篇 speech processin...
  • 3 篇 convolution
  • 3 篇 authentication p...
  • 3 篇 encryption
  • 3 篇 forecasting
  • 3 篇 privacy
  • 3 篇 deep reinforceme...
  • 2 篇 image enhancemen...
  • 2 篇 conferences
  • 2 篇 object detection
  • 2 篇 knowledge manage...
  • 2 篇 lighting
  • 2 篇 servers
  • 2 篇 graph neural net...
  • 2 篇 benchmark testin...
  • 2 篇 blockchain

机构

  • 10 篇 engineering rese...
  • 10 篇 shanghai key lab...
  • 10 篇 key laboratory o...
  • 10 篇 school of comput...
  • 8 篇 key laboratory o...
  • 7 篇 school of cyber ...
  • 6 篇 cyberspace secur...
  • 5 篇 northeastern uni...
  • 5 篇 shandong provinc...
  • 5 篇 institute of inf...
  • 4 篇 northeastern uni...
  • 3 篇 shandong key lab...
  • 3 篇 shanghai institu...
  • 3 篇 school of comput...
  • 3 篇 national yunlin ...
  • 3 篇 school of inform...
  • 3 篇 school of cybers...
  • 3 篇 shandong fundame...
  • 3 篇 university of el...
  • 3 篇 school of artifi...

作者

  • 11 篇 fu chong
  • 8 篇 mahmood khalid
  • 7 篇 das ashok kumar
  • 6 篇 zou juan
  • 6 篇 zhenfu cao
  • 5 篇 wang xingwei
  • 5 篇 guohua lv
  • 5 篇 sham chiu-wing
  • 5 篇 jiachen shen
  • 4 篇 dong xiaolei
  • 4 篇 dong jing
  • 4 篇 wang wei
  • 4 篇 zhang wenchao
  • 4 篇 cao zhenfu
  • 4 篇 xu qianqian
  • 4 篇 xia yizhang
  • 3 篇 hou zhanglu
  • 3 篇 zhang lei
  • 3 篇 li xiong
  • 3 篇 yang shengxiang

语言

  • 86 篇 英文
  • 16 篇 其他
  • 1 篇 中文
检索条件"机构=Center of Intelligent Computing and Security Research"
102 条 记 录,以下是11-20 订阅
排序:
A Systematic Review: The Utilization of Artificial Intelligence in Forensic Odontology
A Systematic Review: The Utilization of Artificial Intellige...
收藏 引用
International Conference on Computer, Control, Informatics and Its Applications (IC3INA)
作者: Muhamad Rodhi Supriyadi Azurah Bte A Samah Hairudin Abdul Majid Jemie Muliadi National Research and Innovation Agency Universiti Teknologi Malaysia Bandung Indonesia Faculty of Computing Universiti Teknologi Malaysia Johor Malaysia Research Center for Artificial Intelligent and Cyber Security National Research and Innovation Agency Bandung Indonesia
The use of Artificial Intelligence (AI) in forensic odontology signifies a significant change, with the potential to improve the precision, effectiveness, and dependability of forensic investigations mostly focused on... 详细信息
来源: 评论
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
收藏 引用
IEEE Access 2023年 11卷 74000-74020页
作者: Javed, Safdar Hussain Ahmad, Maaz Bin Asif, Muhammad Akram, Waseem Mahmood, Khalid Das, Ashok Kumar Shetty, Sachin College of Computing and Information Sciences Karachi75190 Pakistan Lahore Garrison University Department of Computer Science Lahore54810 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan International Institute of Information Technology at Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center Department of Modeling SuffolkVA23435 United States Old Dominion University Center for Cybersecurity Education and Research SuffolkVA23435 United States
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) t... 详细信息
来源: 评论
Unified Polarimetric Method for Cross-domain Face Attacks Detection  2
Unified Polarimetric Method for Cross-domain Face Attacks De...
收藏 引用
2nd International Conference on Algorithms, Microchips, and Network Applications, AMNA 2023
作者: Huang, Yalin Tian, Yu Zhang, Kunbo Zhang, Kaiyue Sun, Zhenan Hunan University of Technology No.88 Taishan W. Rd Tianyuan District Hunan Province Zhuzhou City China Institute of Automation Chinese Academy of Sciences Center for Research on Intelligent Perception and Computing No.95 Zhongguancun E. Rd Haidian District Beijing China Beijing Institute of Technology No.5 Zhongguancun S. St Haidian District Beijing China Shanghai Engineering Research Center of Cyber and Information Security Evaluation The Third Research Institute of Ministry of Public Security China
Face spoofing detection techniques have performed well in the digital and physical domains separately. However, existing methods do not work well when both types of spoofing attacks need to be resisted at the same tim... 详细信息
来源: 评论
A Provably Secure and Lightweight Access Control Protocol for EI-Based Vehicle to Grid Environment
收藏 引用
IEEE Internet of Things Journal 2023年 第18期10卷 16650-16657页
作者: Shamshad, Salman Mahmood, Khalid Shamshad, Usman Hussain, Ibrar Hussain, Shafiq Das, Ashok Kumar The University of Lahore Department of Software Engineering Lahore54590 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan Riphah International University Riphah School of Computing and Innovation Lahore54000 Pakistan University of Sahiwal Department of Computer Science Sahiwal57000 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Virginia Modeling Analysis and Simulation Center SuffolkVA23435 United States
The energy Internet (EI) presents a novel paradigm for renewable energy distribution that utilizes communication and computing technologies to revolutionize the conventional intelligent transportation systems (ITSs) a... 详细信息
来源: 评论
Mirror contrastive loss based sliding window transformer for subject-independent motor imagery based EEG signal recognition
arXiv
收藏 引用
arXiv 2024年
作者: Luo, Jing Mao, Qi Shi, Weiwei Shi, Zhenghao Wang, Xiaofan Lu, Xiaofeng Hei, Xinhong Shaanxi Key Laboratory for Network Computing and Security Technology and Human–Machine Integration Intelligent Robot Shaanxi University Engineering Research Center School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an China
While deep learning models have been extensively utilized in motor imagery based EEG signal recognition, they often operate as black boxes. Motivated by neurological findings indicating that the mental imagery of left... 详细信息
来源: 评论
A survey on cryptographic techniques for protecting big data security: present and forthcoming
收藏 引用
Science China(Information Sciences) 2022年 第10期65卷 73-106页
作者: Siqi LU Jianhua ZHENG Zhenfu CAO Yongjuan WANG Chunxiang GU School of Cyberspace Security Information Engineering University Henan Key Laboratory of Network Cryptography Technology Institute of Security Technology Shanghai Key Laboratory of Trustworthy Computing East China Normal University Cyberspace Security Research Center Peng Cheng Laboratory Shanghai Institute of Intelligent Science and Technology Tongji University
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they significantly create economic and social value, big data meaningfully impact... 详细信息
来源: 评论
Automatic skin lesion classification using a novel densely connected convolutional network integrated with an attention module
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2023年 第7期14卷 8943-8956页
作者: Shan, Pufang Chen, Jialei Fu, Chong Cao, Lin Tie, Ming Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China Science and Technology on Space Physics Laboratory Beijing100076 China School of Computer Science The University of Auckland Auckland New Zealand
Automated skin lesion classification in dermoscopy images remains challenging due to the existence of artefacts and intrinsic cutaneous features, diversity of lesion morphology, insufficiency of training data, and cla... 详细信息
来源: 评论
An Efficient Energy Consumption Prediction Framework for High Performance computing Cluster Jobs
An Efficient Energy Consumption Prediction Framework for Hig...
收藏 引用
International Conference on Computer Engineering and Applications (ICCEA)
作者: Yantao Lou Jibin Wang Shoupeng Feng Xian Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Public Security of Shandong Province Shandong Intelligent Public Security Technology Innovation Center Jinan China
Energy consumption prediction is a crucial approach to enhance the operational efficiency of HPC (High Performance computing) clusters. Existing predicting methods for the energy consumption mainly rely on time series... 详细信息
来源: 评论
Event-Guided Attention Network for Low Light Image Enhancement
Event-Guided Attention Network for Low Light Image Enhanceme...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Qiaobin Wang Haiyan Jin Haonan Su Zhaolin Xiao Department of Computer Science and Engineering Engineering Research Center Shaanxi Key Laboratory for Network Computing and Security Technology Human-Machine Integration Intelligent Robot Shaanxi University Xi'an University of Technology
In the low-light conditions, images are corrupted by low contrast and severe noise, but event cameras can capture event streams with clear edge structures. Therefore, we propose an Event-Guided Attention Network for L...
来源: 评论
Mirror Contrastive Loss Based Sliding Window Transformer for Subject-Independent Motor Imagery Based EEG Signal Recognition  4th
Mirror Contrastive Loss Based Sliding Window Transformer for...
收藏 引用
4th International Workshop on Human Brain and Artificial Intelligence, HBAI 2024
作者: Luo, Jing Mao, Qi Shi, Weiwei Shi, Zhenghao Wang, Xiaofan Lu, Xiaofeng Hei, Xinhong Shaanxi Key Laboratory for Network Computing and Security Technology and Human–Machine Integration Intelligent Robot Shaanxi University Engineering Research Center School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an China
While deep learning models have been extensively utilized in motor imagery based EEG signal recognition, they often operate as black boxes. Motivated by neurological findings indicating that the mental imagery of left... 详细信息
来源: 评论