咨询与建议

限定检索结果

文献类型

  • 25 篇 期刊文献
  • 19 篇 会议

馆藏范围

  • 44 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31 篇 工学
    • 17 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 7 篇 信息与通信工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 电气工程
    • 3 篇 控制科学与工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 化学工程与技术
  • 12 篇 理学
    • 7 篇 数学
    • 2 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
    • 1 篇 海洋科学
  • 9 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 5 篇 cryptography
  • 4 篇 public key crypt...
  • 3 篇 deep learning
  • 3 篇 security
  • 3 篇 hardware
  • 2 篇 conferences
  • 2 篇 parallel process...
  • 2 篇 computer archite...
  • 2 篇 smart contract
  • 2 篇 semantics
  • 2 篇 software
  • 2 篇 polynomials
  • 2 篇 explosions
  • 2 篇 single cycle t-f...
  • 1 篇 internet of thin...
  • 1 篇 covid-19
  • 1 篇 few
  • 1 篇 tools
  • 1 篇 algebraic method
  • 1 篇 reliability

机构

  • 11 篇 state key labora...
  • 4 篇 university of ch...
  • 4 篇 school of scienc...
  • 4 篇 key laboratory o...
  • 3 篇 school of comput...
  • 3 篇 department of ma...
  • 3 篇 key laboratory o...
  • 2 篇 college of compu...
  • 2 篇 key laboratory o...
  • 2 篇 key laboratory o...
  • 2 篇 zhejiang police ...
  • 2 篇 key laboratory o...
  • 2 篇 huawei
  • 2 篇 institute of mic...
  • 2 篇 data security go...
  • 2 篇 institute of inf...
  • 2 篇 department of co...
  • 2 篇 international op...
  • 2 篇 college of infor...
  • 2 篇 department of ph...

作者

  • 4 篇 wang yan
  • 3 篇 guan xianglong
  • 3 篇 zhang zhifei
  • 3 篇 chen cui
  • 3 篇 hu yu-pu
  • 3 篇 huang yunyou
  • 3 篇 xiaowei li
  • 3 篇 miao xiuxia
  • 3 篇 ma li
  • 2 篇 jing zhang
  • 2 篇 yuan feng
  • 2 篇 hui yu
  • 2 篇 jing ye
  • 2 篇 yang yang
  • 2 篇 xiaochun ye
  • 2 篇 tang suqin
  • 2 篇 dongrui fan
  • 2 篇 simha sethumadha...
  • 2 篇 weizhi xu
  • 2 篇 da wang

语言

  • 42 篇 英文
  • 2 篇 中文
检索条件"机构=Computer Architecture and Security Technology Laboratory"
44 条 记 录,以下是11-20 订阅
排序:
Discrete Jaya algorithm to solve the police resource deployment problem in emergency traffic accident  10
Discrete Jaya algorithm to solve the police resource deploym...
收藏 引用
10th IEEE Joint International Information technology and Artificial Intelligence Conference, ITAIC 2022
作者: Jing, Zhang Weijie, Ding Zhejiang Police College Department of Computer and Information Security Hangzhou310053 China Big-data and Network Security Research Institute Zhejiang Police College Hangzhou310053 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China
Aiming at the high frequency of urban traffic accidents and the relative shortage of police resources, a multi-objective discrete Jaya algorithm is proposed to solve the problem of police resource deployment in emerge... 详细信息
来源: 评论
An Auto-Parallel Method for Deep Learning Models Based on Genetic Algorithm  29
An Auto-Parallel Method for Deep Learning Models Based on Ge...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zeng, Yan Huang, Chengchuang Ni, Yijie Zhou, Chunbao Zhang, Jilin Wang, Jue Zhou, Mingyao Xue, Meiting Zhang, Yunquan Hangzhou Dianzi University School of Computer Science and Technology Hangzhou310018 China Ministry of Education Key Laboratory for Modeling and Simulation of Complex Systems Hangzhou310018 China Data Security Governance Zhejiang Engineering Research Center Hangzhou310018 China Hangzhou Dianzi University School of ITMO Joint Institute Hangzhou310018 China Institute of Computer Network Information Center of the Chinese Academy of Sciences Beijing100086 China HuaWei China Institute of Computing Technology of the Chinese Academy of Sciences State Key Laboratory of Computer Architecture Beijing100086 China
As the size of datasets and neural network models increases, automatic parallelization methods for models have become a research hotspot in recent years. The existing auto-parallel methods based on machine learning or... 详细信息
来源: 评论
Poseidon: Practical Homomorphic Encryption Accelerator
Poseidon: Practical Homomorphic Encryption Accelerator
收藏 引用
IEEE Symposium on High-Performance computer architecture
作者: Yinghao Yang Huaizhi Zhang Shengyu Fan Hang Lu Mingzhe Zhang Xiaowei Li State Key Laboratory of Computer Architecture Institute of Computing Technology CAS Beijing China University of Chinese Academy of Sciences Beijing China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China Zhongguancun Laboratory Beijing China
With the development of the important solution for privacy computing, the explosion of data size and computing intensity in Fully Homomorphic Encryption (FHE) has brought enormous challenges to the hardware design. In... 详细信息
来源: 评论
Energy-efficient NTT Design with One-bank SRAM and 2-D PE Array
Energy-efficient NTT Design with One-bank SRAM and 2-D PE Ar...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Jianan Mu Huajie Tan Jiawen Wu Haotian Lu Chip-Hong Chang Shuai Chen Shengwen Liang Jing Ye Huawei Li Xiaowei Li State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences CASTEST Tianjin University Nanyang Technological University Rock-Solid Security Lab Fiberhome
In Number Theoretic Transform (NTT) operation, more than half of the active energy consumption stems from memory accesses. Here, we propose a generalized design method to improve the energy efficiency of NTT operation...
来源: 评论
High-speed and long-reach PON employing PM-DQPSK signal and coherent receiver
收藏 引用
Journal of Optical Communications 2023年 第s1期44卷 S97-S105页
作者: Qin, Panke Meng, Hui Zhang, Lei Chen, Guangxuan College of Computer Science and Technology Henan Polytechnic University Henan Jiaozuo454000 China Joint Logistics College National Defence University Beijing100858 China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public Security Zhejiang Police College Zhejiang Hangzhou310053 China
The development of communication technology requires a new type of passive optical network (PON) architecture. The architecture needs to be based on time division multiplexing (TDM) of 40 Gbit/s downstream and 10 Gbit... 详细信息
来源: 评论
Long Text Classification Based on BERT  5
Long Text Classification Based on BERT
收藏 引用
5th IEEE Information technology, Networking, Electronic and Automation Control Conference, ITNEC 2021
作者: Weijie, DIng Yunyi, Li Jing, Zhang Xuchen, Shen Big-data and Network Security Research Institute Zhejiang Police College Hangzhou310053 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China Zhejiang Police College Department of Investigation Hangzhou310053 China Zhejiang Police College Department of Computer and Information Security Hangzhou310053 China Science and Technology Management Section Hangzhou311203 China
Existing text classification algorithms generally have limitations in terms of text length and yield poor classification results for long texts. To address this problem, we propose a BERT-based long text classificatio... 详细信息
来源: 评论
An Auto-Parallel Method for Deep Learning Models Based on Genetic Algorithm
An Auto-Parallel Method for Deep Learning Models Based on Ge...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yan Zeng ChengChuang Huang YiJie Ni ChunBao Zhou JiLin Zhang Jue Wang MingYao Zhou MeiTing Xue YunQuan Zhang School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Key Laboratory for Modeling and Simulation of Complex Systems Ministry of Education Hangzhou China Data Security Governance Zhejiang Engineering Research Center Hangzhou China School of ITMO Joint Institute Hangzhou Dianzi University Hangzhou China Institute of Computer Network Information Center of the Chinese Academy of Sciences Beijing China HuaWei State Key Laboratory of Computer Architecture Institute of Computing Technology of the Chinese Academy of Sciences Beijing China
As the size of datasets and neural network models increases, automatic parallelization methods for models have become a research hotspot in recent years. The existing auto-parallel methods based on machine learning or...
来源: 评论
Software Defect Prediction via Deep Belief Network
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 925-932页
作者: WEI Hua SHAN Chun HU Changzhen ZHANG Yu YU Xiao School of Computer Science and Technology Beijing Institute of Technology China Information Technology Security Evaluation Center Beijing Key Laboratory of Software Security Engineering Technology Beijing Institute of Technology School of Electrical and Information Engineering and Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture State Key Laboratory in China for Geomechanics and Deep Underground Engineering (Beijing) China University of Mining and Technology School of Computer Science and Technology Shandong University of Technology
Defect distribution prediction is a meaningful topic because software defects are the fundamental cause of many attacks and data loss. Building accurate prediction models can help developers find bugs and prioritize t... 详细信息
来源: 评论
OpenAPMax: Abnormal Patterns-based Model for Real-World Alzheimer’s Disease Diagnosis
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Yunyou Guan, Xianglong Lu, Xiangjiang Liang, Xiaoshuang Miao, Xiuxia Xie, Jiyue Liu, Wenjing Ma, Li Tang, Suqin Zhang, Zhifei Zhan, Jianfeng The Key Lab of Education Blockchain and Intelligent Technology Ministry of Education The Guangxi Key Laboratory of Multi-Source Information Mining and Security Guangxi Normal University China The School of Electronic and Information Engineering School of Integrated Circuits Guangxi Normal University Guilin530015 China The Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University China The State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100086 China The Department of Physiology and Pathophysiology Capital Medical University Beijing100069 China The Guilin Medical University Guilin541001 China The Guangxi Key Lab of Multi-Source Information Mining & Security China
Alzheimer’s disease (AD) cannot be reversed, but early diagnosis will significantly benefit patients’ medical treatment and care. In recent works, AD diagnosis has the primary assumption that all categories are know... 详细信息
来源: 评论
Training, testing and benchmarking medical AI models using Clinical AIBench
收藏 引用
BenchCouncil Transactions on Benchmarks, Standards and Evaluations 2022年 第1期2卷 100037-100037页
作者: Huang, Yunyou Miao, Xiuxia Zhang, Ruchang Ma, Li Liu, Wenjing Zhang, Fan Guan, Xianglong Liang, Xiaoshuang Lu, Xiangjiang Tang, Suqing Zhang, Zhifei Guangxi Key Lab of Multi-Source Information Mining & Security School of Computer Science and Engineering & School of Software Guangxi Normal University Guilin China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Guilin Medical University Guilin China Department of Physiology and Pathophysiology Capital Medical University Beijing China Faculty of Education Guangxi Normal University Guilin China International Open Benchmark Council Beijing China
AI technology has been used in many clinical research fields, but most AI technologies are difficult to land in real-world clinical settings. In most current clinical AI research settings, the diagnosis task is to ide... 详细信息
来源: 评论