咨询与建议

限定检索结果

文献类型

  • 154 篇 期刊文献
  • 124 篇 会议

馆藏范围

  • 278 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 173 篇 工学
    • 127 篇 计算机科学与技术...
    • 107 篇 软件工程
    • 41 篇 信息与通信工程
    • 34 篇 电气工程
    • 24 篇 生物工程
    • 15 篇 控制科学与工程
    • 14 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 网络空间安全
    • 7 篇 土木工程
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
  • 65 篇 理学
    • 28 篇 数学
    • 27 篇 生物学
    • 10 篇 物理学
    • 7 篇 化学
    • 7 篇 统计学(可授理学、...
  • 37 篇 管理学
    • 22 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 11 篇 法学
    • 7 篇 社会学
    • 5 篇 法学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 6 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 11 篇 semantics
  • 10 篇 data privacy
  • 9 篇 feature extracti...
  • 9 篇 federated learni...
  • 9 篇 privacy
  • 8 篇 deep learning
  • 8 篇 training
  • 7 篇 codes
  • 7 篇 open source soft...
  • 6 篇 deep neural netw...
  • 6 篇 signal processin...
  • 5 篇 software enginee...
  • 5 篇 speech processin...
  • 5 篇 machine learning
  • 5 篇 security
  • 5 篇 transforms
  • 5 篇 accuracy
  • 4 篇 object detection
  • 4 篇 scalability
  • 4 篇 prototypes

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of cyber ...
  • 41 篇 school of comput...
  • 32 篇 national enginee...
  • 32 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 16 篇 huazhong univers...
  • 15 篇 huazhong univers...
  • 13 篇 shenzhen huazhon...
  • 12 篇 jinyinhu laborat...
  • 10 篇 key laboratory o...
  • 9 篇 national enginee...
  • 8 篇 college of compu...
  • 7 篇 nanyang technolo...
  • 6 篇 national key lab...
  • 6 篇 national enginee...

作者

  • 37 篇 jin hai
  • 30 篇 hai jin
  • 23 篇 hu shengshan
  • 17 篇 zhang leo yu
  • 17 篇 zhou pan
  • 16 篇 zou deqing
  • 14 篇 deqing zou
  • 13 篇 wang haoyu
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 10 篇 wan wei
  • 10 篇 deng xianjun
  • 9 篇 xianjun deng
  • 8 篇 li zhen
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 xu shouhuai
  • 8 篇 zhao yanjie
  • 8 篇 shengshan hu
  • 7 篇 shenghao liu

语言

  • 255 篇 英文
  • 22 篇 其他
  • 1 篇 中文
检索条件"机构=Data Science and System Security"
278 条 记 录,以下是91-100 订阅
排序:
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion  10
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Gu, Qiliang Lu, Qin Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
Application Research of Vertical Federated Learning Technology in Banking Risk Control Model Strategy  21
Application Research of Vertical Federated Learning Technolo...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Luo, Yong Lu, Zhi Yin, Xiaofei Lu, Songfeng Weng, Yiting Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China China Minsheng Banking Corp. Ltd. Beijing China Shenzhen Huazhong University of Science and Technology Research Institute Wuhan China Shu Lun Pan Beijing China
This study centers on the application of vertical federated learning technology in the context of Internet banking loans, with a particular focus on innovations in data privacy protection, risk control model algorithm... 详细信息
来源: 评论
VG-Net: Sensor Time Series Anomaly Detection with Joint Variational Autoencoder and Graph Neural Network  10
VG-Net: Sensor Time Series Anomaly Detection with Joint Vari...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Wang, Shuai Liu, Shenghao Fan, Xiaoxuan Wang, Haijun Zhou, Yinxin Gao, Hanjun Lu, Hongwei Deng, Xianjun Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Hunan Technical College of Railway High-speed China Nanjing University of Posts and Telecommunications China China National Nuclear Power Co Ltd China
Intelligent Cyber-Physical systems typically utilize sensors to gather a significant amount of raw data which often possesses temporal and high-dimensional characteristics. Ensuring the data reliability is crucial for... 详细信息
来源: 评论
Decentralized generation of multiple, uncorrelatable pseudonyms without trusted third parties
Decentralized generation of multiple, uncorrelatable pseudon...
收藏 引用
Lecture Notes in Computer science
作者: Lehnhardt, Jan Spalka, Adrian CompuGroup Medical Software GmbH Dept. of Data Security and System Architecture Maria Trost 23 Koblenz 56070 Germany University of Bonn Dept. of Computer Science III Römerstr. 164 53117 Bonn Germany
Regarding the increasing number of applications provided as external services, the importance of pseudonymous data as a means for privacy protection of user entities is growing. Along with it grows the relevance of se... 详细信息
来源: 评论
An end-to-end repair-based joint training framework for weakly supervised pavement crack segmentation
收藏 引用
Multimedia Tools and Applications 2024年 1-19页
作者: Zhou, Hui Tao, Huanjie Duan, Qianyue Hu, Zhenwu Deng, Yishi School of Computer Science Northwestern Polytechnical University Xi’an710129 China School of Cyberspace Security Northwestern Polytechnical University Xi’an710129 China Engineering Research Center of Embedded System Integration Ministry of Education Xi’an710129 China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Xi’an710129 China
Weakly supervised pavement crack segmentation aims to assign each pixel of pavement surface images a category label (crack or non-crack) using limited annotation information. Most existing methods adopt the multi-stag... 详细信息
来源: 评论
Self-feedback LSTM regression model for real-time particle source apportionment
收藏 引用
Journal of Environmental sciences 2022年 第4期34卷 10-20页
作者: Wei Wang Weiman Xu Shuai Deng Yimeng Chai Ruoyu Ma Guoliang Shi Bo Xu Mei Li Yue Li Trusted AI System Laboratory College of Computer ScienceNankai UniversityTianjin 300350China KLMDASR Tianjin Key Laboratory of Network and Data Security TechnologyTianjin 300350China State Environmental Protection Key Laboratory of Urban Ambient Air Particulate Matter Pollution Prevention and Control College of Environmental Science and EngineeringNankai UniversityTianjin 300071China Institute of Mass Spectrometry and Atmospheric Environment Guangdong Provincial Engineering Research Center for on-line source apportionment system of air pollution Jinan UniversityGuangzhou 510632China Guangdong-Hongkong-Macao Joint Laboratory of Collaborative Innovation for Environmental Quality Guangzhou 510632China
Atmospheric particulate matter pollution has attracted much wider attention *** recent years,the development of atmospheric particle collection techniques has put forwards new demands on the real-time source apportion... 详细信息
来源: 评论
V3H: View Variation and View Heredity for Incomplete Multiview Clustering
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2020年 第3期1卷 233-247页
作者: Fang, Xiang Hu, Yuchong Zhou, Pan Wu, Dapeng Oliver The School of Computer Science and Technology Key Laboratory of Information Storage System Ministry of Education of China Huazhong University of Science and Technology Wuhan 430074 China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan 430074 China The Department of Electrical and Computer Engineering University of Florida Gainesville 32611 FL United States
Real data often appear in the form of multiple incomplete views. Incomplete multiview clustering is an effective method to integrate these incomplete views. Previous methods only learn the consistent information betwe... 详细信息
来源: 评论
Attribute-Based data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation system
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论
G2G: Generalized Learning by Cross-Domain Knowledge Transfer for Federated Domain Generalization
G2G: Generalized Learning by Cross-Domain Knowledge Transfer...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xinqian Chen Jin Zhang Xiaoli Gong College of Computer Science Nankai University China Key Lab of Data and Intelligent System Security Ministry of Education China
We propose G2G, based on the global model of Generalized learning to solve the Federated Domain Generalization (FedDG) task. FedDG aims to collaboratively train a global model that can directly generalize to the unsee...
来源: 评论
A Client Selection Method Based on Loss Function Optimization for Federated Learning
收藏 引用
Computer Modeling in Engineering & sciences 2023年 第10期137卷 1047-1064页
作者: Yan Zeng Siyuan Teng Tian Xiang Jilin Zhang Yuankai Mu Yongjian Ren Jian Wan School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China Key Laboratory of Complex System Modeling and Simulation Ministry of EducationHangzhou310018China Zhejiang Engineering Research Center of Data Security Governance Hangzhou310018China Intelligent Robotics Research Center Zhejiang LabHangzhou311100China HDU-ITMO Joint Institute Hangzhou Dianzi UniversityHangzhou310018China
Federated learning is a distributedmachine learningmethod that can solve the increasingly serious problemof data islands and user data privacy,as it allows training data to be kept locally and not shared with other **... 详细信息
来源: 评论