咨询与建议

限定检索结果

文献类型

  • 154 篇 期刊文献
  • 124 篇 会议

馆藏范围

  • 278 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 173 篇 工学
    • 127 篇 计算机科学与技术...
    • 107 篇 软件工程
    • 41 篇 信息与通信工程
    • 34 篇 电气工程
    • 24 篇 生物工程
    • 15 篇 控制科学与工程
    • 14 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 网络空间安全
    • 7 篇 土木工程
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
  • 65 篇 理学
    • 28 篇 数学
    • 27 篇 生物学
    • 10 篇 物理学
    • 7 篇 化学
    • 7 篇 统计学(可授理学、...
  • 37 篇 管理学
    • 22 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 11 篇 法学
    • 7 篇 社会学
    • 5 篇 法学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 6 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 11 篇 semantics
  • 10 篇 data privacy
  • 9 篇 feature extracti...
  • 9 篇 federated learni...
  • 9 篇 privacy
  • 8 篇 deep learning
  • 8 篇 training
  • 7 篇 codes
  • 7 篇 open source soft...
  • 6 篇 deep neural netw...
  • 6 篇 signal processin...
  • 5 篇 software enginee...
  • 5 篇 speech processin...
  • 5 篇 machine learning
  • 5 篇 security
  • 5 篇 transforms
  • 5 篇 accuracy
  • 4 篇 object detection
  • 4 篇 scalability
  • 4 篇 prototypes

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of cyber ...
  • 41 篇 school of comput...
  • 32 篇 national enginee...
  • 32 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 17 篇 school of inform...
  • 16 篇 huazhong univers...
  • 15 篇 huazhong univers...
  • 13 篇 shenzhen huazhon...
  • 12 篇 jinyinhu laborat...
  • 10 篇 key laboratory o...
  • 9 篇 national enginee...
  • 8 篇 college of compu...
  • 7 篇 nanyang technolo...
  • 6 篇 national key lab...
  • 6 篇 national enginee...

作者

  • 37 篇 jin hai
  • 30 篇 hai jin
  • 23 篇 hu shengshan
  • 17 篇 zhang leo yu
  • 17 篇 zhou pan
  • 16 篇 zou deqing
  • 14 篇 deqing zou
  • 13 篇 wang haoyu
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 10 篇 wan wei
  • 10 篇 deng xianjun
  • 9 篇 xianjun deng
  • 8 篇 li zhen
  • 8 篇 lu songfeng
  • 8 篇 liu daizong
  • 8 篇 xu shouhuai
  • 8 篇 zhao yanjie
  • 8 篇 shengshan hu
  • 7 篇 shenghao liu

语言

  • 255 篇 英文
  • 22 篇 其他
  • 1 篇 中文
检索条件"机构=Data Science and System Security"
278 条 记 录,以下是31-40 订阅
排序:
An Image Semantic Communication system Based on GAN and Relative Position-Encoding
收藏 引用
IEEE Communications Letters 2025年
作者: Zhang, Ziqi Tan, Weijie Li, Chunguo Guizhou University College of Big Data and Information Engineering Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptography Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
In image semantic communication, the complex wireless channel environment leads to the loss of image details and performance degradation during transmission. To address this issue, we propose an image semantic communi... 详细信息
来源: 评论
Multimodal Dialogue Emotion Recognition Based on Label Optimization and Coarse-Grained Assisted Fine-Grained
Multimodal Dialogue Emotion Recognition Based on Label Optim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhibo Zhang Zhenyu Yang Yan Huang Baojie Xu Wenyue Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China
Multimodal dialogue emotion recognition integrates data from multiple modalities to accurately identify emotional states in conversations. However, differences in expression and information density across modalities c... 详细信息
来源: 评论
Provably Secure Authenticated Key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collaboratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Iterative Feature Space Optimization through Incremental Adaptive Evaluation
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Yanping Huang, Yanyong Chen, Zhengzhang Yao, Zijun Fu, Yanjie Liu, Kunpeng Luo, Xiao Wang, Dongjie University of Kansas Department of Electrical Engineering and Computer Science United States Southwestern University of Finance and Economics Department of Statistics China NEC Laboratories America Data Science and System Security United States Arizona State University Department of Computing and Augmented Intelligence United States Portland State University Department of Computer Science United States University of California Los Angeles Department of Computer Science United States
Iterative feature space optimization involves systematically evaluating and adjusting the feature space to improve downstream task performance. However, existing works suffer from three key limitations: 1) overlooking... 详细信息
来源: 评论
Robust Dynamic Broadcasting for Multi-Hop Wireless Networks Under Time-Varying Connectivity and Dynamic SINR
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Tian, Xiang Yu, Jiguo Luo, Chuanwen Yu, Dongxiao Wang, Guijuan Feng, Bin Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Beijing Forestry University School of Information Science and Technology Beijing100083 China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Taishan University School of Information Science and Technology 271000 China
Throughput-optimal dynamic broadcasting is an essential cornerstone for the efficient operation of Multi-hop Wireless Networks (MWNs). Most existing algorithms for this problem were developed assuming static interfere... 详细信息
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qing Liu Qian Gao Jun Fan Zhiqiang Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China China Telecom Digital Intelligence Techonology Co Ltd Jinan China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
A Bibliometric and Social Media Analysis of the Nexus Between Blockchain Technology and Finance  2nd
A Bibliometric and Social Media Analysis of the Nexus Betwee...
收藏 引用
2nd International Conference on Intelligent Manufacturing and Robotics, ICIMR 2024
作者: Ayodele, Olamide Emmanuel Ajibade, Temiloluwa Iyanuoluwa Oyebode, Oluwadare Joshua Akintoye, Kayode Akinlekan Ajayi, Babatunde Adedotun Adediran, Anthonia Oluwatosin Ajibade, Samuel-Soma M. Majeed, Anwar P. P. Abdul Luo, Yang Department of Banking and Finance Ekiti State University Ekiti State Ado Ekiti Nigeria Department of Business Management Scholar School System Birmingham United Kingdom Civil and Environmental Engineering Afe Babalola University Ekiti State Ado Ekiti Nigeria Department of Computer Science The Federal Polytechnic Ekiti State Ado Ekiti Nigeria Department of Cyber Security Faculty of Computing and Informatics Ladoke Akintola University of Technology Ogbomoso Nigeria Department of Real Estate Faculty of Built Environment Universiti Malaya KL Kuala Lumpur Malaysia Department of Data Science and Artificial Intelligence Faculty of Engineering and Technology Sunway University Selangor Malaysia Department of Computer Engineering Istanbul Ticaret University Istanbul Turkey Suzhou Taicang215400 China
This study explores Blockchain technology in the global financial industry using trends analysis, bibliometric analysis, and a literature appraisal using Elsevier Scopus data from 2016 to 2023. The Blockchain in Finan... 详细信息
来源: 评论