咨询与建议

限定检索结果

文献类型

  • 166 篇 期刊文献
  • 133 篇 会议

馆藏范围

  • 299 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 214 篇 工学
    • 169 篇 计算机科学与技术...
    • 138 篇 软件工程
    • 49 篇 信息与通信工程
    • 37 篇 电气工程
    • 32 篇 控制科学与工程
    • 32 篇 生物工程
    • 20 篇 光学工程
    • 16 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 10 篇 建筑学
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 8 篇 机械工程
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
    • 5 篇 材料科学与工程(可...
    • 5 篇 动力工程及工程热...
    • 5 篇 交通运输工程
  • 99 篇 理学
    • 59 篇 数学
    • 32 篇 生物学
    • 18 篇 物理学
    • 16 篇 统计学(可授理学、...
    • 12 篇 化学
  • 49 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 13 篇 法学
    • 10 篇 社会学
  • 13 篇 医学
    • 9 篇 基础医学(可授医学...
    • 9 篇 临床医学
    • 5 篇 公共卫生与预防医...
  • 3 篇 农学
  • 2 篇 经济学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 21 篇 feature extracti...
  • 12 篇 semantics
  • 12 篇 federated learni...
  • 11 篇 training
  • 9 篇 deep learning
  • 8 篇 data mining
  • 8 篇 computational mo...
  • 7 篇 contrastive lear...
  • 6 篇 accuracy
  • 5 篇 internet of thin...
  • 5 篇 data privacy
  • 5 篇 task analysis
  • 5 篇 recommender syst...
  • 5 篇 education
  • 5 篇 convolution
  • 5 篇 graph neural net...
  • 5 篇 machine learning
  • 5 篇 network security
  • 5 篇 artificial intel...
  • 5 篇 data models

机构

  • 23 篇 college of compu...
  • 21 篇 engineering rese...
  • 18 篇 fujian key labor...
  • 17 篇 fujian key labor...
  • 17 篇 state key labora...
  • 11 篇 fujian provincia...
  • 11 篇 department of ar...
  • 9 篇 shandong provinc...
  • 8 篇 department of co...
  • 8 篇 fujian key labor...
  • 8 篇 key laboratory o...
  • 7 篇 shandong enginee...
  • 7 篇 institute of inf...
  • 7 篇 school of cyber ...
  • 7 篇 xiamen key labor...
  • 7 篇 fujian provincia...
  • 6 篇 fujian provincia...
  • 6 篇 school of inform...
  • 6 篇 school of comput...
  • 6 篇 school of comput...

作者

  • 13 篇 wang guoyin
  • 12 篇 jinbo xiong
  • 12 篇 shaozi li
  • 12 篇 xiong jinbo
  • 10 篇 li shaozi
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 9 篇 yu xiehua
  • 9 篇 xiehua yu
  • 8 篇 zhiming luo
  • 7 篇 zhang hong-bo
  • 6 篇 du ji-xiang
  • 6 篇 lei qing
  • 6 篇 luo zhiming
  • 6 篇 liu ximeng
  • 5 篇 xia shuyin
  • 5 篇 xue xingsi
  • 5 篇 qing lei
  • 5 篇 zhou jianjun
  • 5 篇 xu li

语言

  • 282 篇 英文
  • 13 篇 其他
  • 10 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Fujian Key Laboratory of Big Data Intelligence and Security"
299 条 记 录,以下是81-90 订阅
排序:
PON: Proposal Optimization Network for Temporal Action Proposal Generation  16th
PON: Proposal Optimization Network for Temporal Action Propo...
收藏 引用
16th International Conference on Intelligent Computing, ICIC 2020
作者: Peng, Xiaoxiao Du, Jixiang Zhang, Hongbo Department of Computer Science and Technology Huaqiao University Quanzhou China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Quanzhou China Xiamen Key Laboratory of Computer Vision and Pattern Recognition Huaqiao University Quanzhou China
Temporal action localization is a challenging task in video understanding. Although great progress has been made in temporal action localization, the most advanced methods still have the problem of sharp performance d... 详细信息
来源: 评论
Who Distributes It? Privacy-Preserving Image Sharing Scheme with Illegal Distribution Detection  13th
Who Distributes It? Privacy-Preserving Image Sharing Scheme ...
收藏 引用
13th International Conference on security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020
作者: Deng, Tianpeng Li, Xuan Jin, Biao Xiong, Jinbo College of Mathematics and Informatics Fujian Normal University Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Digital Fujian Big Data Security Technology Institute Fuzhou350117 China
In image sharing schemes, the privacy of shared images can be protected by sending encrypted images to the receiver. However, the decrypted image cannot avoid being illegally distributed by receivers for their own ben... 详细信息
来源: 评论
Multitasking differential evolution with difference vector sharing mechanism
Multitasking differential evolution with difference vector s...
收藏 引用
IEEE Symposium Series on Computational intelligence (SSCI)
作者: Yiqiao Cai Deining Peng Shunkai Fu Hui Tian Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Xiamen China
As a new emerging research topic in the field of evolutionary computation, evolutionary multitasking optimization (EMTO) is presented to solve multiple optimization tasks concurrently by transferring knowledge across ... 详细信息
来源: 评论
Network configuration approach based on the reliability service  12
Network configuration approach based on the reliability serv...
收藏 引用
12th International Conference on Information Technology in Medicine and Education, ITME 2022
作者: Fengfei, Kuang Yaojm, Lin Xiehua, Yu Meilong, Chen University of Fujian Province Key Laboratory of Big Data and Artificial Intelligence MinNan Science and Technology University Fujian Quanzhou362332 China Minnan Normal University School of Computer Science Lab of Data Science and Intelligence Application Zhangzhou China
Wireless communication network plays an important role in various industries. One of the key concern in wireless communication is network security. This paper proposes an optimal transmission lines assignment with max... 详细信息
来源: 评论
Public auditing for real‑time medical sensor data in cloud‑assisted HealthIIoT system
收藏 引用
Frontiers of Optoelectronics 2022年 第3期15卷 1-14页
作者: Weiping Ye Jia Wang Hui Tian Hanyu Quan College of Computer Science and Technology Huaqiao UniversityXiamen 361021China Wuhan National Laboratory for Optoelectronics Wuhan 430074China Xiamen Key Laboratory of Data Security and Blockchain Technology Xiamen 361021China Fujian Key Laboratory of Big Data Intelligence and Security Xiamen 361021China
With the advancement of industrial internet of things(IIoT),wireless medical sensor networks(WMSNs)have been widely introduced in modern healthcare systems to collect real-time medical data from patients,which is know... 详细信息
来源: 评论
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Objec...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhou, Yongjie Xiong, Jinbo Bi, Renwan Tian, Youliang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Fujian Provincial Key Laboratory of Network System Information Security College of Computer and Cyberspace Security Fujian Normal University FJ Fuzhou350117 China
The connected autonomous vehicles (CAVs) are a key component of intelligent transportation systems (ITS) where vehicles communicate with each other to exchange sensing data from on-board sensors (e.g., high-definition... 详细信息
来源: 评论
Adaptive offloading scheme of fine-grained tasks based on reinforcement learning in multi-access edge computing
收藏 引用
Simulation Modelling Practice and Theory 2025年 143卷
作者: Jie Li Ge Chen Kansong Chen School of Computer Science Hubei University Wuhan 430062 China Hubei Key Laboratory of Big Data Intelligent Analysis and Application (Hubei University) Wuhan 430062 China Engineering Research Center of Hubei Province in Intelligent Government Affairs and Application of Artificial Intelligence Wuhan 430062 China Key Laboratory of Intelligent Sensing System and Security (Hubei University) Ministry of Education Wuhan 430062 China
In the context of multi-access edge computing, the constraints on device resources and energy pose a challenge in meeting the requirements of delay-sensitive and high-resource demand tasks. In order to address this is...
来源: 评论
A Two-Stage Transfer Learning Method for Tea Disease Identification  13
A Two-Stage Transfer Learning Method for Tea Disease Identif...
收藏 引用
13th International Conference on Information Technology in Medicine and Education, ITME 2023
作者: He, Yina Luo, Zhiming Lin, Lihui Li, Shaozi Xiamen University Department of Artificial Intelligence Xiamen China Wuyi University Fujian Key Laboratory of Big Data Application and Intellectualization for Tea Industry Wuyishan China
Tea has been widely planted across the world, while the identification of tea disease is mainly based on human expertise. In recent years, there has been an increasing use of deep learning techniques for the recogniti... 详细信息
来源: 评论
Teaching resource recommendation for OBE based on kernel canonical correlation analysis  12
Teaching resource recommendation for OBE based on kernel can...
收藏 引用
12th International Conference on Information Technology in Medicine and Education, ITME 2022
作者: Changqian, Wu Shaozi, Li Yaojin, Lin Xiehua, Yu MinNan Science and Technology Key Laboratory of Big Data and Artificial Intelligence University José Rizal University University of Fujian Province Quanzhou China Xiamen University School of Informatics Xiamen China Minnan Normal University School of Computer Science Lab of Data Science and Intelligence Application Zhangzhou China MinNan Science and Technology University Key Laboratory of Big Data and Artificial Intelligence University of Fujian Province Quanzhou China
data mining is used to extract information from OBE teaching resources, then the teaching resources and user personality database are established to improve the effectiveness of resources recommendation on the online ... 详细信息
来源: 评论
Frequency-Aware Attentional Feature Fusion for Deepfake Detection  48
Frequency-Aware Attentional Feature Fusion for Deepfake Dete...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Tian, Cheng Luo, Zhiming Shi, Guimin Li, Shaozi Xiamen University Department of Artificial Intelligence Xiamen China Wuyi University Fujian Key Laboratory of Big Data Application and Intellectualization for Tea Industry Wuyishan China
Various face manipulation techniques develop rapidly and can easily generate high-quality fake images or videos, posing significant ethical concerns when used for malicious purposes. Although recent works achieve sign... 详细信息
来源: 评论