咨询与建议

限定检索结果

文献类型

  • 346 篇 会议
  • 341 篇 期刊文献

馆藏范围

  • 687 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 445 篇 工学
    • 303 篇 计算机科学与技术...
    • 253 篇 软件工程
    • 100 篇 信息与通信工程
    • 76 篇 电气工程
    • 60 篇 生物工程
    • 50 篇 控制科学与工程
    • 34 篇 电子科学与技术(可...
    • 33 篇 化学工程与技术
    • 30 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 20 篇 安全科学与工程
    • 17 篇 网络空间安全
    • 16 篇 土木工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 建筑学
    • 12 篇 动力工程及工程热...
  • 195 篇 理学
    • 87 篇 数学
    • 74 篇 生物学
    • 42 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 29 篇 化学
    • 11 篇 系统科学
  • 95 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 农学
    • 13 篇 作物学
  • 18 篇 医学
    • 14 篇 临床医学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 25 篇 feature extracti...
  • 22 篇 deep learning
  • 21 篇 privacy
  • 17 篇 federated learni...
  • 16 篇 security
  • 16 篇 accuracy
  • 16 篇 training
  • 13 篇 image segmentati...
  • 13 篇 neural networks
  • 13 篇 computational mo...
  • 12 篇 data privacy
  • 12 篇 authentication
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 codes
  • 10 篇 blockchain
  • 9 篇 data mining
  • 9 篇 contrastive lear...
  • 9 篇 measurement

机构

  • 64 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 52 篇 shandong provinc...
  • 48 篇 school of comput...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 35 篇 national enginee...
  • 35 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 hubei key labora...
  • 29 篇 cluster and grid...
  • 24 篇 hubei engineerin...
  • 23 篇 henan key labora...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 19 篇 school of comput...
  • 18 篇 huazhong univers...
  • 18 篇 the hubei engine...
  • 17 篇 school of cyber ...
  • 15 篇 huazhong univers...

作者

  • 47 篇 zhou pan
  • 38 篇 jin hai
  • 33 篇 hai jin
  • 26 篇 hu shengshan
  • 22 篇 liu daizong
  • 19 篇 zhang leo yu
  • 17 篇 mahmood khalid
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 15 篇 zhou ziqi
  • 15 篇 li minghui
  • 13 篇 wang haoyu
  • 12 篇 wan wei
  • 12 篇 fang xiang
  • 11 篇 xiaoke zhu
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 11 篇 xu zichuan
  • 10 篇 shengshan hu

语言

  • 624 篇 英文
  • 58 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Henan Data Security Engineering Technology Research Center"
687 条 记 录,以下是611-620 订阅
排序:
Identity-aware attribute recognition via real-time distributed inference in mobile edge clouds
arXiv
收藏 引用
arXiv 2020年
作者: Xu, Zichuan Zhou, Pan Wu, Jiangkai Ren, Jiankang Xia, Qiufen Liang, Huizhi Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Software Dalian University of Technology Dalian China School of Computer Science Dalian University of Technology Dalian China Key Laboratory for Ubiquitous Network Service Software of Liaoning Province International School of Information Science and Engineering Dalian University of Technology Dalian China Department of Computer Science University of Reading Reading United Kingdom
With the development of deep learning technologies, attribute recognition and person re-identification (re-ID) have attracted extensive attention and achieved continuous improvement via executing computing-intensive d... 详细信息
来源: 评论
Cost-efficient and skew-aware data scheduling for incremental learning in 5G network
arXiv
收藏 引用
arXiv 2020年
作者: Pu, Lingjun Yuan, Xinjing Xu, Xiaohang Chen, Xu Zhou, Pan Xu, Jingdong The College of Computer Science Nankai University Tianjin300071 China The State Key Laboratory of Integrated Services Networks Xidian University Xi’an710126 China The School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China The Pazhou Lab. Guangzhou510335 China The Hubei Engineering Research Center on Big Data Security The School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
To facilitate the emerging applications in 5G networks, mobile network operators will provide many network functions in terms of control and prediction. Recently, they have recognized the power of machine learning (ML... 详细信息
来源: 评论
Identification of Cognitive Dysfunction in Patients with T2DM Using Whole Brain Functional Connectivity
收藏 引用
Genomics, Proteomics & Bioinformatics 2019年 第4期17卷 441-452页
作者: Zhenyu Liu Jiangang Liu Huijuan Yuan Taiyuan Liu Xingwei Cui Zhenchao Tang Yang Du Meiyun Wang Yusong Lin Jie Tian CAS Key Laboratory of Molecular Imaging Institute of AutomationChinese Academy of SciencesBeijing 100190China School of Computer and Information Technology Beijing Jiaotong UniversityBeijing 100044China Department of Endocrinology and Metabolism Henan Provincial People’s Hospital&the People’s Hospital of Zhengzhou UniversityZhengzhou 450003China Department of Radiology Henan Provincial People’s Hospital&the People’s Hospital of Zhengzhou UniversityZhengzhou 450003China Cooperative Innovation Center for Internet Healthcare&School of Software Zhengzhou UniversityZhengzhou 450003China School of Mechanical Electrical&Information EngineeringShandong University(Weihai)Weihai 264209China University of Chinese Academy of Sciences Beijing 100080China Beijing Advanced Innovation Center for Big Data-Based Precision Medicine School of MedicineBeihang UniversityBeijing 100191China Engineering Research Center of Molecular and Neuro Imaging of Ministry of Education School of Life Science and TechnologyXidian UniversityXi’an 710126China
Majority of type 2 diabetes mellitus(T2DM)patients are highly susceptible to several forms of cognitive impairments,particularly ***,the underlying neural mechanism of these cognitive impairments remains *** aimed to ... 详细信息
来源: 评论
Poisoning attack against estimating from pairwise comparisons
arXiv
收藏 引用
arXiv 2021年
作者: Ma, Ke Xu, Qianqian Zeng, Jinshan Cao, Xiaochun Huang, Qingming The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen518055 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer and Information Engineering Jiangxi Normal University Jiangxi Nanchang330022 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China The School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Big Data Mining and Knowledge Management The School of Economics and Management University of Chinese Academy of Sciences Beijing100049 China
As pairwise ranking becomes broadly employed for elections, sports competitions, recommendation, information retrieval and so on, attackers have strong motivation and incentives to manipulate or disrupt the ranking li... 详细信息
来源: 评论
Corrigendum to “Wetland classification using parcel-level ensemble algorithm based on Gaofen-6 multispectral imagery and Sentinel-1 dataset” [J. Hydrol. 606 (2022) 127462]
收藏 引用
Journal of Hydrology 2022年 613卷
作者: Meng Zhang Hui Lin Research Center of Forestry Remote Sensing & Information Engineering Central South University of Forestry & Technology Changsha 410004 China Key Laboratory of Forestry Remote Sensing Based Big Data & Ecological Security for Hunan Province Changsha 410004 China Key Laboratory of State Forestry Administration on Forest Resources Management and Monitoring in Southern Area Changsha 410004 China College of Forestry Central South University of Forestry & Technology Changsha 410004 China
来源: 评论
Deep Learning for Password Guessing and Password Strength Evaluation, A Survey
Deep Learning for Password Guessing and Password Strength Ev...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Tao Zhang Zelei Cheng Yi Qin Qiang Li Lin Shi Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis Guangxi University for Nationalities Nanning China Department of Computer and Information Technology Purdue University West Lafayette USA PLA Information Engineering University Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Cloud Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
Text passwords are the most widely used authentication methods and will also be used in the future. Text passwords can be regarded as meaningful strings, and deep learning methods have an advantage of text processing.... 详细信息
来源: 评论
What Is Required to Prevent a Second Major Outbreak of SARS-CoV-2 upon Lifting Quarantine in Wuhan City,China
收藏 引用
The Innovation 2020年 第1期1卷 152-157页
作者: Lei Zhang Mingwang Shen Xiaomeng Ma Shu Su Wenfeng Gong Jing Wang Yusha Tao Zhuoru Zou Rui Zhao Joseph T.F.Lau Wei Li Feng Liu Kai Ye Youfa Wang Guihua Zhuang Christopher K.Fairley China-Australia Joint Research Center for Infectious Diseases School of Public HealthXi’an Jiaotong University Health Science CenterXi’anShaanxi 710061PR China Melbourne Sexual Health Centre Alfred HealthMelbourneAustralia Central Clinical School Faculty of MedicineNursing and Health SciencesMonash UniversityMelbourneVICAustralia Department of Epidemiology and Biostatistics College of Public HealthZhengzhou UniversityZhengzhou 450001 HenanChina Institute of Health Policy Management and Evaluation University of TorontoTorontoONCanada School of Public Health and Preventive Medicine Faculty of MedicineMonash UniversityMelbourneAustralia Centre for Research Behaviors Centre for Health Behaviours ResearchSchool of Public Health and Primary CareThe Chinese University of Hong KongHong KongHong Kong Bill and Melinda Gates Foundation SeattleWAUSA Department of Epidemiology and Health Statistics School of Public HealthSoutheast UniversityNanjing210009 JiangsuChina Shaanxi Provincial Center for Disease Control and Prevention Xi’an710054 ShaanxiChina MOE Key Lab for Intelligent Networks&Networks Security Faculty of Electronics and Information EngineeringXi’an Jiaotong UniversityXi’an 710049 China School of Automation Science and Engineering Faculty of Electronics and Information EngineeringXi’an Jiaotong UniversityXi’an 710049 China Genome Institute the First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061 China The School of Life Science and Technology Xi’an Jiaotong UniversityXi’an 710049 China Global Health Institute Department of Epidemiology and BiostatisticsSchool of Public HealthXi’an Jiaotong University Health Science CenterXi’anShaanxi 710061China
BACKGROUND The Chinese government implemented a metropolitan-wide quarantine of Wuhan city on 23rd January 2020 to curb the epidemic of the coronavirus *** of this quarantine is *** modelled the effects of two key hea... 详细信息
来源: 评论
DPHL:A DIA Pan-human Protein Mass Spectrometry Library for Robust Biomarker Discovery
收藏 引用
Genomics, Proteomics & Bioinformatics 2020年 第2期18卷 104-119页
作者: Tiansheng Zhu Yi Zhu Yue Xuan Huanhuan Gao Xue Cai Sander R.Piersma Thang V.Pham Tim Schelfhorst Richard R.G.D.Haas Irene V.Bijnsdorp Rui Sun Liang Yue Guan Ruan Qiushi Zhang Mo Hu Yue Zhou Winan J.Van Houdt Tessa Y.S.Le Large Jacqueline Cloos Anna Wojtuszkiewicz Danijela Koppers-Lalic Franziska Bottger Chantal Scheepbouwer Ruud H.Brakenhoff Geert J.L.H.van Leenders Jan N.M.Ijzermans John W.M.Martens Renske D.M.Steenbergen Nicole C.Grieken Sathiyamoorthy Selvarajan Sangeeta Mantoo Sze S.Lee Serene J.Y.Yeow Syed M.F.Alkaff Nan Xiang Yaoting Sun Xiao Yi Shaozheng Dai Wei Liu Tian Lu Zhicheng Wu Xiao Liang Man Wang Yingkuan Shao Xi Zheng Kailun Xu Qin Yang Yifan Meng Cong Lu Jiang Zhu Jin'e Zheng Bo Wang Sai Lou Yibei Dai Chao Xu Chenhuan Yu Huazhong Ying Tony K.Lim Jianmin Wu Xiaofei Gao Zhongzhi Luan Xiaodong Teng Peng Wu Shi'ang Huang Zhihua Tao Narayanan G.Iyer Shuigeng Zhou Wenguang Shao Henry Lam Ding Ma Jiafu Ji Oi L.Kon Shu Zheng Ruedi Aebersold Connie R.Jimenez Tiannan Guo Zhejiang Provincial Laboratory of Life Sciences and Biomedicine Westlake UniversityHangzhou 310024China Key Laboratory of Structural Biology of Zhejiang Province School of Life SciencesWestlake UniversityHangzhou 310024China Institute of Basic Medical Sciences Westlake Institute for Advanced StudyHangzhou 310024China School of Computer Science Shanghai Key Laboratory of Intelligent Information ProcessingFudan UniversityShanghai 200433China Thermo Fisher Scientific(BREMEN)GmbH Bremen 28195Germany OncoProteomics Laboratory Department of Medical OncologyVU University Medical CenterVU UniversityAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamUrologyCancer Center AmsterdamAmsterdam 1011The Netherlands Thermo Fisher Scientific Shanghai 201206China The Netherlands Cancer Institute Surgical OncologyAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamSurgeryCancer Center AmsterdamAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamPediatric Oncology/HematologyCancer Center AmsterdamAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamHematologyCancer Center AmsterdamAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamMedical OncologyCancer Center AmsterdamAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamNeurosurgeryCancer Center AmsterdamAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamPathologyCancer Center AmsterdamAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamOtolaryngology/Head and Neck SurgeryCancer Center AmsterdamAmsterdam 1011The Netherlands Erasmus MC University Medical Center PathologyRotterdam 1016LVThe Netherlands Erasmus MC University Medical Center SurgeryRotterdam 1016LVThe Netherlands Erasmus MC University Medical Center Medical OncologyRotterdam 1016LVThe Netherlands Department of Anatomical Pathology Singapore General HospitalSingapore 169608Singapore Division of Medical Scie
To address the increasing need for detecting and validating protein biomarkers in clinical specimens,mass spectrometry(MS)-based targeted proteomic techniques,including the selected reaction monitoring(SRM),parallel r... 详细信息
来源: 评论
The characteristic ofcorvus pectoralis’s complete mitochondrial genome and phylogeny analysis
收藏 引用
Mitochondrial DNA Part B 2019年 第2期4卷 3513-3514页
作者: Tian Huang Libo Zhou Zhenggang Xu College of Information and Electronic Engineering Hunan City University YiYang China Hunan Engineering Research Center for Internet of Animals Changsha China Key Laboratory of Forestry Remote Sensing Based Big Data & Ecological Security for Hunan Province Central South University of Forestry and Technology Changsha China
The Collared Crow (Corvus pectoralis), in the order Passeriformes, it widely distributed in large areas encompassing China and northern Vietnam. It is a vulnerable bird that is of international concern. In this study,... 详细信息
来源: 评论
Complete mitochondrial genome ofPelecanus crispusand its phylogeny
收藏 引用
Mitochondrial DNA Part B 2019年 第2期4卷 3075-3076页
作者: Tian Huang Yonghong Wang Libo Zhou Zhenggang Xu College of Information and Electronic Engineering Hunan City University Yiyang China Hunan Engineering Research Center for Internet of Animals Changsha China Key Laboratory of Forestry Remote Sensing Based Big Data and Ecological Security for Hunan Province Central South University of Forestry and Technology Changsha China
The Dalmatian Pelican (Pelecanus crispus), in the order Pelecaniformes, its habitat is distributed in Europe, Asia, and Africa. It is a large waterfowl that is of international concern. In this study, we first sequenc... 详细信息
来源: 评论