咨询与建议

限定检索结果

文献类型

  • 2,425 篇 期刊文献
  • 1,900 篇 会议
  • 1 册 图书

馆藏范围

  • 4,326 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,758 篇 工学
    • 1,855 篇 计算机科学与技术...
    • 1,520 篇 软件工程
    • 584 篇 信息与通信工程
    • 333 篇 电气工程
    • 325 篇 生物工程
    • 318 篇 控制科学与工程
    • 235 篇 化学工程与技术
    • 209 篇 电子科学与技术(可...
    • 180 篇 生物医学工程(可授...
    • 167 篇 光学工程
    • 158 篇 机械工程
    • 118 篇 材料科学与工程(可...
    • 118 篇 动力工程及工程热...
    • 92 篇 土木工程
    • 91 篇 交通运输工程
    • 89 篇 仪器科学与技术
    • 84 篇 建筑学
  • 1,649 篇 理学
    • 773 篇 数学
    • 496 篇 物理学
    • 406 篇 生物学
    • 272 篇 统计学(可授理学、...
    • 256 篇 化学
    • 104 篇 系统科学
  • 716 篇 管理学
    • 405 篇 管理科学与工程(可...
    • 328 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 243 篇 医学
    • 191 篇 临床医学
    • 119 篇 基础医学(可授医学...
  • 129 篇 法学
    • 100 篇 社会学
  • 88 篇 农学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 38 篇 教育学
  • 14 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 145 篇 semantics
  • 123 篇 feature extracti...
  • 116 篇 deep learning
  • 108 篇 training
  • 83 篇 computational mo...
  • 66 篇 machine learning
  • 65 篇 accuracy
  • 61 篇 data mining
  • 61 篇 federated learni...
  • 60 篇 convolution
  • 55 篇 predictive model...
  • 55 篇 data models
  • 52 篇 graph neural net...
  • 48 篇 hadrons
  • 47 篇 contrastive lear...
  • 45 篇 neural networks
  • 45 篇 adaptation model...
  • 42 篇 object detection
  • 42 篇 visualization
  • 40 篇 task analysis

机构

  • 227 篇 university of ch...
  • 172 篇 iccub universita...
  • 171 篇 department of ph...
  • 171 篇 infn sezione di ...
  • 169 篇 infn sezione di ...
  • 169 篇 yandex school of...
  • 166 篇 cavendish labora...
  • 166 篇 school of physic...
  • 166 篇 infn sezione di ...
  • 164 篇 infn sezione di ...
  • 161 篇 van swinderen in...
  • 160 篇 horia hulubei na...
  • 160 篇 department of ph...
  • 158 篇 h.h. wills physi...
  • 152 篇 imperial college...
  • 140 篇 stfc rutherford ...
  • 137 篇 universiteit maa...
  • 137 篇 institute of par...
  • 132 篇 center for high ...
  • 125 篇 massachusetts in...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 117 篇 barter w.
  • 117 篇 brundu d.
  • 117 篇 bellee v.
  • 103 篇 bowcock t.j.v.
  • 103 篇 casse g.
  • 103 篇 blake t.
  • 103 篇 borsato m.
  • 103 篇 betancourt c.
  • 103 篇 belin s.
  • 103 篇 amato s.
  • 103 篇 boettcher t.
  • 102 篇 bobulska d.
  • 102 篇 afsharnia h.
  • 101 篇 belavin v.
  • 101 篇 bediaga i.
  • 101 篇 cali s.
  • 101 篇 baryshnikov f.
  • 101 篇 bjørn m.

语言

  • 3,683 篇 英文
  • 576 篇 其他
  • 81 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Hubei Key Laboratory of Big Data in Science and Technology"
4326 条 记 录,以下是51-60 订阅
排序:
Impact Analysis of MTD on the Frequency Stability in Smart Grid
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第1期10卷 275-277页
作者: Zhenyong Zhang Ruilong Deng the State Key Laboratory of Public Big Data and the College of Computer Science and Technology Guizhou UniversityGuiyang 550025China IEEE the State Key Laboratory of Industrial Control Technology Zhejiang UniversityHangzhou 310027China
Dear Editor, In order to accommodate the effects of false data injection attacks(FDIAs), the moving target defense(MTD) strategy is recently proposed to enhance the security of the smart grid by perturbing branch susc... 详细信息
来源: 评论
Targeted Universal Adversarial Attack Based on Fourier Transform  2nd
Targeted Universal Adversarial Attack Based on Fourier Tran...
收藏 引用
2nd International Conference on data Security and Privacy Protection, DSPP 2024
作者: Sun, Yancheng Chen, Yuling Liu, Ziyang Dou, Hui Tan, Chaoyue The State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
The existence of adversarial example reveals the fragility in neural networks, and the exploration of their theoretical origins increases the interpretability of deep learning, enhances researchers’ understanding of ... 详细信息
来源: 评论
Multi‐task framework of precipitation nowcasting
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第4期8卷 1350-1363页
作者: Zheng Zhang Chuyao Luo Baoquan Zhang Hao Jiang Bowen Zhang Department of Computer Science Shenzhen Key Laboratory of Internet Information CollaborationHarbin Institute of TechnologyShenzhenChina College of Big Data and Internet Shenzhen Technology UniversityShenzhenChina
Precipitation forecasting plays an important role in disaster warning,agricultural production,and other *** solve this issue,some deep learning methods are proposed to forecast future radar echo images and convert the... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou 350117China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye... 详细信息
来源: 评论
CBPF: A Novel Method For Filtering Poisoned data Based on Composite Backdoor Attacks
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 25136-25147页
作者: Xia, Hanfeng Hong, Haibo Wang, Ruili Sun, Yiru Ding, Hao Zhejiang Gongshang University Zhejiang Key Laboratory of Big Data and Future E-Commerce Technology School of Computer Science and Technology Hangzhou China Massey University School of Mathematical and Computational Sciences Auckland New Zealand
Backdoor attacks involve the injection of a limited quantity of poisoned samples containing triggers into the training dataset. During the inference stage, backdoor attacks can uphold a high level of accuracy for norm... 详细信息
来源: 评论
Research on Enhanced Perception and Attention-Driven Person Re-Identification  20
Research on Enhanced Perception and Attention-Driven Person ...
收藏 引用
20th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Wu, Cancan Li, Dong Zhang, Zhi College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Hubei Wuhan430065 China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Hubei Wuhan430065 China
When matching similarity among pedestrians in images, pedestrian re-identification algorithms are often disturbed by occlusions. A typical tactic is to improve the robustness of occlusion features in the model. Howeve... 详细信息
来源: 评论
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
收藏 引用
Computer Modeling in Engineering & sciences 2024年 第1期138卷 917-938页
作者: Jinqiu Hou Changgen Peng Weijie Tan Hongfa Ding State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Advanced Manufacturing Technology Ministry of EducationGuizhou UniversityGuiyang550025China College of Information Guizhou University of Finance and EconomicsGuiyang550025China
Cloud-based services have powerful storage functions and can provide accurate ***,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research *** t... 详细信息
来源: 评论
Graph Augmentation Empowered Contrastive Learning for Recommendation
收藏 引用
ACM Transactions on Information Systems 2025年 第2期43卷 1-27页
作者: Xu, Lixiang Liu, Yusheng Xu, Tong Chen, Enhong Tang, Yuanyan School of Artificial Intelligence and Big Data Hefei University Hefei China State Key Laboratory of Cognitive Intelligence School of Computer Science and Technology University of Science and Technology of China Hefei China Zhuhai UM Science and Technology Research Institute FST University of Macau China
The application of contrastive learning (CL) to collaborative filtering (CF) in recommender systems has achieved remarkable success. CL-based recommendation models mainly focus on creating multiple augmented views by ... 详细信息
来源: 评论
ViGT: proposal-free video grounding with a learnable token in the transformer
收藏 引用
science China(Information sciences) 2023年 第10期66卷 196-212页
作者: Kun LI Dan GUO Meng WANG School of Computer Science and Information Engineering Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Intelligent Interconnected Systems Laboratory of Anhui Province Institute of Artificial Intelligence Hefei Comprehensive National Science Center
The video grounding(VG) task aims to locate the queried action or event in an untrimmed video based on rich linguistic descriptions. Existing proposal-free methods are trapped in the complex interaction between video ... 详细信息
来源: 评论
Hash Function Based on Quantum Walks with Two-Step Memory
Hash Function Based on Quantum Walks with Two-Step Memory
收藏 引用
2024 International Conference on Computing, Machine Learning and data science, CMLDS 2024
作者: Zhou, Qing Lu, Songfeng Yang, Hao Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan China Shenzhen Huazhong University of Science and Technology Research Institute Guangdong Shenzhen China
We propose a new quantum-walk-based hash function QHF2M by combining two types of quantum walks with two-step memory and numerically test its statistical performance. The test result shows that QHF2M is on a par with ... 详细信息
来源: 评论