咨询与建议

限定检索结果

文献类型

  • 168 篇 期刊文献
  • 88 篇 会议

馆藏范围

  • 256 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 170 篇 工学
    • 137 篇 计算机科学与技术...
    • 115 篇 软件工程
    • 33 篇 信息与通信工程
    • 30 篇 电气工程
    • 24 篇 生物工程
    • 17 篇 控制科学与工程
    • 16 篇 电子科学与技术(可...
    • 13 篇 光学工程
    • 13 篇 生物医学工程(可授...
    • 8 篇 动力工程及工程热...
    • 6 篇 化学工程与技术
    • 6 篇 网络空间安全
    • 5 篇 机械工程
    • 5 篇 建筑学
    • 4 篇 力学(可授工学、理...
    • 4 篇 交通运输工程
    • 4 篇 安全科学与工程
  • 106 篇 理学
    • 57 篇 数学
    • 24 篇 生物学
    • 22 篇 物理学
    • 15 篇 系统科学
    • 14 篇 统计学(可授理学、...
    • 6 篇 化学
  • 43 篇 管理学
    • 25 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 11 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
  • 9 篇 法学
    • 6 篇 法学
  • 3 篇 军事学
  • 2 篇 教育学
  • 1 篇 经济学

主题

  • 12 篇 feature extracti...
  • 8 篇 convolution
  • 8 篇 blockchain
  • 8 篇 training
  • 6 篇 computational mo...
  • 6 篇 machine learning
  • 5 篇 speech processin...
  • 5 篇 contrastive lear...
  • 5 篇 steganography
  • 5 篇 accuracy
  • 5 篇 forecasting
  • 4 篇 image fusion
  • 4 篇 object detection
  • 4 篇 smart contract
  • 4 篇 evolutionary alg...
  • 4 篇 semantics
  • 4 篇 genetic algorith...
  • 4 篇 protocols
  • 4 篇 correlation
  • 4 篇 information fusi...

机构

  • 33 篇 school of cyber ...
  • 21 篇 school of comput...
  • 18 篇 peng cheng labor...
  • 16 篇 state key labora...
  • 14 篇 key laboratory o...
  • 13 篇 institute of inf...
  • 13 篇 beijing key labo...
  • 12 篇 key laboratory o...
  • 11 篇 school of comput...
  • 9 篇 key lab. of inte...
  • 9 篇 key laboratory o...
  • 9 篇 state key labora...
  • 9 篇 university of ch...
  • 9 篇 college of compu...
  • 8 篇 key laboratory o...
  • 7 篇 fujian key labor...
  • 7 篇 key laboratory o...
  • 7 篇 college of compu...
  • 7 篇 alibaba group
  • 7 篇 school of commun...

作者

  • 27 篇 xu qianqian
  • 26 篇 huang qingming
  • 22 篇 cao xiaochun
  • 20 篇 yang zhiyong
  • 12 篇 zou juan
  • 10 篇 li chao
  • 10 篇 bao shilong
  • 9 篇 qingming huang
  • 8 篇 huang jiwu
  • 8 篇 deng yong
  • 8 篇 qianqian xu
  • 8 篇 palanisamy balaj...
  • 7 篇 xiaochun cao
  • 7 篇 he yuan
  • 7 篇 wang zitai
  • 7 篇 zhiyong yang
  • 7 篇 shi minjia
  • 6 篇 yang shengxiang
  • 6 篇 wu jiyi
  • 6 篇 xu runhua

语言

  • 222 篇 英文
  • 34 篇 其他
检索条件"机构=Information Security and Intelligent Computing Laboratory"
256 条 记 录,以下是1-10 订阅
排序:
On Isodual Double Toeplitz Codes
收藏 引用
Journal of Systems Science & Complexity 2024年 第5期37卷 2196-2206页
作者: SHI Minjia XU Li SOLÉ Patrick Key Laboratory of Intelligent Computing and Signal Processing Ministry of EducationSchool of Mathematical SciencesAnhui UniversityHefei 230601China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China CNRS University of Aix MarseilleCentrale MarseilleI2MMarseille 13284France
Double Toeplitz(shortly DT)codes are introduced here as a generalization of double circulant *** authors show that such a code is isodual,hence formally self-dual(FSD).FSD codes form a far-reaching generalization of s... 详细信息
来源: 评论
Policy Network-Based Dual-Agent Deep Reinforcement Learning for Multi-Resource Task Offloading in Multi-Access Edge Cloud Networks
收藏 引用
China Communications 2024年 第4期21卷 53-73页
作者: Feng Chuan Zhang Xu Han Pengchao Ma Tianchun Gong Xiaoxue School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Institute of Intelligent Communication and Network Security Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and TelecommunicationsChongqing 400065China School of Information Engineering Guangdong University of TechnologyGuangzhou 510006China
The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC n... 详细信息
来源: 评论
A survey on cryptographic techniques for protecting big data security: present and forthcoming
收藏 引用
Science China(information Sciences) 2022年 第10期65卷 73-106页
作者: Siqi LU Jianhua ZHENG Zhenfu CAO Yongjuan WANG Chunxiang GU School of Cyberspace Security Information Engineering University Henan Key Laboratory of Network Cryptography Technology Institute of Security Technology Shanghai Key Laboratory of Trustworthy Computing East China Normal University Cyberspace Security Research Center Peng Cheng Laboratory Shanghai Institute of Intelligent Science and Technology Tongji University
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they significantly create economic and social value, big data meaningfully impact... 详细信息
来源: 评论
Impact of Crosstalk and Loss on the Training Process of Integrated Photonic Neural Networks  6
Impact of Crosstalk and Loss on the Training Process of Inte...
收藏 引用
6th International Conference on Electronic Engineering and Informatics, EEI 2024
作者: Pang, Jing Su, Ye Xie, Yiyuan College of Electronic and Information Engineering Southwest University Chongqing400715 China Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing Chongqing400715 China Key Laboratory of Networks and Cloud Computing Security of Universities in Chongqing Chongqing400715 China
Integrated photonic neural networks (IPNNs), with their ability to process large-scale data and parallelize multiple computational tasks, have shown impressive promise for applications in the field of artificial intel... 详细信息
来源: 评论
High Contrast Ratio 4-to-2 Plasmonic Encoder Utilizing Cascaded Ring Resonators  6
High Contrast Ratio 4-to-2 Plasmonic Encoder Utilizing Casca...
收藏 引用
6th International Conference on Electronic Engineering and Informatics, EEI 2024
作者: Chen, Yan Xie, Yiyuan Chai, Junxiong Ye, Yichen College of Electronic and Information Engineering Southwest University Chongqing400715 China Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing Chongqing400715 China Key Laboratory of Networks and Cloud Computing Security of Universities in Chongqing Chongqing400715 China
In this paper, a novel plasmonic 4-to-2 encoder comprising cascaded ring resonators coated with graphene layers and two metal-insulator-metal (MIM) waveguides. The encoding function operates at 850 nm by modulating th... 详细信息
来源: 评论
Application of Multi-Scale Linear Attention in Road Segmentation of High-Resolution Remote Sensing Images  5
Application of Multi-Scale Linear Attention in Road Segmenta...
收藏 引用
5th International Conference on Advances in Electrical Engineering and Computer Applications, AEECA 2024
作者: Zhu, Shuangling Deng, Yunyun Gulinaz, Ailimujiang Ili Normal University School of Cyber Security and Information Engineering Yining China Ili Normal University Key Laboratory of Intelligent Computing Research and Application in Ili River Valley Yining China
With the rapid development of remote sensing technology, road segmentation of high-resolution remote sensing images remains a challenging task due to the complexity of road structures and the diversity of image resolu... 详细信息
来源: 评论
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and Data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber Security Fujian Normal UniversityFuzhouChina Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhouChina Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhouChina Department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 评论
AR-CNN: an attention ranking network for learning urban perception
收藏 引用
Science China(information Sciences) 2022年 第1期65卷 164-174页
作者: Zhetao LI Ziwen CHEN Wei-Shi ZHENG Sangyoon OH Kien NGUYEN Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University School of Data and Computer Science Sun Yat-sen University Department of Computer and Information Engineering Ajou University Graduate School of Engineering Chiba University
An increasing number of deep learning methods is being applied to quantify the perception of urban environments, study the relationship between urban appearance and resident safety, and improve urban appearance. Most ... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge computing
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Min Northeastern University School of Computer Science and Engineering The Engineering Research Center of Security Technology of Complex Network System Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University College of Information Science and Engineering State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
Mobile edge computing (MEC) integrated with Network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual Network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic security  24
GAN-based Symmetric Embedding Costs Adjustment for Enhancing...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Ye, Miaoxin Zhou, Saixing Luo, Weiqi Tan, Shunquan Huang, Jiwu Guangdong Provincial Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou China Shenzhen Key Laboratory of Media Security College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen MSU-BIT University Shenzhen China
Designing embedding costs is pivotal in modern image steganography. Many studies have shown adjusting symmetric embedding costs to asymmetric ones can enhance steganographic security. However, most existing methods he... 详细信息
来源: 评论