咨询与建议

限定检索结果

文献类型

  • 23 篇 会议
  • 13 篇 期刊文献

馆藏范围

  • 36 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 14 篇 计算机科学与技术...
    • 10 篇 软件工程
    • 4 篇 信息与通信工程
    • 2 篇 电气工程
    • 1 篇 机械工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 生物医学工程(可授...
  • 8 篇 理学
    • 8 篇 数学
    • 2 篇 物理学
    • 2 篇 统计学(可授理学、...
    • 1 篇 地球物理学
  • 8 篇 管理学
    • 6 篇 图书情报与档案管...
    • 3 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...

主题

  • 4 篇 deep learning
  • 4 篇 machine learning
  • 3 篇 feature extracti...
  • 3 篇 testing
  • 3 篇 edge computing
  • 3 篇 cloud computing
  • 3 篇 computer vision
  • 3 篇 cryptography
  • 2 篇 probability dens...
  • 2 篇 access control
  • 2 篇 training data
  • 2 篇 electroencephalo...
  • 2 篇 neural networks
  • 2 篇 smart healthcare
  • 2 篇 smart contract
  • 2 篇 ehealth
  • 2 篇 semantics
  • 2 篇 accuracy
  • 2 篇 sign language
  • 2 篇 neural machine t...

机构

  • 6 篇 intelligent and ...
  • 4 篇 intelligent and ...
  • 3 篇 intelligent dist...
  • 2 篇 university of ai...
  • 2 篇 science and tech...
  • 2 篇 shanghai key lab...
  • 2 篇 shandong univers...
  • 2 篇 college of compu...
  • 2 篇 research center ...
  • 2 篇 national water a...
  • 2 篇 school of inform...
  • 2 篇 intelligent and ...
  • 1 篇 department of el...
  • 1 篇 independent rese...
  • 1 篇 shandong normal ...
  • 1 篇 ieee computer so...
  • 1 篇 taiwan
  • 1 篇 bupt and huarong...
  • 1 篇 department of co...
  • 1 篇 key lab. of trus...

作者

  • 9 篇 leila ismail
  • 3 篇 zhengding lu
  • 3 篇 nada shahin
  • 3 篇 alain hennebelle
  • 3 篇 tianjiang wang
  • 3 篇 yuanjie zheng
  • 2 篇 liyu gong
  • 2 篇 liming fang
  • 2 篇 lu zhengding
  • 2 篇 li ruixuan
  • 2 篇 rajkumar buyya
  • 2 篇 zhe liu
  • 2 篇 jiachen shen
  • 2 篇 wen kunmei
  • 2 篇 chunhua su
  • 2 篇 liu fang
  • 2 篇 fang liu
  • 2 篇 huned materwala
  • 2 篇 gong liyu
  • 2 篇 jun zhou

语言

  • 35 篇 英文
  • 1 篇 其他
检索条件"机构=Intelligent and Distributed Computing Lab"
36 条 记 录,以下是11-20 订阅
排序:
Meta Balanced Network for Fair Face Recognition
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Mei Zhang, Yaobin Deng, Weihong The Pattern Recognition and Intelligent System Lab. School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China Key Lab. of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Although deep face recognition has achieved impressive progress in recent years, controversy has arisen regarding discrimination based on skin tone, questioning their deployment into real-world scenarios. In this pape... 详细信息
来源: 评论
Younger: The First Dataset for Artificial Intelligence-Generated Neural Network Architecture
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Zhengxin Gao, Wanling Peng, Luzhou Huang, Yunyou Tang, Fei Zhan, Jianfeng Research Center of Distributed Systems Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University China Inspur Group Co. Ltd. China Jinan Inspur Data Technology Co. Ltd. China
Designing and optimizing neural network architectures typically requires extensive expertise, starting with handcrafted designs and then manual or automated refinement. This dependency presents a significant barrier t... 详细信息
来源: 评论
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Sy...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Panyu Wu Zhenfu Cao Jiachen Shen Xiaolei Dong Yihao Yang Jun Zhou Liming Fang Zhe Liu Chunpeng Ge Chunhua Su Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Research Center for Basic Theories of Intelligent Computing Research Institute of Basic Theories Zhejiang Lab Hangzhou China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Changsha China Shandong University Jinan China University of Aizu Fukushima Japan
Since data outsourcing poses privacy concerns with data leakage, searchable symmetric encryption (SSE) has emerged as a powerful solution that enables clients to perform query operations on encrypted data while preser...
来源: 评论
Hybrid Algorithm and Forecasting Technology of Network Public Opinion Based on BP Neural Network  9th
Hybrid Algorithm and Forecasting Technology of Network Publi...
收藏 引用
9th International Workshop of Advanced Manufacturing and Automation, IWAMA 2019
作者: Zhang, Ronghua Liu, Changzheng Ma, Hongliang Intelligent and Distributed Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China College of Information Science and Technology Shihezi University Shihezi832000 China
Based on the hybrid algorithm and BP neural network, the forecasting technology of network public opinion was studied. After detailed introduction of the research background and significance, the concept and developme... 详细信息
来源: 评论
Efficient Training Approaches for Performance Anomaly Detection Models in Edge computing Environments
收藏 引用
ACM Transactions on Autonomous and Adaptive Systems 2025年 第2期20卷
作者: Duneesha Fernando Maria Rodriguez Patricia Arroba Leila Ismail Rajkumar Buyya Quantum Cloud Computing and Distributed Systems (qCLOUDS) Laboratory School of Computing and Information Systems The University of Melbourne Australia CCS–Center for Computational Simulation Universidad Politécnica de Madrid Spain Intelligent Distributed Computing and Systems Research (INDUCE) Lab Department of Computer Science and Software Engineering United Arab Emirates University United Arab Emirates
Microservice architectures are increasingly used to modularize IoT applications and deploy them in distributed and heterogeneous edge computing environments. Over time, these microservice-based IoT applications are su... 详细信息
来源: 评论
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI C...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Yihao Yang Xiaolei Dong Jiachen Shen Zhenfu Cao Yunbo Yang Jun Zhou Liming Fang Zhe Liu Chunpeng Ge Chunhua Su Zongyang Hou Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Research Center for Basic Theories of Intelligent Computing Research Institute of Basic Theories Zhejiang Lab Hangzhou China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Changsha China Shandong University Jinan China University of Aizu Fukushima Japan Print-Rite Technology Development Co. Ltd. Of Zhuhai China
Private Set Intersection (PSI) is one of the most important functions in secure multiparty computation (MPC). PSI protocols have been a practical cryptographic primitive and there are many privacy-preserving applicati...
来源: 评论
Joint Deep Matching Model of OCT Retinal Layer Segmentation
收藏 引用
Computers, Materials & Continua 2020年 第6期63卷 1485-1498页
作者: Mei Yang Yuanjie Zheng Weikuan Jia Yunlong He Tongtong Che Jinyu Cong School of Information Science and Engineering at Shandong Normal University Jinan250358China Key Lab of Intelligent Computing and Information Security in Universities of Shandong Shandong Provincial Key Laboratory for Novel Distributed Computer Software TechnologyInstitute of Biomedical SciencesShandong Normal UniversityJinan250358China INSA Lyon University of LyonCNRSInsermVilleurbanne69621 CedexFrance
Optical Coherence Tomography(OCT)is very important in medicine and provide useful diagnostic *** retinal layer thicknesses plays a vital role in pathophysiologic factors of many ocular *** the existing retinal layer s... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
Exploiting Probabilistic Siamese Visual Tracking with a Conditional Variational Autoencoder
Exploiting Probabilistic Siamese Visual Tracking with a Cond...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Wenhui Huang Jason Gu Peiyong Duan Sujuan Hou Yuanjie Zheng School of Information Science and Engineering Shandong Normal University China Dalhousie University Halifax Canada Key Lab of Intelligent Computing & Information Security in Universities of Shandong Shandong Normal University China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University China
Visual tracking is a fundamental capability for robots tasked with humans and environment interaction. However, state-of-the-art visual tracking methods are still prone to failures and are imprecise when applied to ch... 详细信息
来源: 评论
Epilepsy Classification for Mining Deeper Relationships between EEG Channels based on GCN
Epilepsy Classification for Mining Deeper Relationships betw...
收藏 引用
2020 International Conference on Computer Vision, Image and Deep Learning, CVIDL 2020
作者: Chen, Xin Zheng, Yuanjie Niu, Yi Li, Chengiiang Shandong Normal University School of Information Science and Engineering Jinan250358 China Key Lab of Intelligent Computing and Information Security Universities of Shandong Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Institute of Biomedical Sciences Jinan250358 China Department of Electrical Engineering Information Technology Shandong University of Science and Technology Jinan250031 China
Epilepsy is a brain disorder caused by abnormal discharges of neurons in brain. It is one of the most commonly studied disorders in neurology. The research of epilepsy electroencephalogram (EEG) has become a hot resea... 详细信息
来源: 评论