咨询与建议

限定检索结果

文献类型

  • 709 篇 会议
  • 457 篇 期刊文献

馆藏范围

  • 1,166 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 711 篇 工学
    • 499 篇 计算机科学与技术...
    • 376 篇 软件工程
    • 202 篇 信息与通信工程
    • 118 篇 电气工程
    • 108 篇 电子科学与技术(可...
    • 91 篇 控制科学与工程
    • 62 篇 机械工程
    • 46 篇 仪器科学与技术
    • 42 篇 生物工程
    • 35 篇 网络空间安全
    • 28 篇 光学工程
    • 25 篇 动力工程及工程热...
    • 22 篇 生物医学工程(可授...
    • 20 篇 化学工程与技术
    • 19 篇 安全科学与工程
    • 17 篇 交通运输工程
  • 278 篇 理学
    • 159 篇 数学
    • 61 篇 物理学
    • 48 篇 生物学
    • 46 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 24 篇 化学
  • 180 篇 管理学
    • 122 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 37 篇 法学
    • 19 篇 社会学
    • 18 篇 法学
  • 31 篇 医学
    • 27 篇 临床医学
    • 21 篇 基础医学(可授医学...
    • 16 篇 公共卫生与预防医...
  • 14 篇 经济学
  • 13 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 80 篇 feature extracti...
  • 58 篇 accuracy
  • 52 篇 semantics
  • 46 篇 computational mo...
  • 41 篇 training
  • 39 篇 data models
  • 37 篇 wireless sensor ...
  • 34 篇 federated learni...
  • 28 篇 deep learning
  • 27 篇 data mining
  • 26 篇 transformers
  • 26 篇 neural networks
  • 25 篇 robustness
  • 21 篇 image segmentati...
  • 21 篇 predictive model...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 17 篇 object detection
  • 17 篇 measurement

机构

  • 205 篇 shandong provinc...
  • 204 篇 key laboratory o...
  • 59 篇 college of compu...
  • 58 篇 jiangsu high tec...
  • 45 篇 shandong enginee...
  • 39 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 26 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 21 篇 school of comput...
  • 21 篇 provincial key l...
  • 20 篇 shandong provinc...
  • 19 篇 jiangsu provinci...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 college of infor...
  • 17 篇 jiangsu provinci...
  • 17 篇 jiangsu engineer...
  • 16 篇 shandong provinc...
  • 16 篇 qilu university ...

作者

  • 33 篇 wang ruchuan
  • 19 篇 xiaoming wu
  • 17 篇 yu fei
  • 14 篇 chen yang
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 xiao fu
  • 13 篇 mingle zhou
  • 12 篇 wang jin
  • 11 篇 sun lijuan
  • 11 篇 jing zhao
  • 11 篇 ruchuan wang
  • 11 篇 delong han
  • 11 篇 wang changwei
  • 11 篇 wenpeng lu
  • 10 篇 xiaohui han
  • 10 篇 gang li
  • 10 篇 huang haiping
  • 10 篇 min li
  • 10 篇 xin wang

语言

  • 1,052 篇 英文
  • 72 篇 其他
  • 47 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Network Technology"
1166 条 记 录,以下是261-270 订阅
排序:
Research of Malicious Code Attack Effect Based on Synthetic Entropy Method
收藏 引用
Chinese Journal of Electronics 2023年 第3期22卷 449-454页
作者: LI Peng WANG Ruchuan College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing China
To resolve the problem of assessing the effect of a network attack, this paper combines cross entropy with network character entropy method and proposes scheme to evaluate the malicious code attack effect. It captures... 详细信息
来源: 评论
Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction
Membership Inference Attacks via Dynamic Adversarial Perturb...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zehua Ding Youliang Tian Guorong Wang Jinbo Xiong Jianfeng Ma State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China School of Cyber Engineering Xidian University Xian China
Existing membership inference attacks (MIAs) based on adversarial attacks typically introduce excessively large adversarial perturbations to change the model predictions. However, such methods are not only likely to o... 详细信息
来源: 评论
Unraveling Intricacies: A Decomposition Approach for Few-Shot Multi-Intent Spoken Language Understanding
Unraveling Intricacies: A Decomposition Approach for Few-Sho...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Hua, Wenbin Wang, Yufan Fan, Rui Tu, Xinhui He, Tingting Central China Normal University Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning National Language Resources Monitor Research Center for Network Media Wuhan China Central China Normal University School of Computer Wuhan China Shenzhen Technology University College of Big Data and Internet Shenzhen China Central China Normal University Faculty of Artificial Intelligence in Education Wuhan China
Few-shot multi-intent spoken language understanding (SLU) aims to detect user's multiple intents and key slots using a tiny amount of annotated data. Prevailing multi-intent SLU models typically rely on abundant d... 详细信息
来源: 评论
CHECKWHY: Causal Fact Verification via Argument Structure
arXiv
收藏 引用
arXiv 2024年
作者: Si, Jiasheng Zhao, Yibo Zhu, Yingjie Zhu, Haiyang Lu, Wenpeng Zhou, Deyu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China School of Computer Science and Engineering Southeast University China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Southeast University Ministry of Education China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science China
With the growing complexity of fact verification tasks, the concern with "thoughtful" reasoning capabilities is increasing. However, recent fact verification benchmarks mainly focus on checking a narrow scop... 详细信息
来源: 评论
Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction  23
Membership Inference Attacks via Dynamic Adversarial Perturb...
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
作者: Ding, Zehua Tian, Youliang Wang, Guorong Xiong, Jinbo Ma, Jianfeng Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou China Xidian University School of Cyber Engineering Xian China
Existing membership inference attacks (MIAs) based on adversarial attacks typically introduce excessively large adversarial perturbations to change the model predictions. However, such methods are not only likely to o... 详细信息
来源: 评论
A Multi-Channel Composite Recommendation Method in Federated Learning
A Multi-Channel Composite Recommendation Method in Federated...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber Science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Chen, Shi Li, Qianmu Wang, Qi Zhao, Xinjian Ge, Hao Li, Nianzhe State Grid Jiangsu Information & Telecommunication Company Nanjing China School of Computer Science Ana Engineering Nanjing University of Science and Technology Nanjing China State Grid Smart Grid Research Institute Co. Ltd. State Grid Key Laboratory of Information & Network Security Nanjing China
There are various data security risks in power grid systems, and recommendation systems are a good solution to the selection of security strategies. Federated learning is a machine learning framework that can protect ... 详细信息
来源: 评论
NextSeg: Automatic COVID-19 Lung Infection Segmentation from CT Images Based on Next-ViT
NextSeg: Automatic COVID-19 Lung Infection Segmentation from...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Aimei Dong Ruixin Wang Xuening Zhang Jian Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The spread of COVID-19 has brought great disaster to the world, and automatic segmentation of the infected region can help doctors make a quick diagnosis and reduce workload. However, automatic segmentation of infecte... 详细信息
来源: 评论
Dbfl: Dynamic Byzantine-Robust Privacy Preserving Federated Learning in Heterogeneous Data Scenario
SSRN
收藏 引用
SSRN 2024年
作者: Chen, Xiaoli Tian, Youliang Wang, Shuai Yang, Kedi Zhao, Wei Xiong, Jinbo State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang550025 China Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology Guizhou University Guizhou Guiyang550025 China College of Mathematics and Statistics Guizhou University Guizhou Guiyang550025 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fujian Fuzhou350117 China
Privacy Preserving Federated Learning (PPFL) protects the clients' local data privacy by securely uploading encrypted gradients to the server. However, in real-world scenarios, heterogeneous client data distributi... 详细信息
来源: 评论
A Dirty Data Identification Method in Mechanical Equipment Condition Monitoring
A Dirty Data Identification Method in Mechanical Equipment C...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Huijuan Hao Hongge Zhao Sijian Zhu Yue Feng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Jinan China
The rise of the Industrial Internet of Things (IIOT) has brought new opportunities for the mechanical equipment condition monitoring. The trend towards intelligent and automated production of mechanical equipment has ... 详细信息
来源: 评论
An Approach to New Bearing Fault Diagnosis Utilizing Deep Transfer Learning
An Approach to New Bearing Fault Diagnosis Utilizing Deep Tr...
收藏 引用
Smart World Congress (SWC), IEEE
作者: HuiJuan Hao Yue Feng HongGe Zhao SiJian Zhu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Jinan China
Bearings, serving as crucial components in mechanical equipment, exert a direct influence on the overall performance of the system. Deep transfer learning has garnered significant attention in the realm of intelligent... 详细信息
来源: 评论