咨询与建议

限定检索结果

文献类型

  • 250 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 264 篇 工学
    • 211 篇 计算机科学与技术...
    • 182 篇 软件工程
    • 54 篇 信息与通信工程
    • 27 篇 生物工程
    • 21 篇 控制科学与工程
    • 20 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 14 篇 建筑学
    • 11 篇 网络空间安全
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 农业工程
    • 7 篇 光学工程
  • 129 篇 理学
    • 89 篇 数学
    • 30 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 14 篇 系统科学
    • 9 篇 化学
  • 86 篇 管理学
    • 49 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 33 篇 教育学
    • 33 篇 教育学
  • 16 篇 医学
    • 14 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 3 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 13 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 heuristic algori...
  • 7 篇 access control
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 ontology
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 computational mo...
  • 6 篇 websites
  • 6 篇 algorithm design...
  • 6 篇 genetic algorith...
  • 6 篇 cloud computing
  • 6 篇 cryptography
  • 5 篇 complex networks
  • 5 篇 deep neural netw...
  • 5 篇 information tech...

机构

  • 156 篇 school of inform...
  • 97 篇 shandong provinc...
  • 78 篇 shandong provinc...
  • 18 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 school of softwa...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 13 篇 cluster and grid...
  • 12 篇 shandong normal ...
  • 11 篇 shandong provinc...
  • 11 篇 school of inform...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 7 篇 key laboratory o...

作者

  • 48 篇 liu hong
  • 24 篇 zhang yongsheng
  • 22 篇 zhang huaxiang
  • 21 篇 zheng xiangwei
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 19 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 hu shengshan
  • 12 篇 li minghui
  • 11 篇 xiangwei zheng
  • 9 篇 guijuan zhang
  • 9 篇 liu peiyu
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 9 篇 jin hai
  • 8 篇 zhang leo yu
  • 8 篇 hong wang
  • 8 篇 liu li

语言

  • 377 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory for Distributed Computer Software"
389 条 记 录,以下是111-120 订阅
排序:
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Exploiting Probabilistic Siamese Visual Tracking with a Conditional Variational Autoencoder
Exploiting Probabilistic Siamese Visual Tracking with a Cond...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Wenhui Huang Jason Gu Peiyong Duan Sujuan Hou Yuanjie Zheng School of Information Science and Engineering Shandong Normal University China Dalhousie University Halifax Canada Key Lab of Intelligent Computing & Information Security in Universities of Shandong Shandong Normal University China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University China
Visual tracking is a fundamental capability for robots tasked with humans and environment interaction. However, state-of-the-art visual tracking methods are still prone to failures and are imprecise when applied to ch... 详细信息
来源: 评论
Multiple Feature Fusion-based Video Face Tracking for IoT Big Data
arXiv
收藏 引用
arXiv 2021年
作者: Li, Tianping Liu, Zhifeng Qiao, Jianping Key Laboratory of Medical Physics and Image Processing in Shandong Province Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University School of Physics and Electronics Jinan Shandong China School of Physics and Electronics Shandong Normal University JinanShandong China School of Physics and Electronics Shandong Normal University Jinan China
With the advancement of IoT and artificial intelligence technologies, and the need for rapid application growth in fields such as security entrance control and financial business trade, facial information processing h... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
Epilepsy Classification for Mining Deeper Relationships between EEG Channels based on GCN
Epilepsy Classification for Mining Deeper Relationships betw...
收藏 引用
2020 International Conference on computer Vision, Image and Deep Learning, CVIDL 2020
作者: Chen, Xin Zheng, Yuanjie Niu, Yi Li, Chengiiang Shandong Normal University School of Information Science and Engineering Jinan250358 China Key Lab of Intelligent Computing and Information Security Universities of Shandong Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Institute of Biomedical Sciences Jinan250358 China Department of Electrical Engineering Information Technology Shandong University of Science and Technology Jinan250031 China
Epilepsy is a brain disorder caused by abnormal discharges of neurons in brain. It is one of the most commonly studied disorders in neurology. The research of epilepsy electroencephalogram (EEG) has become a hot resea... 详细信息
来源: 评论
Visualization of fluid simulation: An SPH-based multi-resolution method
Visualization of fluid simulation: An SPH-based multi-resolu...
收藏 引用
作者: Zhang, Guijuan Lu, Dianjie Liu, Hong School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
Fluid simulation is an important research topic since it is widely used in virtual training, education, computer games, and digital entertainment. Generating fluid simulation results with high degree of visual realism... 详细信息
来源: 评论
Reflections and Countermeasures on the Development of Secondary Vocational Teachers’ Teaching Ability Based on AI and Students’ Characteristics
Reflections and Countermeasures on the Development of Second...
收藏 引用
International Conference on Artificial Intelligence and Education (ICAIE)
作者: Lining Liu Yongsheng Zhang Penglong Zhang Wenqian Sun School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
The arrival of the era of artificial intelligence has a great impact on the produce of relationship and mode, resulting in changes in the demand for talents. As an important place to train professional and technical t... 详细信息
来源: 评论
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论
A sensor data processing and storage method for wireless body area networks  10
A sensor data processing and storage method for wireless bod...
收藏 引用
10th International Conference on Information Technology in Medicine and Education, ITME 2019
作者: Han, Lu Xun, Lulu Liu, Jinfa Yin, Wenjun Zheng, Xiangwei Zheng, Zhuoran Shandong Normal University Ji'nan China Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji'nan China
This paper proposes an adaptive processing method and a dynamic storage method of pulsed wave signal based on wireless body area network. Firstly, the ZigBee star network model is adopted as the basic network architec... 详细信息
来源: 评论