咨询与建议

限定检索结果

文献类型

  • 109 篇 会议
  • 80 篇 期刊文献

馆藏范围

  • 189 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 130 篇 工学
    • 81 篇 计算机科学与技术...
    • 64 篇 软件工程
    • 43 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 16 篇 电气工程
    • 15 篇 仪器科学与技术
    • 14 篇 控制科学与工程
    • 12 篇 船舶与海洋工程
    • 9 篇 机械工程
    • 8 篇 网络空间安全
    • 7 篇 生物工程
    • 4 篇 动力工程及工程热...
    • 4 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
  • 57 篇 理学
    • 31 篇 数学
    • 29 篇 物理学
    • 12 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 系统科学
    • 4 篇 海洋科学
  • 31 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 8 篇 法学
    • 4 篇 法学
    • 4 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 医学

主题

  • 7 篇 costs
  • 6 篇 data privacy
  • 6 篇 oceans
  • 6 篇 signal to noise ...
  • 6 篇 time-frequency a...
  • 6 篇 semantics
  • 6 篇 feature extracti...
  • 6 篇 security
  • 6 篇 blockchain
  • 6 篇 federated learni...
  • 6 篇 accuracy
  • 6 篇 privacy
  • 5 篇 underwater acous...
  • 5 篇 protocols
  • 5 篇 cryptography
  • 4 篇 simulation
  • 4 篇 target tracking
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 estimation

机构

  • 49 篇 college of under...
  • 24 篇 acoustic science...
  • 20 篇 key laboratory o...
  • 19 篇 the state key la...
  • 18 篇 national key lab...
  • 9 篇 key laboratory o...
  • 8 篇 state key labora...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 guilin universit...
  • 6 篇 institute of blo...
  • 6 篇 harbin engineeri...
  • 6 篇 guizhou universi...
  • 5 篇 school of comput...
  • 5 篇 weifang universi...
  • 5 篇 college of compu...
  • 5 篇 harbin engineeri...
  • 5 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 beijing key labo...

作者

  • 11 篇 chen yuling
  • 9 篇 qiao gang
  • 5 篇 liu zhenguang
  • 5 篇 wu yongtang
  • 5 篇 jiao yingying
  • 4 篇 yin yifang
  • 4 篇 wu sifan
  • 4 篇 chen haipeng
  • 4 篇 gang qiao
  • 4 篇 yao yanqing
  • 3 篇 yin jingwei
  • 3 篇 liu xin
  • 3 篇 li yong
  • 3 篇 liu songzuo
  • 3 篇 xiao han
  • 3 篇 xie jinhuai
  • 3 篇 xia xin
  • 3 篇 zhang haigang
  • 3 篇 lo david
  • 3 篇 qian xiaobin

语言

  • 179 篇 英文
  • 8 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory in Blockchain and Data Security by Ministry of Industry and Information Technology"
189 条 记 录,以下是161-170 订阅
排序:
An Improved Privacy-Preserving Stochastic Gradient Descent Algorithm  3rd
An Improved Privacy-Preserving Stochastic Gradient Descent A...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Cheng, Xianfu Yao, Yanqing Liu, Ao State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Key Laboratory of Aerospace Network Security Ministry of Industry and Information Technology School of Cyberspace Science and Technology Beihang University Beijing100191 China Beijing Key Laboratory of Network Technology Beihang University Beijing100191 China
Deep learning techniques based on neural network have made significant achievements in various fields of Artificial Intelligence. However, model training requires large-scale datasets, these datasets are crowd-sourced... 详细信息
来源: 评论
Similarity Algorithm Based on Minimum Tilt Outer Rectangle Clustering of UAV Videos
Similarity Algorithm Based on Minimum Tilt Outer Rectangle C...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Wei Ding Luyao Wang Wei Zhang Myung Jin Lee Ling Wang Kwang Woo Nam Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Industry-University Cooperstion Foundation Chungbuk National University Cheongju Korea School of Computer Science Northeast Electric Power University Jilin China School of Computer Science and Engineering Kunsan National University Gunsan Korea
In this paper, we propose a new UAV video similarity measurement algorithm to cluster and analyze UAV videos by measuring the similarity between UAV videos and train them in sub-groups, which in turn improves the effi... 详细信息
来源: 评论
An intelligent file transfer optimization for poor network conditions  6th
An intelligent file transfer optimization for poor network c...
收藏 引用
6th International Symposium on security and Privacy in Social Networks and Big data, SocialSec 2020
作者: Yan, Ming Zhang, Bo Zhao, Gang Kuang, Xiaohui Liu, Lu Zhang, Ruyun School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China Institute of Artificial Intelligence and Blockchain Guangzhou University Guangzhou China Information Center of Ministry of Human Resources and Social Security Beijing100090 China National Key Laboratory of Science and Technology on Information System Security Beijing100091 China Zhejiang Lab HangzhouZhejiang Province China
File transfer is based on the reliable TCP protocol. However, when the network is of poor quality, TCP-based transmission will still perform less effectively due to some reasons. Existing approaches mainly optimize fi... 详细信息
来源: 评论
Scattering modulation of sound waves by underwater oscillating cylinder and surrounding perturbed flow
收藏 引用
Ocean Engineering 2025年 335卷
作者: Chenxuan Jing Shengguo Shi Xuezhi Li Song Li Jiangyi Zhang Desen Yang National Key Laboratory of Underwater Acoustic Technology Harbin Engineering University Harbin 150001 China Key Laboratory of Marine Information Acquisition and Security Ministry of Industry and Information Technology Harbin 150001 China College of Underwater Acoustic Engineering Harbin Engineering University Harbin 150001 China
Numerical and experimental investigations are conducted to analyze the modulation of sound wave scattering caused by the underwater oscillating cylinder and its surrounding perturbed flow. A numerical analysis method ...
来源: 评论
Tailor: Inter-Feature Distinction Filter Fusion Pruningtailor: Inter-Feature Distinction Filter Fusion Pruning
SSRN
收藏 引用
SSRN 2023年
作者: Han, Xuming Chu, Yali Wang, Ke Wang, Limin Yue, Lin Ding, Weiping Gu, Tianlong Weng, Jian College of Information and Science Jinan University Guangzhou510632 China School of Mathematics and Statistics Changchun University of Technology Jilin130000 China Trusted AI Engineering Research Center Ministry of Education Jinan University Guangzhou510632 China School of Artificial Intelligence and Digital Economy Industry Guangdong University of Finance and Economics Guangzhou510320 China University of Newcastle Australia School of Information and Science Nantong University Nantong China Engineering Research Center of Trustworthy AI Ministry of Education Jinan University China Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China
Filter pruning is an effective compression method for slimming deep convolutional neural networks by removing the partial structure of the network without sacrificing performance. The pruning criteria directly affect ... 详细信息
来源: 评论
Statistical analysis of time-varying channel for underwater acoustic communication and network
Statistical analysis of time-varying channel for underwater ...
收藏 引用
Frontiers of information technology (FIT)
作者: Honglu Yan Tianlong Ma Chenyu Pan Yanan Liu Songzuo Liu Acoustic Science and Technology Laboratory Harbin Engineering University Harbin China Ministry of Industry and Information Technology Key Laboratory of Marine Information Acquisition and Security (Harbin Engineering University) Harbin China College of Underwater Acoustic Engineering Harbin Engineering University Harbin China
The spatial-temporal random variation characteristics of underwater acoustic channel make the difference among the underwater acoustic communication network link channels, which make network performance difficult to p... 详细信息
来源: 评论
Secure and Privacy-preserving data-sharing Framework based on blockchain technology for Al-Najaf/Iraq Oil Refinery  19
Secure and Privacy-preserving Data-sharing Framework based o...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Umran, Samir M. Lu, SongFeng Abduljabbar, Zaid Ameen Lu, Zhi Feng, Bingyan Zheng, Lu Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Iraqi Cement State Company Ministry of Industry and Minerals Baghdad10011 Iraq Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057 China University of Basrah College of Education for Pure Sciences Iraq Al-Kunooze University College Technical Computer Engineering Department Basrah Iraq Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan430074 China Industrial Internet Research Institute Wuhan Huazhong Numerical Control Co. Ltd Wuhan430074 China South-Central University for Nationalities College of Computer Science Wuhan430074 China
The Industrial Internet of Things or industry 4.0 efficiently enhances the manufacturing process in terms of raising productivity, system performance, cost reduction, and building large-scale systems. It enables the c... 详细信息
来源: 评论
Automated classification of humpback whale calls in four regions using convolutional neural networks and multi scale deep feature aggregation (MSDFA)
收藏 引用
Measurement 2025年 255卷
作者: Ali Raza Sun Zongxin Gang Qiao Mubeen Javed Muhammad Bilal Habib Hussain Zuberi Muhammad Mohsin Acoustic Science and Technology Laboratory Harbin Engineering University Harbin 150001 China Key Laboratory of Marine Information Acquisition and Security Harbin Engineering University Ministry of Industry and Information Technology Harbin 150001 China College of Underwater Acoustic Engineering Harbin Engineering University Harbin 150001 China
Classifying humpback whale calls plays a vital role in understanding the ecological behavior and social communication patterns of marine mammals in diverse underwater environments. This study explores the impact of re...
来源: 评论
Target detection algorithm in side-scan sonar image based on pixel importance value measurement
收藏 引用
Chinese Journal of Acoustics 2020年 第3期39卷 329-340页
作者: BIAN Hongyu CHEN Yiming ZHANG Zhigang WEI Mingzhe Acoustic Science and Technology Laboratory Harbin Engineering UniversityHarbin 150001 Peng Cheng Laboratory Shenzhen 518000 Key Laboratory of Marine Information Acquisition and Security(Harbin Engineering University) Ministry of Industry and Information TechnologyHarbin 150001 College of Underwater Acoustic Engineering Harbin Engineering UniversityHarbin 150001 Intelligence and Information Engineering College Tangshan UniversityTangshan 063000
Side-scan sonar detection application always combines with unstable results.A two-stage novel pixel importance value measurement algorithm is proposed to stabilize the detection ability and false alarm probability ***... 详细信息
来源: 评论
DE-RSTC: A rational secure two-party computation protocol based on direction entropy
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Yuling Ma, Juan Wang, Xianmin Zhang, Xinyu Zhou, Huiyu State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University Of Electronic Technology Guilin541000 China Institute of Artificial Intelligence and Blockchain Guangzhou University Guangzhou510000 China University of Leicester LeicesterLe1 7RH United Kingdom
Rational secure multi-party computation (RSMC) means two or more rational parties to complete a function on private inputs. In the process, the rational parties choose strategies to maximize utility, which will cause ... 详细信息
来源: 评论