咨询与建议

限定检索结果

文献类型

  • 109 篇 会议
  • 84 篇 期刊文献

馆藏范围

  • 193 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 134 篇 工学
    • 85 篇 计算机科学与技术...
    • 67 篇 软件工程
    • 45 篇 信息与通信工程
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 控制科学与工程
    • 15 篇 仪器科学与技术
    • 12 篇 船舶与海洋工程
    • 10 篇 网络空间安全
    • 9 篇 机械工程
    • 7 篇 生物工程
    • 4 篇 动力工程及工程热...
    • 4 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
  • 59 篇 理学
    • 32 篇 数学
    • 30 篇 物理学
    • 12 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 系统科学
    • 4 篇 海洋科学
  • 33 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 11 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 9 篇 法学
    • 5 篇 社会学
    • 4 篇 法学
  • 3 篇 文学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 7 篇 data privacy
  • 7 篇 costs
  • 7 篇 blockchain
  • 6 篇 oceans
  • 6 篇 signal to noise ...
  • 6 篇 time-frequency a...
  • 6 篇 semantics
  • 6 篇 feature extracti...
  • 6 篇 security
  • 6 篇 federated learni...
  • 6 篇 accuracy
  • 6 篇 privacy
  • 5 篇 underwater acous...
  • 5 篇 protocols
  • 5 篇 cryptography
  • 4 篇 simulation
  • 4 篇 target tracking
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 estimation

机构

  • 48 篇 college of under...
  • 23 篇 acoustic science...
  • 19 篇 the state key la...
  • 19 篇 key laboratory o...
  • 18 篇 national key lab...
  • 8 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 7 篇 institute of blo...
  • 7 篇 state key labora...
  • 6 篇 guilin universit...
  • 6 篇 harbin engineeri...
  • 6 篇 guizhou universi...
  • 5 篇 school of comput...
  • 5 篇 weifang universi...
  • 5 篇 college of compu...
  • 5 篇 harbin engineeri...
  • 5 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 beijing key labo...

作者

  • 11 篇 chen yuling
  • 9 篇 qiao gang
  • 5 篇 liu zhenguang
  • 5 篇 wu yongtang
  • 5 篇 jiao yingying
  • 4 篇 yin yifang
  • 4 篇 liu songzuo
  • 4 篇 wu sifan
  • 4 篇 chen haipeng
  • 4 篇 yao yanqing
  • 3 篇 yin jingwei
  • 3 篇 yang ziqi
  • 3 篇 liu xin
  • 3 篇 li yong
  • 3 篇 xiao han
  • 3 篇 xie jinhuai
  • 3 篇 xia xin
  • 3 篇 shang zhigang
  • 3 篇 zhang haigang
  • 3 篇 qin zhan

语言

  • 183 篇 英文
  • 8 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory in Blockchain and Data Security by Ministry of Industry and Information Technology"
193 条 记 录,以下是11-20 订阅
排序:
Mamba Adapter: Efficient Multi-Modal Fusion for Vision-Language Tracking
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Shi, Liangtao Zhong, Bineng Liang, Qihua Hu, Xiantao Mo, Zhiyi Song, Shuxiang Ministry of Education Guangxi Normal University Key Laboratory of Education Blockchain and Intelligent Technology Guilin541004 China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security Guilin541004 China Wuzhou University School of Data Science and Software Engineering Wuzhou543002 China
Utilizing the high-level semantic information of language to compensate for the limitations of vision information is a highly regarded approach in single-object tracking. However, most existing vision-language (VL) tr... 详细信息
来源: 评论
High-gain long-time coherent integration for tones from moving targets via time warping
收藏 引用
Journal of the Acoustical Society of America 2025年 第5期157卷 3793-3805页
作者: Chen, Yu Qiu, Longhao Li, Ying Liang, Guolong Gao, Yongshuai Du, Zhiyao National Key Laboratory of Underwater Acoustic Technology Harbin Engineering University Harbin 150001 China Key Laboratory of Marine Information Acquisition and Security Ministry of Industry and Information Technology Harbin Engineering University Harbin 150001 China College of Underwater Acoustic Engineering Harbin Engineering University Harbin 150001 China
The radiated noise from ships is notably characterized by their tonal properties, making tone detection essential for passive sonar systems. The fast Fourier transform plays a crucial role in this process, but Doppler... 详细信息
来源: 评论
Causal-Inspired Multitask Learning for Video-Based Human Pose Estimation
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Haipeng Wu, Sifan Wang, Zhigang Yin, Yifang Jiao, Yingying Lyu, Yingda Liu, Zhenguang College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China College of Computer Science and Technology Zhejiang Gongshang University China A*STAR Singapore Public Computer Education and Research Center Jilin University China The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China
Video-based human pose estimation has long been a fundamental yet challenging problem in computer vision. Previous studies focus on spatio-temporal modeling through the enhancement of architecture design and optimizat... 详细信息
来源: 评论
Accurate, Secure, and Efficient Semi-Constrained Navigation Over Encrypted City Maps
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2642-2658页
作者: Li, Meng Chen, Yifei Gao, Jianbo Wu, Jingyu Zhang, Zijian He, Jialing Zhu, Liehuang Conti, Mauro Lin, Xiaodong Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Hefei230002 China Hefei University of Technology School of Computer Science and Information Engineering Hefei230002 China Hefei University of Technology Anhui Province Key Laboratory of Industry Safety and Emergency Technology Intelligent Interconnected Systems Laboratory of Anhui Province Hefei230002 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100811 China University of Science and Technology of China School of Computer Science and Technology Hefei230026 China Beijing Institute of Technology Southeast Institute of Information Technology Fujian Putian351100 China Chongqing University College of Computer Science Chongqing400044 China University of Padua Department of Mathematics HIT Center Padua35131 Italy Delft University of Technology Faculty of Electrical Engineering Mathematics and Computer Science Delft2628 CD Netherlands University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Navigation services enable users to find the shortest path from a starting point S to a destination D, reducing time, gas, and traffic congestion. Still, navigation users risk the exposure of their sensitive location ... 详细信息
来源: 评论
A data Association Method Based on Azimuth Inverse Cotangent Value
A Data Association Method Based on Azimuth Inverse Cotangent...
收藏 引用
International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE)
作者: Nan Zou Muze Yin Guangpu Zhang Zhenqi Yang Pengbo Ma Dongyu Li National Key Laboratory of Underwater Acoustic Technology Harbin Engineering University Harbin China Key Laboratory of Marine Information Acquisition and Security (Harbin Engineering University) Ministry of Industry and Information Technology Harbin China College of Underwater Acoustic Engineering Harbin Engineering University Harbin China Science and Technology on Electronic Information Control Laboratory Chengdu China
In this paper, we address the challenge of data association in scenarios involving multiple observers for underwater non-cooperative localization, where it is unclear how measurement data from different stations corre... 详细信息
来源: 评论
Research on DOA Estimation Method of Vector Hydrophone Array in Low SNR Based on CNN
Research on DOA Estimation Method of Vector Hydrophone Array...
收藏 引用
International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE)
作者: Nan Zou Yueming Li Jin Fu Guangpu Zang Zhiyao Du Yanhe Li National Key Laboratory of Underwater Acoustic Technology Key Laboratory of Marine Information Acquisition and Security(Harbin Engineering University) Ministry of Industry and Information Technology College of Underwater Acoustic Engineering Harbin Engineering University Harbin China College of Underwater Acoustic Engineering School of Electronic and Information EngineeringBeihang University Beijing China
This paper presents a direction of arrival (DOA) estimation method for vector sensor arrays based on convolutional neural networks (CNN) to improve the estimation accuracy. The model consists of four convolutional lay... 详细信息
来源: 评论
Exploiting Robust Model Watermarking Against the Model Fine-Tuning Attack via Flat Minima Aware Optimizers
Exploiting Robust Model Watermarking Against the Model Fine-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Dongdong Lin Yue Li Bin Li Jiwu Huang Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China SZU-AFS Joint Innovation Center for AI Technology Shenzhen University Shenzhen China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Xiamen China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University Shenzhen China
With the rapid advancement of deep neural networks (DNNs), model watermarking has emerged as a widely adopted technique for safeguarding model copyrights. A prevalent method involves utilizing a watermark decoder to r... 详细信息
来源: 评论
THC-DL: Three-Party Homomorphic Computing Delegation Learning for Secure Optimization
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yang, Ze Tian, Youliang Xiong, Jinbo Niu, Kun Li, Mengqian Zhang, Xinyu Ma, Jianfeng Guizhou University Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology College of Computer Science and Technology Guiyang550025 China Guizhou University College of Big Data and Information Engineering Guiyang550025 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Xidian University State Key Laboratory of Integrated Services Network School of Cyber Engineering Xi’an710071 China
Delegation Learning(DL) flourishes data sharing, enabling agents to delegate data to the cloud for model training. To preserve privacy, homomorphic encryption (HE) offers an effective solution for privacy-preserving m... 详细信息
来源: 评论
Efficient Adaptive Label Refinement for label noise learning
收藏 引用
Neurocomputing 2025年 639卷
作者: Zhang, Wenzhen Cheng, Debo Lu, Guangquan Zhou, Bo Li, Jiaye Zhang, Shichao School of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guangxi Guilin541004 China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Guilin541004 China School of Computer Science and Technology Hainan University Hainan Haikou570228 China Guangxi Collaborative Innovation Center of Modern Sericulture and Silk Hechi University Guangxi Hechi546300 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou310027 China
Deep neural networks are highly susceptible to overfitting noisy labels, which leads to degraded performance. Existing methods address this issue by employing complex manually designed strategies, aiming to achieve op... 详细信息
来源: 评论
Cross-Domain Animal Pose Estimation with Skeleton Anomaly-Aware Learning
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Han, Le Chen, Kaixuan Zhao, Lei Jiang, Yangbo Wang, Pengfei Zheng, Nenggan Zhejiang Hangzhou310007 China Zhejiang University College of Computer Science and Technology Zhejiang Hangzhou310007 China Zhejiang University State Key Laboratory of Blockchain and Data Security Zhejiang Hangzhou310007 China Institute of Blockchain and Data Security. China Zhejiang University School of Software Technology Ningbo China Zhejiang University State Key Lab of Brain-Machine Intelligence Hangzhou310007 China Zhejiang Provincial Government ZJU Collaborative Innovation Center for Artificial Intelligence by MOE Hangzhou310007 China Bengbu University School of Computer and Information Engineering Bengbu233030 China
Animal pose estimation is often constrained by the scarcity of annotations and the diversity of scenarios and species. The pseudo-label generation based unsupervised domain adaptation paradigm, which discriminates the... 详细信息
来源: 评论