咨询与建议

限定检索结果

文献类型

  • 224 篇 会议
  • 202 篇 期刊文献

馆藏范围

  • 426 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 275 篇 工学
    • 226 篇 计算机科学与技术...
    • 193 篇 软件工程
    • 70 篇 信息与通信工程
    • 42 篇 电气工程
    • 35 篇 生物工程
    • 34 篇 控制科学与工程
    • 22 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 12 篇 化学工程与技术
    • 11 篇 交通运输工程
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
  • 124 篇 理学
    • 67 篇 数学
    • 37 篇 生物学
    • 27 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 11 篇 化学
    • 11 篇 系统科学
  • 71 篇 管理学
    • 37 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 14 篇 法学
    • 10 篇 社会学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 19 篇 feature extracti...
  • 17 篇 semantics
  • 14 篇 machine learning
  • 12 篇 privacy
  • 12 篇 training
  • 11 篇 optimization
  • 10 篇 deep learning
  • 10 篇 contrastive lear...
  • 9 篇 federated learni...
  • 9 篇 accuracy
  • 8 篇 task analysis
  • 8 篇 anomaly detectio...
  • 8 篇 graph neural net...
  • 7 篇 conferences
  • 7 篇 computational mo...
  • 7 篇 clustering algor...
  • 7 篇 sensors
  • 7 篇 forecasting
  • 6 篇 data privacy
  • 6 篇 speech processin...

机构

  • 54 篇 school of comput...
  • 42 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 18 篇 key laboratory o...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 chongqing key la...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 10 篇 key laboratory o...
  • 9 篇 key lab. of inte...
  • 9 篇 south china univ...
  • 9 篇 chongqing key la...
  • 9 篇 nanjing universi...
  • 9 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 school of comput...

作者

  • 36 篇 xu xiaolong
  • 28 篇 xiaolong xu
  • 18 篇 wang guoyin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 11 篇 tao li
  • 10 篇 liu jun
  • 10 篇 cao xiaochun
  • 9 篇 xia shuyin
  • 8 篇 xiao bin
  • 8 篇 jia xu
  • 7 篇 chen ke-jia
  • 7 篇 li weisheng
  • 7 篇 zou zhiqiang
  • 7 篇 xuemiao xu
  • 7 篇 shengfeng he
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu

语言

  • 357 篇 英文
  • 67 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Cyberspace Big Data Intelligent Security"
426 条 记 录,以下是141-150 订阅
排序:
DMSACNN: Deep Multiscale Attentional Convolutional Neural Network for EEG-Based Motor Decoding
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Liu, Ke Xing, Xin Yang, Tao Yu, Zhuliang Xiao, Bin Wang, Guoyin Wu, Wei Chongqing University of Posts and Telecommunications School of Computer Science and Technology Chongqing400065 China Chongqing University of Posts and Telecommunications Key Laboratory of Big Data Intelligent Computing China Chongqing University of Posts and Telecommunications Key Laboratory of Cyberspace Big Data Intelligent Security of Ministry of Education China South China University of Technology College of Automation Science and Engineering Guangzhou510641 China Chongqing Normal University National Center for Applied Mathematics in Chongqing Chongqing401331 China Shanghai Jiao Tong University School of Medicine Songjiang Hospital Songjiang Research Institute Shanghai Key Laboratory of Emotions and Affective Disorders Shanghai201600 China
Objective: Accurate decoding of electroencephalogram (EEG) signals has become more significant for the brain-computer interface (BCI). Specifically, motor imagery and motor execution (MI/ME) tasks enable the control o... 详细信息
来源: 评论
Predicting Genotype Information Related to COVID-19 for Molecular Mechanism Based on Computational Methods
收藏 引用
Computer Modeling in Engineering & Sciences 2021年 第10期129卷 31-45页
作者: Lejun Gong Xingxing Zhang Li Zhang Zhihong Gao Jiangsu Key Laboratory of Big Data Security&Intelligent Processing School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210046China Smart Health Big Data Analysis and Location Services Engineering Laboratory of Jiangsu Province Nanjing210046China College of Computer Science and Technology Nanjing Forestry UniversityNanjing210037China Zhejiang Engineering Research Center of Intelligent Medicine Wenzhou325035China
Novel coronavirus disease 2019(COVID-19)is an ongoing health *** studies are related to ***,its molecular mechanism remains *** rapid publication of COVID-19 provides a new way to elucidate its mechanism through compu... 详细信息
来源: 评论
A Variance Minimization Approach to Temporal-Difference Learning
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xingguo Gong, Yu Yang, Shangdong Wang, Wenhao Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China College of Electronic Engineering National University of Defense Technology China
Fast-converging algorithms are a contemporary requirement in reinforcement learning. In the context of linear function approximation, the magnitude of the smallest eigenvalue of the key matrix is a major factor reflec... 详细信息
来源: 评论
D3still: Decoupled Differential Distillation for Asymmetric Image Retrieval
D3still: Decoupled Differential Distillation for Asymmetric ...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Yi Xie Yihong Lin Wenjie Cai Xuemiao Xu Huaidong Zhang Yong Du Shengfeng He South China University of Technology Independent Researcher State Key Laboratory of Subtropical Building Science Guangdong Provincial Key Lab of Computational Intelligence and Cyberspace Information Ministry of Education Key Laboratory of Big Data and Intelligent Robot Ocean University of China Singapore Management University
Existing methods for asymmetric image retrieval employ a rigid pairwise similarity constraint between the query network and the larger gallery network. However, these one-to-one constraint approaches often fail to mai... 详细信息
来源: 评论
A Virtual Network Mapping Method Based on Compound Particle Swarm Optimization  7
A Virtual Network Mapping Method Based on Compound Particle ...
收藏 引用
7th International Conference on Cyber security and Information Engineering, ICCSIE 2022
作者: Huang, Jianhua Tang, Yunlong Wei, Yongjun Wang, Huan Zhang, Haifeng Zhang, Bing School of Computer Science and Technology School of Software Guangxi University of Science and Technology Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Guangxi Education System Network Security Monitoring Center Liuzhou China Liuzhou Railway Vocational Technical College Liuzhou China
Aiming at problems of low credibility of results and low accuracy of the scheme in the mapping process of virtual networks. It is suggested to use a composite particle swarm optimization approach for virtual network m... 详细信息
来源: 评论
EvoSampling: A Granular Ball-based Evolutionary Hybrid Sampling with Knowledge Transfer for Imbalanced Learning
arXiv
收藏 引用
arXiv 2024年
作者: Pei, Wenbin Dai, Ruohao Xue, Bing Zhang, Mengjie Zhang, Qiang Cheung, Yiu-Ming Xia, Shuyin The School of Computer Science and Technology Dalian University of Technology Dalian116024 China Ministry of Education Dalian116024 China The School of Engineering and Computer Science Victoria University of Wellington PO Box 600 Wellington6140 New Zealand The Department of Computer Science Hong Kong Baptist University Hong Kong The Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China
Class imbalance would lead to biased classifiers that favor the majority class and disadvantage the minority class. Unfortunately, from a practical perspective, the minority class is of importance in many real-life ap...
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features  38
Not All Diffusion Model Activations Have Been Evaluated as D...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task...
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques  38
Suppress Content Shift: Better Diffusion Features via Off-th...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Reducing Traffic Wastage in Video Streaming via Bandwidth-Efficient Bitrate Adaptation
arXiv
收藏 引用
arXiv 2024年
作者: Su, Hairong Wang, Shibo Yang, Shusen Huang, Tianchi Ren, Xuebin National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University China Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University China R&D department Sony
Bitrate adaptation (also known as ABR) is a crucial technique to improve the quality of experience (QoE) for video streaming applications. However, existing ABR algorithms suffer from severe traffic wastage, which ref... 详细信息
来源: 评论