咨询与建议

限定检索结果

文献类型

  • 223 篇 会议
  • 209 篇 期刊文献

馆藏范围

  • 432 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 295 篇 工学
    • 238 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 78 篇 信息与通信工程
    • 55 篇 电气工程
    • 43 篇 控制科学与工程
    • 34 篇 生物工程
    • 22 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 12 篇 交通运输工程
    • 11 篇 化学工程与技术
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
    • 7 篇 安全科学与工程
  • 128 篇 理学
    • 70 篇 数学
    • 36 篇 生物学
    • 27 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 11 篇 系统科学
    • 10 篇 化学
  • 74 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 14 篇 法学
    • 10 篇 社会学
  • 9 篇 医学
    • 8 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 19 篇 feature extracti...
  • 17 篇 semantics
  • 15 篇 machine learning
  • 13 篇 contrastive lear...
  • 12 篇 privacy
  • 11 篇 graph neural net...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 optimization
  • 8 篇 task analysis
  • 8 篇 anomaly detectio...
  • 8 篇 federated learni...
  • 7 篇 conferences
  • 7 篇 sensors
  • 7 篇 forecasting
  • 6 篇 data privacy
  • 6 篇 speech processin...
  • 6 篇 neural networks
  • 6 篇 data mining
  • 6 篇 computational mo...

机构

  • 54 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 20 篇 key laboratory o...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 chongqing key la...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 10 篇 key laboratory o...
  • 9 篇 key lab. of inte...
  • 9 篇 south china univ...
  • 9 篇 nanjing universi...
  • 9 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 school of comput...
  • 8 篇 chongqing key la...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 20 篇 wang guoyin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 11 篇 tao li
  • 10 篇 xia shuyin
  • 10 篇 liu jun
  • 10 篇 cao xiaochun
  • 8 篇 xiao bin
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 chen ke-jia
  • 7 篇 zou zhiqiang
  • 7 篇 xuemiao xu
  • 7 篇 shengfeng he
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang

语言

  • 372 篇 英文
  • 58 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Cyberspace Big Data Intelligent Security"
432 条 记 录,以下是291-300 订阅
排序:
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail Problems
arXiv
收藏 引用
arXiv 2022年
作者: Hou, Wenzheng Xu, Qianqian Yang, Zhiyong Bao, Shilong He, Yuan Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Alibaba Group Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen China
It is well-known that deep learning models are vulnerable to adversarial examples. Existing studies of adversarial training have made great progress against this challenge. As a typical trait, they often assume that t... 详细信息
来源: 评论
A Tutorial on Movable Antennas for Wireless Networks
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Zhu, Lipeng Ma, Wenyan Mei, Weidong Zeng, Yong Wu, Qingqing Ning, Boyu Xiao, Zhenyu Shao, Xiaodan Zhang, Jun Zhang, Rui National University of Singapore Department of Electrical and Computer Engineering 117583 Singapore National Key Laboratory of Wireless Communications Chengdu611731 China Southeast University National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Purple Mountain Laboratories Nanjing211111 China Shanghai Jiao Tong University Department of Electronic Engineering Shanghai200240 China Beihang University School of Electronic and Information Engineering Beijing100191 China University of Waterloo Department of Electrical and Computer Engineering WaterlooONN2L 3G1 Canada Beijing Institute of Technology State Key Laboratory of CNS/ATM Miit Key Laboratory of Complex-field Intelligent Sensing Beijing100081 China The Chinese University of HongKong School of Science and Engineering Shenzhen Research Institute of Big Data Guangdong Shenzhen518172 China
Movable antenna (MA) has been recognized as a promising technology to enhance the performance of wireless communication and sensing by enabling antenna movement. Such a significant paradigm shift from conventional fix... 详细信息
来源: 评论
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs
PSSPR: A Source Location Privacy Protection Scheme Based on ...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Jing Sun Yuling Chen Tao Li Jia Liu Yixian Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Air Force Engineering University Xi'an China School of Cyberspace Security Beijing University of Posts and Telecommnuications Beijing China
Source location privacy, occupying an unshakable status in wireless sensor networks, has a profound influence on the widespread application of wireless sensor networks (WSNs). Most privacy policies that introduce phan... 详细信息
来源: 评论
Learning Task-aware Robust Deep Learning Systems
arXiv
收藏 引用
arXiv 2020年
作者: Han, Keji Li, Yun Long, Xianzhong Ge, Yao Nanjing University of Posts and Telecommunications China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing
Many works demonstrate that deep learning system is vulnerable to adversarial attack. A deep learning system consists of two parts: the deep learning task and the deep model. Nowadays, most existing works investigate ... 详细信息
来源: 评论
A Review of Multimodal Explainable Artificial Intelligence: Past, Present and Future
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Shilin An, Wenbin Tian, Feng Nan, Fang Liu, Qidong Liu, Jun Shah, Nazaraf Chen, Ping School of Computer Science and Technology Xi’an Jiaotong University Xi’an710049 China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an710049 China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an710049 China Institute for Future Transport and Cities Coventry University Priory Street CoventryCV1 5FB United Kingdom Department of Engineering University of Massachusetts Boston BostonMA02125 United States
Artificial intelligence (AI) has rapidly developed through advancements in computational power and the growth of massive datasets. However, this progress has also heightened challenges in interpreting the "black-... 详细信息
来源: 评论
The Minority Matters: A Diversity-Promoting Collaborative Metric Learning Algorithm
arXiv
收藏 引用
arXiv 2022年
作者: Bao, Shilong Xu, Qianqian Yang, Zhiyong He, Yuan Cao, Xiaochun Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Alibaba Group China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China Peng Cheng Laboratory China
Collaborative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collaborative Filtering. Following the convention of RS, existin... 详细信息
来源: 评论
The minority matters: a diversity-promoting collaborative metric learning algorithm  22
The minority matters: a diversity-promoting collaborative me...
收藏 引用
Proceedings of the 36th International Conference on Neural Information Processing Systems
作者: Shilong Bao Qianqian Xu Zhiyong Yang Yuan He Xiaochun Cao Qingming Huang State Key Laboratory of Information Security Institute of Information Engineering CAS and School of Cyber Security University of Chinese Academy of Sciences Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS School of Computer Science and Tech. University of Chinese Academy of Sciences Alibaba Group School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and School of Computer Science and Tech. University of Chinese Academy of Sciences and Key Laboratory of Big Data Mining and Knowledge Management CAS and Peng Cheng Laboratory
Collaborative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collaborative Filtering. Following the convention of RS, existin...
来源: 评论
Domain generalization for document authentication against practical recapturing attacks
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Changsheng Zhang, Shuzheng Lan, Fengbo Huang, Jiwu The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Recapturing attack can be employed as a simple but effective anti-forensic tool for digital document images. Inspired by the document inspection process that compares a questioned document against a reference sample, ... 详细信息
来源: 评论
Deep learning-based forgery attack on document images
arXiv
收藏 引用
arXiv 2021年
作者: Zhao, Lin Chen, Changsheng Huang, Jiwu the Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
With the ongoing popularization of online services, the digital document images have been used in various applications. Meanwhile, there have emerged some deep learning-based text editing algorithms which alter the te... 详细信息
来源: 评论
Deep Learning Algorithms Design and Implementation Based on Differential Privacy  3rd
Deep Learning Algorithms Design and Implementation Based on ...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Xu, Xuefeng Yao, Yanqing Cheng, Lei Key Laboratory of Aerospace Network Security Ministry of industry and information technology School of Cyberspace Science and Technology Beihang University Beijing100191 China State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Beijing Key Laboratory of Network Technology Beihang University Beijing China Shenzhen Research Institute of Big Data Shenzhen518000 China
Deep learning models bear the risks of privacy leakage. Attackers can obtain sensitive information contained in training data with some techniques. However, existing differentially private methods such as Differential... 详细信息
来源: 评论