咨询与建议

限定检索结果

文献类型

  • 209 篇 期刊文献
  • 202 篇 会议

馆藏范围

  • 411 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 273 篇 工学
    • 217 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 66 篇 信息与通信工程
    • 45 篇 电气工程
    • 34 篇 生物工程
    • 32 篇 控制科学与工程
    • 22 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 11 篇 化学工程与技术
    • 11 篇 交通运输工程
    • 11 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
  • 118 篇 理学
    • 61 篇 数学
    • 36 篇 生物学
    • 27 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 11 篇 系统科学
    • 10 篇 化学
  • 73 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 8 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 19 篇 feature extracti...
  • 17 篇 semantics
  • 15 篇 machine learning
  • 12 篇 privacy
  • 11 篇 contrastive lear...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 optimization
  • 8 篇 task analysis
  • 8 篇 anomaly detectio...
  • 8 篇 federated learni...
  • 7 篇 conferences
  • 7 篇 graph neural net...
  • 7 篇 sensors
  • 7 篇 forecasting
  • 6 篇 data privacy
  • 6 篇 speech processin...
  • 6 篇 neural networks
  • 6 篇 data mining
  • 6 篇 computational mo...

机构

  • 54 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 14 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 9 篇 key lab. of inte...
  • 9 篇 nanjing universi...
  • 9 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 school of comput...
  • 8 篇 south china univ...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 8 篇 nanjing universi...

作者

  • 36 篇 xu xiaolong
  • 25 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 11 篇 yang zhiyong
  • 11 篇 tao li
  • 10 篇 cao xiaochun
  • 9 篇 liu jun
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 chen ke-jia
  • 7 篇 zou zhiqiang
  • 7 篇 xuemiao xu
  • 7 篇 shengfeng he
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang

语言

  • 378 篇 英文
  • 32 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Cyberspace Big Data Intelligent Security"
411 条 记 录,以下是51-60 订阅
排序:
Learning Preconditioners in Gates-controlled Deep Unfolding Networks based on Quasi-Newton Methods For Accelerated MRI Reconstruction
Learning Preconditioners in Gates-controlled Deep Unfolding ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xiaoyu Qiao Weisheng Li Bin Xiao Yuping Huang Lijian Yang Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Deep unfolding networks (DUNs) have made significant progress in MRI reconstruction, successfully tackling the problem of prolonged imaging time. However, the ill-conditioned nature of MRI reconstruction often causes ... 详细信息
来源: 评论
Stacking U-Nets in U-shape: Redesigning the Information Flow in Model-based Networks for MRI Reconstruction
Stacking U-Nets in U-shape: Redesigning the Information Flow...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xiaoyu Qiao Weisheng Li Bin Xiao Yuping Huang Lijian Yang Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Model-based networks have shown convincing performance in MRI reconstruction. However, the unrolled cascades within the networks are constrained to solely obtain information from the preceding counterpart, resulting i... 详细信息
来源: 评论
A Privacy Leak Detection Mechanism based on Service Binding  10
A Privacy Leak Detection Mechanism based on Service Binding
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Wang, Boyang He, Jinling Du, Yuanhan Tang, Ming Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
With the development of mobile technology, users gradually store financial information and personal privacy data on mobile terminals, which makes mobile security particularly important. In order to effectively improve... 详细信息
来源: 评论
FBOD: An Outlier Detection Algorithm based on data Features Suitable for Processing Large-scale datasets on Distributed Platforms  10
FBOD: An Outlier Detection Algorithm based on Data Features ...
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Zhao, Jinbo He, Jinling Song, Hu Cheng, Xinyun Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
The primary objective of outlier detection is to identify values that are significantly different from other data in the dataset. However, most of the current algorithms are effective for small-scale data and their pe... 详细信息
来源: 评论
IMPRESS: an importance-informed multi-tier prefix KV storage system for large language model inference  25
IMPRESS: an importance-informed multi-tier prefix KV storage...
收藏 引用
Proceedings of the 23rd USENIX Conference on File and Storage Technologies
作者: Weijian Chen Shuibing He Haoyang Qu Ruidong Zhang Siling Yang Ping Chen Yi Zheng Baoxing Huai Gang Chen The State Key Laboratory of Blockchain and Data Security Zhejiang University and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security and Zhejiang Key Laboratory of Big Data Intelligent Computing The State Key Laboratory of Blockchain and Data Security Zhejiang University Huawei Cloud
Modern advanced large language model (LLM) applications often prepend long contexts before user queries to improve model output quality. These contexts frequently repeat, either partially or fully, across multiple que...
来源: 评论
A Low-Rank Matching Attention Based Cross-Modal Feature Fusion Method for Conversational Emotion Recognition
收藏 引用
IEEE Transactions on Affective Computing 2024年 第2期16卷 1177-1189页
作者: Shou, Yuntao Liu, Huan Cao, Xiangyong Meng, Deyu Dong, Bo Xi'An Jiaotong School of Computer Science and Technology Ministry of Education Key Laboratory for Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi'an710049 China Xi'An Jiaotong School of Computer Science and Technology Shaanxi Xi'an710049 China BigKEJoint Innovation Center SHMEEA Shanghai China Xi'An Jiaotong University School of Mathematics and Statistics Xi'an China
Conversational emotion recognition (CER) is an important research topic in human-computer interactions. Although recent advancements in transformer-based cross-modal fusion methods have shown promise in CER tasks, the... 详细信息
来源: 评论
GBFRS: Robust Fuzzy Rough Sets via Granular-ball Computing
arXiv
收藏 引用
arXiv 2025年
作者: Xia, Shuyin Lian, Xiaoyu Sang, Binbin Wang, Guoyin Gao, Xinbo Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China College of Computer and Information Science the National Center for Applied Mathematics in Chongqing Chongqing Normal University Chongqing401331 China
Fuzzy rough set theory is effective for processing datasets with complex attributes, supported by a solid mathematical foundation and closely linked to kernel methods in machine learning. Attribute reduction algorithm... 详细信息
来源: 评论
Nonlinear Interference-Aware Routing,Wavelength and Power Allocation in C+L+S Multi-Band Optical Networks
收藏 引用
China Communications 2025年 第4期22卷 129-142页
作者: Zhang Xu Xie Wang Feng Chuan Zeng Hankun Zhou Shanshan Zhang Fan Gong Xiaoxue School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Institute of Intelligent Communications and Network Security Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and TelecommunicationsChongqing 400065China
Multi-band optical networks are a potential technology for increasing network ***,the strong interference and non-uniformity between wavelengths in multi-band optical networks have become a bottleneck restricting the ... 详细信息
来源: 评论
An Adaptive DoH Encrypted Tunnel Detection Method Based on Contrastive Learning
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Tong, Jiacheng Zhao, Yilin Jin, Chongju Chen, Wei Zhang, Yiting Wu, Lifa Nanjing University of Posts and Telecommunications School of Computer Science Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210003 China
The percentage of encrypted network traffic has constantly increased as network security has been continuously improved. Attackers can, however, utilize encrypted DNS over HTTPS (DoH) to conceal their malicious traffi... 详细信息
来源: 评论
Brain-inspired artificial intelligence research: A review
收藏 引用
Science China(Technological Sciences) 2024年 第8期67卷 2282-2296页
作者: WANG GuoYin BAO HuaNan LIU Qun ZHOU TianGang WU Si HUANG TieJun YU ZhaoFei LU CeWu GONG YiHong ZHANG ZhaoXiang HE Sheng Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Computer and Information Science Chongqing Normal UniversityChongqing 401331China State Key Laboratory of Brain and Cognitive Science Institute of BiophysicsChinese Academy of SciencesBeijing 100101China School of Psychological and Cognitive Sciences Peking UniversityBeijing 100871China State Key Laboratory of Multimedia Information Processing School of Computer SciencePeking UniversityBeijing 100871China Department of Computer Science School of ElectronicsInformation and Electrical EngineeringShanghai Jiao Tong UniversityShanghai 200240China Faculty of Electronic and Information Engineering Xi’an Jiaotong UniversityXi’an 710049China The Center for Research on Intelligent Perception and Computing Institute of AutomationChinese Academy of SciencesBeijing 100190China Institute of Biophysics Chinese Academy of SciencesBeijing 100101China
Artificial intelligence(AI) systems surpass certain human intelligence abilities in a statistical sense as a whole, but are not yet the true realization of these human intelligence abilities and behaviors. There are d... 详细信息
来源: 评论