咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 79 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 22 篇 信息与通信工程
    • 17 篇 电气工程
    • 15 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
  • 32 篇 理学
    • 19 篇 数学
    • 9 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 物理学
    • 3 篇 系统科学
  • 24 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 8 篇 法学
    • 6 篇 法学
    • 2 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 1 篇 军事学

主题

  • 7 篇 federated learni...
  • 6 篇 optimization
  • 5 篇 data privacy
  • 5 篇 speech processin...
  • 5 篇 blockchain
  • 5 篇 sensors
  • 5 篇 privacy
  • 4 篇 compressed sensi...
  • 4 篇 deep learning
  • 4 篇 magnetic resonan...
  • 4 篇 anomaly detectio...
  • 4 篇 signal processin...
  • 4 篇 contrastive lear...
  • 4 篇 smart contract
  • 4 篇 differential pri...
  • 4 篇 granular computi...
  • 4 篇 data models
  • 4 篇 deep reinforceme...
  • 3 篇 simulation
  • 3 篇 wireless communi...

机构

  • 13 篇 key laboratory o...
  • 11 篇 school of cybers...
  • 9 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 6 篇 school of data s...
  • 6 篇 school of cybers...
  • 6 篇 chongqing key la...
  • 5 篇 state key labora...
  • 5 篇 inner mongolia k...
  • 4 篇 school of comput...
  • 4 篇 institute for ne...
  • 4 篇 key laboratory o...
  • 4 篇 chongqing key la...
  • 4 篇 college of compu...
  • 4 篇 college of compu...
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 3 篇 zhejiang univers...
  • 3 篇 key laboratory o...

作者

  • 15 篇 wang guoyin
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 6 篇 yuling chen
  • 6 篇 yixian yang
  • 6 篇 li weisheng
  • 6 篇 chen yuling
  • 6 篇 tao li
  • 5 篇 li leixiao
  • 5 篇 qiao xiaoyu
  • 5 篇 weisheng li
  • 5 篇 wan jianxiong
  • 5 篇 huang yuping
  • 4 篇 guoyin wang
  • 4 篇 yang lijian
  • 4 篇 xiaobin qian
  • 4 篇 bin xiao
  • 4 篇 zhang qinghua
  • 4 篇 liu chuyi
  • 3 篇 yuping huang

语言

  • 117 篇 英文
  • 12 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory of Cyberspace and Data Security"
130 条 记 录,以下是41-50 订阅
排序:
Decode the Dark Side of the Language: Applications of LLMs in the Dark Web
Decode the Dark Side of the Language: Applications of LLMs i...
收藏 引用
IEEE International Conference on data Science in cyberspace (DSC)
作者: Hongfan Chen Yigang Diao Hui Xiang Yixuan Huo Xiaqing Xie Jiapeng Zhao Xuebin Wang Yanwei Sun Jinqiao Shi School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China Cyberspace Administration of China Data and Technology Support Center Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
Previous studies have discovered that Transformers pre-trained on large scale datasets have a great advantage over traditional methods and can achieve human-level performance in many NLP tasks. Various encoder-only mo... 详细信息
来源: 评论
Score-based Generative Priors Guided Model-driven Network for MRI Reconstruction
arXiv
收藏 引用
arXiv 2024年
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Score matching with Langevin dynamics (SMLD) method has been successfully applied to accelerated MRI. However, the hyperparameters in the sampling process require subtle tuning, otherwise the results can be severely c... 详细信息
来源: 评论
A Causal Disentangled Multi-Granularity Graph Classification Method
arXiv
收藏 引用
arXiv 2023年
作者: Li, Yuan Liu, Li Chen, Penggang Zhang, Youmin Wang, Guoyin Chongqing Key Laboratory of Computational Intelligence China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China
Graph data widely exists in real life, with large amounts of data and complex structures. It is necessary to map graph data to low-dimensional embedding. Graph classification, a critical graph task, mainly relies on i... 详细信息
来源: 评论
A Defense Framework for Backdoor Attacks in Federated Learning Based on Client-Server Detection  4
A Defense Framework for Backdoor Attacks in Federated Learni...
收藏 引用
4th International Conference on Industrial Automation, Robotics and Control Engineering, IARCE 2024
作者: Chen, Ding Li, Tianrui Yu, Cai Al-Huthaifi, Rasha Huang, Wei School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu611756 China School of Cybersecurity Chengdu University of Information Technology Sichuan Provincial Key Laboratory of Cyberspace Security Chengdu610225 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China College of Computer and Data Science Fuzhou University Fuzhou350108 China
Addressing the challenge of backdoor attacks in federated learning (FL), various defense schemes are examined, resulting in the proposal of a comprehensive strategy that incorporates both client-side and server-side m... 详细信息
来源: 评论
Preface: Brain-Inspired AI Research
收藏 引用
Science China(Technological Sciences) 2024年 第8期67卷 2281-2281页
作者: GONG YiHong WANG GuoYin College of Artificial Intelligence Xi’an Jiaotong UniversityXi’an 710049China Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and TelecommunicationsChongqing400065China College of Computer and Information Science Chongqing Normal UniversityChongqing401331China
Large AGI (artificial general intelligence) models, represented by OpenAI’s GPT-4, DALL-E, Sora, etc., have amazed the world by exhibiting superior capabilities on a variety of NLP and text-to-image/video generation ... 详细信息
来源: 评论
Optimal Scheduling for Integrated Energy System via Model-Based Reinforcement Learning  24
Optimal Scheduling for Integrated Energy System via Model-Ba...
收藏 引用
2024 International Conference on Artificial Intelligence of Things and Computing, AITC 2024
作者: Cheng, Kexin Wan, Jianxiong Liu, Chuyi Sun, Pengfei Li, Leixiao Zhang, Huaqin School of Data Science and Application Inner Mongolia University of Technology Inner Mongolia Autonomous Region Hohhot China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Inner Mongolia Autonomous Region Hohhot China Research Center of Large-Scale Energy Storage Technologies Ministry of Education of the People's Republic of China Inner Mongolia Autonomous Region Hohhot China
The Integrated Energy System (IES) integrates energy consumption, conversion, and storage to increase the utilization of renewable energy sources and fossil fuels. When using heuristic algorithms and mathematical opti... 详细信息
来源: 评论
The Research on V2V Cooperative Caching Method Based on Vehicle Attributes  24
The Research on V2V Cooperative Caching Method Based on Vehi...
收藏 引用
2024 International Conference on Artificial Intelligence of Things and Computing, AITC 2024
作者: Wang, Zirui Wang, Hui Wan, Jianxiong Liu, Chuyi Sun, Pengfei Li, Leixiao School of Data Science and Application Inner Mongolia University of Technology Inner Mongolia Autonomous Region Hohhot China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Inner Mongolia Autonomous Region Hohhot China Research Center of Large-Scale Energy Storage Technologies Ministry of Education of the People's Republic of China Inner Mongolia Autonomous Region Hohhot China
To address the increasingly severe issue of insufficient vehicular caching in the Internet of Vehicles (IoV), Vehicular edge computing uses base stations (BS) and vehicles with computing and storage capabilities as ed... 详细信息
来源: 评论
GBFRS: Robust Fuzzy Rough Sets via Granular-ball Computing
arXiv
收藏 引用
arXiv 2025年
作者: Xia, Shuyin Lian, Xiaoyu Sang, Binbin Wang, Guoyin Gao, Xinbo Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China College of Computer and Information Science the National Center for Applied Mathematics in Chongqing Chongqing Normal University Chongqing401331 China
Fuzzy rough set theory is effective for processing datasets with complex attributes, supported by a solid mathematical foundation and closely linked to kernel methods in machine learning. Attribute reduction algorithm... 详细信息
来源: 评论
Federated Hybrid-Supervised Learning for Universal Medical Image Segmentation
Federated Hybrid-Supervised Learning for Universal Medical I...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Shenhai Zheng Sian Wen Congyu Li Qing Chen Laquan Li College of Computer Science and Technology Chongqing University of Posts and Telecommunications China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education China School of Science Chongqing University of Posts and Telecommunications China
Federated Learning (FL) is an advanced technology that tackles the challenge of blocked data arising from privacy concerns, enabling the training of deep learning models without the need for data sharing. However, FL ... 详细信息
来源: 评论
Mitigating Label-Noise for Facial Expression Recognition in the Wild
Mitigating Label-Noise for Facial Expression Recognition in ...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Yan, Huan Gu, Yu Zhang, Xiang Wang, Yantong Ji, Yusheng Ren, Fuji School of Computer and Information Hefei University of Technology S2AC Lab China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation China National Institute of Informatics Tokushima University Japan
Label-noise constitutes a major challenge for facial expression recognition in the wild due to the ambiguity of facial expressions worsened by low-quality images. To deal with this problem, we propose a simple but eff... 详细信息
来源: 评论