咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 79 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 22 篇 信息与通信工程
    • 17 篇 电气工程
    • 15 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
  • 32 篇 理学
    • 19 篇 数学
    • 9 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 物理学
    • 3 篇 系统科学
  • 24 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 8 篇 法学
    • 6 篇 法学
    • 2 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 1 篇 军事学

主题

  • 7 篇 federated learni...
  • 6 篇 optimization
  • 5 篇 data privacy
  • 5 篇 speech processin...
  • 5 篇 blockchain
  • 5 篇 sensors
  • 5 篇 privacy
  • 4 篇 compressed sensi...
  • 4 篇 deep learning
  • 4 篇 magnetic resonan...
  • 4 篇 anomaly detectio...
  • 4 篇 signal processin...
  • 4 篇 contrastive lear...
  • 4 篇 smart contract
  • 4 篇 differential pri...
  • 4 篇 granular computi...
  • 4 篇 data models
  • 4 篇 deep reinforceme...
  • 3 篇 simulation
  • 3 篇 wireless communi...

机构

  • 13 篇 key laboratory o...
  • 11 篇 school of cybers...
  • 9 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 6 篇 school of data s...
  • 6 篇 school of cybers...
  • 6 篇 chongqing key la...
  • 5 篇 state key labora...
  • 5 篇 inner mongolia k...
  • 4 篇 school of comput...
  • 4 篇 institute for ne...
  • 4 篇 key laboratory o...
  • 4 篇 chongqing key la...
  • 4 篇 college of compu...
  • 4 篇 college of compu...
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 3 篇 zhejiang univers...
  • 3 篇 key laboratory o...

作者

  • 15 篇 wang guoyin
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 6 篇 yuling chen
  • 6 篇 yixian yang
  • 6 篇 li weisheng
  • 6 篇 chen yuling
  • 6 篇 tao li
  • 5 篇 li leixiao
  • 5 篇 qiao xiaoyu
  • 5 篇 weisheng li
  • 5 篇 wan jianxiong
  • 5 篇 huang yuping
  • 4 篇 guoyin wang
  • 4 篇 yang lijian
  • 4 篇 xiaobin qian
  • 4 篇 bin xiao
  • 4 篇 zhang qinghua
  • 4 篇 liu chuyi
  • 3 篇 yuping huang

语言

  • 117 篇 英文
  • 12 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory of Cyberspace and Data Security"
130 条 记 录,以下是61-70 订阅
排序:
MCU-Net: A Multi-prior Collaborative Deep Unfolding Network with Gates-controlled Spatial Attention for Accelerated MR Image Reconstruction
arXiv
收藏 引用
arXiv 2024年
作者: Qiao, Xiaoyu Li, Weisheng Wang, Guofen Huang, Yuping Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China College of Computer and Information Science Chongqing Normal University Chongqing China
Deep unfolding networks (DUNs) have demonstrated significant potential in accelerating magnetic resonance imaging (MRI). However, they often encounter high computational costs and slow convergence rates. Besides, they... 详细信息
来源: 评论
Learning Counterfactual Explanation of Graph Neural Networks Via Generative Flow Network
SSRN
收藏 引用
SSRN 2023年
作者: He, Kangjia Liu, Li Zhang, Youmin Wang, Ye Liu, Qun Wang, Guoyin School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China Chongqing Key Laboratory of Computational Intelligence Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China
Counterfactual subgraphs explain Graph Neural Networks (GNNs) by answering the question: "How would the prediction change if a certain subgraph were absent in the input instance?" The differentiable proxy ad... 详细信息
来源: 评论
A Synchronous Parallel Method with Parameters Communication Prediction for Distributed Machine Learning  19th
A Synchronous Parallel Method with Parameters Communication...
收藏 引用
19th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2023
作者: Zeng, Yanguo Xue, Meiting Xu, Peiran Shi, Yukun Zeng, Kaisheng Zhang, Jilin Yue, Lupeng School of Computer Science and Technology Hangzhou Dianzi University Hangzhou310018 China Key Laboratory for Modeling and Simulation of Complex Systems Ministry of Education Hangzhou310018 China Data Security Governance Zhejiang Engineering Research Center Hangzhou310018 China National University of Defense Technology Changsha China School of Cyberspace HangZhou Dianzi University Hangzhou China Department of Computer Science and Technology Tsinghua University Beijing China
With the development of machine learning technology in various fields, such as medical care, smart manufacturing, etc., the data has exploded. It is a challenge to train a deep learning model for different application... 详细信息
来源: 评论
CoGAP: A Personalized Federated Learning Method Using Collaborative Optimization for Medical Image Classification
CoGAP: A Personalized Federated Learning Method Using Collab...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Shenhai Zheng Congyu Li Sian Wen Xi Gao Lei Yu College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China Emergency Department The Second Affiliated Hospital of Chongqing Medical University Chongqing China
Federated learning (FL) has been widely used in medical image processing to protect data privacy, but it has issues with data heterogeneity. Personalized federated learning have emerged to tackle these issues but ofte... 详细信息
来源: 评论
Locally Private Estimator for Degree Distribution with Laplacian Mechanism
Locally Private Estimator for Degree Distribution with Lapla...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Jiayu Li Yuke Hu Xiaoguang Li Shiqi Zhou Yuxiang Wang Fenghua Li Ben Niu Chinese Academy of Sciences Institute of Information Engineering P.R. China School of Cyber Security University of Chinese Academy of Sciences P.R. China Key Laboratory of Cyberspace Security Defense P.R. China The State Key Laboratory of Blockchain and Data Security Zhejiang University P.R. China School of Cyber Engineering Xidian University P.R. China
Local differential privacy (LDP) provides a solution such that an untrusted server can achieve privacy-preserving data analysis. Node degree is one of the most fundamental metrics in graph data analysis. Existing LDP-... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
Anomaly detection mechanism based on hierarchical weights through large-scale log data
Anomaly detection mechanism based on hierarchical weights th...
收藏 引用
2021 International Conference on Computer Communication and Artificial Intelligence, CCAI 2021
作者: Xi, Lanlan Xin, Yang Luo, Shoushan Shang, Yanlei Tang, Qifeng University of Posts and Telecommunications School of Beijing Institute of Cyberspace Security Beijing China University of Postsand Telecommunications School of Beijing Institute of Cyberspace Security Beijing China Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Beijing China National Engineering Laboratory for Big Data Distribution and Exchange Technologies Shanghai China China-Europe Digital Economy Expert Group Shanghai China
In order to realize Intelligent Disaster Recovery and break the traditional reactive backup mode, it is necessary to forecast the potential system anomalies, and proactively backup the real-time datas and configuratio... 详细信息
来源: 评论
SCESP: An Edge Server Placement Method Based on Spectral Clustering in Mobile Edge Computing  8th
SCESP: An Edge Server Placement Method Based on Spectral Cl...
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Wang, Lijuan Guo, Yingya Yao, Jiangyuan Zhou, Siyu College of Computer and Data Science Fuzhou University Fuzhou350000 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350000 China Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fuzhou350003 China School of Computer Science and Cyberspace Security Hainan University Haikou570228 China Tandon School of Engineering New York University New York10012 United States
With the rapid development of Internet of Things (IoT) and 5G, mobile edge computing is gaining popularity for its low computation latency, bandwidth costs and energy consumption. In mobile edge computing, the placeme... 详细信息
来源: 评论
Achieving Network Resilience through Graph Neural Network-enabled Deep Reinforcement Learning
收藏 引用
IEEE Network 2025年
作者: Li, Xuzeng Zhang, Tao Wang, Jian Han, Zhen Liu, Jiqiang Kang, Jiawen Niyato, Dusit Jamalipour, Abbas Beijing Jiaotong University School of Cyberspace Science and Technology China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Guangdong University of Technology Technology School of Automation China Nanyang Technological University College of Computing and Data Science Singapore University of Sydney SydneyNSW2006 Australia
Deep reinforcement learning (DRL) has been widely used in many important tasks of communication networks. In order to improve the perception ability of DRL on the network, some studies have combined graph neural netwo... 详细信息
来源: 评论
Model-Based Throughput Optimization for Blockchain Sharding System
Model-Based Throughput Optimization for Blockchain Sharding ...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Yifan Li Jianxiong Wan Chuyi Liu Leixiao Li School of Data Science and Application Inner Mongolia University of Technology Hohhot China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Hohhot China Research Center of Large-Scale Energy Storage Technologies Ministry of Education of the People’s Republic of China
The throughput issue has become an urgent problem for large-scale application of blockchain technology. Sharding technology can improve system throughput and scalability. Current research on the optimal blockchain sha... 详细信息
来源: 评论