咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 79 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 22 篇 信息与通信工程
    • 17 篇 电气工程
    • 15 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
  • 32 篇 理学
    • 19 篇 数学
    • 9 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 物理学
    • 3 篇 系统科学
  • 24 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 8 篇 法学
    • 6 篇 法学
    • 2 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 1 篇 军事学

主题

  • 7 篇 federated learni...
  • 6 篇 optimization
  • 5 篇 data privacy
  • 5 篇 speech processin...
  • 5 篇 blockchain
  • 5 篇 sensors
  • 5 篇 privacy
  • 4 篇 compressed sensi...
  • 4 篇 deep learning
  • 4 篇 magnetic resonan...
  • 4 篇 anomaly detectio...
  • 4 篇 signal processin...
  • 4 篇 contrastive lear...
  • 4 篇 smart contract
  • 4 篇 differential pri...
  • 4 篇 granular computi...
  • 4 篇 data models
  • 4 篇 deep reinforceme...
  • 3 篇 simulation
  • 3 篇 wireless communi...

机构

  • 13 篇 key laboratory o...
  • 11 篇 school of cybers...
  • 9 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 6 篇 school of data s...
  • 6 篇 school of cybers...
  • 6 篇 chongqing key la...
  • 5 篇 state key labora...
  • 5 篇 inner mongolia k...
  • 4 篇 school of comput...
  • 4 篇 institute for ne...
  • 4 篇 key laboratory o...
  • 4 篇 chongqing key la...
  • 4 篇 college of compu...
  • 4 篇 college of compu...
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 3 篇 zhejiang univers...
  • 3 篇 key laboratory o...

作者

  • 15 篇 wang guoyin
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 6 篇 yuling chen
  • 6 篇 yixian yang
  • 6 篇 li weisheng
  • 6 篇 chen yuling
  • 6 篇 tao li
  • 5 篇 li leixiao
  • 5 篇 qiao xiaoyu
  • 5 篇 weisheng li
  • 5 篇 wan jianxiong
  • 5 篇 huang yuping
  • 4 篇 guoyin wang
  • 4 篇 yang lijian
  • 4 篇 xiaobin qian
  • 4 篇 bin xiao
  • 4 篇 zhang qinghua
  • 4 篇 liu chuyi
  • 3 篇 yuping huang

语言

  • 117 篇 英文
  • 12 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory of Cyberspace and Data Security"
130 条 记 录,以下是61-70 订阅
排序:
Simulating Bluetooth virus propagation on the real map via infectious attenuation algorithm and discrete dynamical system
收藏 引用
Iran Journal of Computer Science 2024年 第4期7卷 755-776页
作者: Zhu, Qingyi Wan, Wentao Gan, Chengquan Fan, Ziqi Yang, Lu-Xing School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing 400065 China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing 400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing 400065 China School of Information Technology Deakin University Melbourne 3125 VIC Australia
In recent years, mobile smart devices have gained popularity globally due to their convenience and efficiency. However, this popularity has also attracted the attention of virus creators, resulting in a significant co... 详细信息
来源: 评论
Collaborative Resource Allocation for Blockchain-Enabled Internet of Things with Multi-Agent Deep Reinforcement Learning
Collaborative Resource Allocation for Blockchain-Enabled Int...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lu, Xinyu Wan, Jianxiong Li, Leixiao Liu, Chuyi Si, Xiaowei School of Data Science and Application Inner Mongolia University of Technology Hohhot China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Ho-hhot China Research Center of Large-Scale Energy Storage Technologies Ministry of Education of the People's Taiwan
Mobile Edge Computing (MEC) reduces service latency and enhances Quality of Service (QoS) by offloading tasks to the wireless network edge. However, the rapid growth of task offloading and the associated data transmis... 详细信息
来源: 评论
Multimodal Image-Text Representation Learning for Sketch-Less Facial Image Retrieval
Multimodal Image-Text Representation Learning for Sketch-Les...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Dawei Dai Yingge Liu Shiyu Fu Guoyin Wang Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing China
Sketch-less facial image retrieval (SLFIR) framework aims to break the barriers that drawing a high-quality facial sketch requires excellent skills and substantial time, it performs the retrieval using a partial sketc... 详细信息
来源: 评论
A Differential Privacy Protection Protocol Based on Location Entropy
收藏 引用
Tsinghua Science and Technology 2023年 第3期28卷 452-463页
作者: Ping Guo Baopeng Ye Yuling Chen Tao Li Yixian Yang Xiaobin Qian Xiaomei Yu State Key Laboratory of Public Big Data School of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Information Technology Innovation Service Center of Guizhou Province Guiyang 550025China School of Cyberspace Security Beijing University of Posts and TelecommnuicationsBeijing 100000China Guizhou CoVision Science&Technology Co. Ltd.Guiyang 550025China School of Information Science and Engineering Shandong Normal UniversityJinan 250000China
A Location-Based Service(LBS)refers to geolocation-based services that bring both convenience and *** an increase in the scale and value of data,most existing location privacy protection protocols cannot balance priva... 详细信息
来源: 评论
Violence Detection In Videos via Motion-Guided Global and Local Views  8
Violence Detection In Videos via Motion-Guided Global and Lo...
收藏 引用
8th International Conference on data Science in cyberspace, DSC 2023
作者: Su, Ning Sun, Lijuan Gao, Yutong Wu, Jingchen Wu, Xu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China School of Cyberspace Security Bupt China School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Beijing Jiaotong University Beijing Key Lab of Traffic Data Analysis and Mining Beijing China Bupt China
Video violence detection aims to locate the time window in which violent behavior occurs. Most methods focus on utilizing RGB features directly or only fusing RGB and audio features, ignoring the effective exploitatio... 详细信息
来源: 评论
Prior Semantic-Embedding Representation Learning for On-the-Fly
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Yingge Dai, Dawei Zhou, Kenan Tan, Xiufang Wu, Yiqiao Wang, Guoyin Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China
In the context of fine-grained sketch-based image retrieval (FG-SBIR) framework, sketch drawing is a time-consuming and skill-intensive process that greatly restricts its practical application. Our study aims to enhan... 详细信息
来源: 评论
Model-Based Throughput Optimization for Blockchain Sharding System  22
Model-Based Throughput Optimization for Blockchain Sharding ...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Li, Yifan Wan, Jianxiong Liu, Chuyi Li, Leixiao Inner Mongolia University of Technology School of Data Science and Application Hohhot China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Hohhot China Ministry of Education of the People's Republic of China Research Center of Large-Scale Energy Storage Technologies China
The throughput issue has become an urgent problem for large-scale application of blockchain technology. Sharding technology can improve system throughput and scalability. Current research on the optimal blockchain sha... 详细信息
来源: 评论
Granular-ball Representation Learning for Deep CNN on Learning with Label Noise
arXiv
收藏 引用
arXiv 2024年
作者: Dai, Dawei Zhu, Hao Xia, Shuyin Wang, Guoyin Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China
In actual scenarios, whether manually or automatically annotated, label noise is inevitably generated in the training data, which can affect the effectiveness of deep CNN models. The popular solutions require data cle... 详细信息
来源: 评论
GBCT: An Efficient and Adaptive Granular-Ball Clustering Algorithm for Complex data
arXiv
收藏 引用
arXiv 2024年
作者: Xia, Shuyin Shi, Bolun Wang, Yifan Xie, Jiang Wang, Guoyin Gao, Xinbo Chongqing Key Laboratory of Computational Intelligence The Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education The Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China
Traditional clustering algorithms often focus on the most fine-grained information and achieve clustering by calculating the distance between each pair of data points or implementing other calculations based on points... 详细信息
来源: 评论
GBSVM: Granular-ball Support Vector Machine
arXiv
收藏 引用
arXiv 2022年
作者: Xia, Shuyin Lian, Xiaoyu Wang, Guoyin Gao, Xinbo Chen, Jiancu Peng, Xiaoli The Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China
GBSVM (Granular-ball Support Vector Machine) is a significant attempt to construct a classifier using the coarse-to-fine granularity of a granular-ball as input, rather than a single data point. It is the first classi... 详细信息
来源: 评论