咨询与建议

限定检索结果

文献类型

  • 560 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 685 篇 工学
    • 491 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 192 篇 信息与通信工程
    • 131 篇 电气工程
    • 94 篇 控制科学与工程
    • 74 篇 生物工程
    • 66 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 44 篇 机械工程
    • 44 篇 生物医学工程(可授...
    • 34 篇 交通运输工程
    • 32 篇 网络空间安全
    • 28 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 168 篇 数学
    • 87 篇 生物学
    • 82 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 24 篇 化学
    • 24 篇 系统科学
  • 186 篇 管理学
    • 106 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 39 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 32 篇 法学
    • 22 篇 社会学
  • 15 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 27 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 computational mo...
  • 17 篇 optimization
  • 17 篇 accuracy
  • 16 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 13 篇 deep neural netw...
  • 12 篇 data privacy
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 12 篇 data models

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 university of ch...
  • 15 篇 huazhong univers...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 wang guoyin
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 959 篇 英文
  • 83 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1050 条 记 录,以下是101-110 订阅
排序:
An Image Semantic Communication system Based on GAN and Relative Position-Encoding
收藏 引用
IEEE Communications Letters 2025年
作者: Zhang, Ziqi Tan, Weijie Li, Chunguo Guizhou University College of Big Data and Information Engineering Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptography Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
In image semantic communication, the complex wireless channel environment leads to the loss of image details and performance degradation during transmission. To address this issue, we propose an image semantic communi... 详细信息
来源: 评论
A unified multi-granulation hierarchy structure: Construction, Selection, Fusion and Reduction
收藏 引用
Information Fusion 2025年 123卷
作者: Zhang, Xiaoxia Zhang, Jiangtao Wang, Guoyin Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China National Center for Applied Mathematics in Chongqing Chongqing Normal University Chongqing401331 China
Granular computing is a new method that can simulate human brain thinking to solve complex problems, and it has gradually become an important theory for addressing uncertainty issues. The core of granular computing li... 详细信息
来源: 评论
An Encoder-Decoder Model Based On Spiking Neural Networks For Address Event Representation Object Recognition
收藏 引用
IEEE Transactions on Cognitive and Developmental systems 2025年
作者: Du, Sichun Zhu, Haodi Zhang, Yang Hong, Qinghui Hunan University College of Computer Science and Electronic Engineering Changsha418002 China Shenzhen University Computer Vision Institute School of Computer Science and Software Engineering National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China
Address event representation (AER) object recognition task has attracted extensive attention in neuromorphic vision processing. The spike-based and event-driven computation inherent in the spiking neural network (SNN)... 详细信息
来源: 评论
SAug: Structural Imbalance Aware Augmentation for Graph Neural Networks
收藏 引用
ACM Transactions on intelligent systems and Technology 2025年 第2期16卷
作者: Chen, Ke-Jia Mu, Wenhui Liu, Zulong Liu, Zheng Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory of Novel Software Technology Nanjing University Nanjing China
Graph machine learning (GML) has made great progress in node classification, link prediction, graph classification, and so on. However, graphs in reality are often structurally imbalanced, that is, only a few hub node... 详细信息
来源: 评论
SOT-MRAM-based true in-memory computing architecture for approximate multiplication
收藏 引用
Chip 2025年 第2期4卷
作者: Song, Min Tang, Qilong Ouyang, Xintong Duan, Wei Xu, Yan Zhang, Shuai You, Long Key Laboratory of Intelligent Sensing System and Security of the Ministry of Education Hubei Key Laboratory of Micro-Nanoelectronic Materials and Devices School of Microelectronics Hubei University Wuhan 430062 China School of Integrated Circuits Huazhong University of Science and Technology Wuhan 430074 China
The in-memory computing (IMC) paradigm emerges as an effective solution to break the bottlenecks of conventional von Neumann architecture. In the current work, an approximate multiplier in spin-orbit torque magnetores... 详细信息
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Kaijun Deng Dezhi Zheng Jindong Xie Jinbao Wang Weicheng Xie Linlin Shen Siyang Song Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Department of Computer Science University of Exeter
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
An online sparse least square support vector regression and particle filter for remaining useful life prediction of capacitive-type pressure transducer  3
An online sparse least square support vector regression and ...
收藏 引用
2024 3rd International Conference on Aerospace and Control Engineering, ICoACE 2024
作者: Wang, Senlin Dai, Lingfeng Guo, Mingzhe Lu, Yikang Fujian Institute of Research on the Structure of Matter Chinese Academy of Sciences Fujian Fuzhou362200 China Fujian Provincial Key Laboratory of Intelligent Identification and Control of Complex Dynamic System Quanzhou362200 China Fujian College University of Chinese Academy of Sciences Fujian Fuzhou350002 China School of Advanced Manufacturing Fuzhou University Fujian Quanzhou350108 China School of College of Computer and Cyberspace Security Fujian Normal University Fujian350007 China
This paper proposes a novel online sparse least square support vector regression without bias for forecasting capacitive type pressure transducer remaining useful life prediction (RUL). The proposed approach is based ... 详细信息
来源: 评论
COMMITSHIELD: Tracking Vulnerability Introduction and Fix in Version Control systems
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Zhaonan Zhao, Yanjie Wei, Chen Wan, Zirui Liu, Yue Wang, Haoyu Huazhong University of Science and Technology Wuhan China MYbank Ant Group Hangzhou China Monash University Melbourne Australia Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Version control systems are commonly used to manage open-source software, in which each commit may introduce new vulnerabilities or fix existing ones. Researchers have developed various tools for detecting vulnerabili... 详细信息
来源: 评论
Provably Secure Authenticated key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
Dual Encoders for Diffusion-based Image Inpainting
Dual Encoders for Diffusion-based Image Inpainting
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Dezhi Zheng Kaijun Deng Jinbao Wang Linlin Shen Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
Current diffusion-based inpainting models struggle to preserve unmasked regions or generate highly coherent content. Additionally, it is hard for them to generate meaningful content for 3D inpainting. To tackle these ... 详细信息
来源: 评论