咨询与建议

限定检索结果

文献类型

  • 560 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 685 篇 工学
    • 491 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 192 篇 信息与通信工程
    • 131 篇 电气工程
    • 94 篇 控制科学与工程
    • 74 篇 生物工程
    • 66 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 44 篇 机械工程
    • 44 篇 生物医学工程(可授...
    • 34 篇 交通运输工程
    • 32 篇 网络空间安全
    • 28 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 168 篇 数学
    • 87 篇 生物学
    • 82 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 24 篇 化学
    • 24 篇 系统科学
  • 186 篇 管理学
    • 106 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 39 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 32 篇 法学
    • 22 篇 社会学
  • 15 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 27 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 computational mo...
  • 17 篇 optimization
  • 17 篇 accuracy
  • 16 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 13 篇 deep neural netw...
  • 12 篇 data privacy
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 12 篇 data models

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 university of ch...
  • 15 篇 huazhong univers...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 wang guoyin
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 959 篇 英文
  • 83 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1050 条 记 录,以下是111-120 订阅
Bidirectional Identity-Based Inner-Product Functional Re-Encryption in Vaccine data Sharing
收藏 引用
IEEE Transactions on Cloud Computing 2025年
作者: Wang, Jing Zhou, Yanwei Zhu, Yasi Liu, Zhiquan Yang, Bo Zhang, Mingwu Shaanxi Normal University School of Computer Science Xi'an710119 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education China Jinan University College of Cyber Security Guangzhou510632 China Hubei University of Technology School of Computer Wuhan430068 China
With the development of cloud computing, more and more data is stored in cloud servers, which leads to an increasing degree of privacy of data stored in cloud servers. For example, in the critical domain of medical va... 详细信息
来源: 评论
Energy-efficient and Privacy-preserving Edge Intelligence for 6G-Empowered intelligent Transportation systems
收藏 引用
IEEE Network 2025年
作者: Zhu, Chenlu Fan, Xiaoxuan Deng, Xianjun Xiao, Ziheng Guo, Tingting Liu, Shenghao Sun, Jiaqi Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Kedao Geographic Information Engineering Co. Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea Republic of
6G-empowered intelligent Transportation systems (ITS) generate large amounts of data through millions of devices and sensors at the terminal and network edge. Edge intelligence advances the frontier of data-driven art... 详细信息
来源: 评论
CoGAP: A Personalized Federated Learning Method Using Collaborative Optimization for Medical Image Classification
CoGAP: A Personalized Federated Learning Method Using Collab...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Shenhai Zheng Congyu Li Sian Wen Xi Gao Lei Yu College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China Emergency Department The Second Affiliated Hospital of Chongqing Medical University Chongqing China
Federated learning (FL) has been widely used in medical image processing to protect data privacy, but it has issues with data heterogeneity. Personalized federated learning have emerged to tackle these issues but ofte... 详细信息
来源: 评论
WiViPose: A Video-aided Wi-Fi Framework for Environment-Independent 3D Human Pose Estimation
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Zhang, Lei Ning, Haoran Tang, Jiaxin Chen, Zhenxiang Zhong, Yaping Han, Yahong Tianjin University College of Intelligence and Computing the Tianjin Key Laboratory of Advanced Network Technology and Application Tianjin300050 China Key Laboratory of Computing Power Network and Information Security Ministry of Education China University of Jinan Shandong Provincial Key Laboratory of Ubiquitous Intelligent Computing the School of Information Science and Engineering Jinan250022 China Wuhan Sports University Sports Big-data Research Center Wuhan430079 China Tianjin University College of Intelligence and Computing the Tianjin Key Laboratory of Machine Learning Tianjin300350 China
The inherent complexity of Wi-Fi signals makes video-aided Wi-Fi 3D pose estimation difficult. The challenges include the limited generalizability of the task across diverse environments, its significant signal hetero... 详细信息
来源: 评论
A Model-Agnostic Hierarchical Framework Towards Trajectory Prediction
收藏 引用
Journal of Computer Science and Technology 2025年 第2期40卷 322-339页
作者: Qian, Tang-Wen Wang, Yuan Xu, Yong-Jun Zhang, Zhao Wu, Lin Qiu, Qiang Wang, Fei Domain-Oriented Intelligent System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100190 China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China
Predicting the future trajectories of multiple agents is essential for various applications in real life, such as surveillance systems, autonomous driving, and social robots. The trajectory prediction task is influenc... 详细信息
来源: 评论
Personalized Local Differential Privacy for Multi-dimensional Range Queries over Mobile User data
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: He, Yuanyuan Wang, Meiqi Deng, Xianjun Yang, Peng Xue, Qiao Yang, Laurence T. Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Electronic Information and Communications Wuhan430074 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210000 China
Multi-dimensional range queries performed on the mobile user data records become increasingly important and popular in the fields of e-commerce, social media, transportation logistics, etc. Meanwhile, mobile users usu... 详细信息
来源: 评论
Optimized Dynamic Watermarking for Audio DNNs with Adaptive Embedding and Boundary Sampling
Optimized Dynamic Watermarking for Audio DNNs with Adaptive ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Hao Fei Hewang Nie Siqi Sun Songfeng Lu Ting Luo Ling Qian Dunbo Cai Zhiguo Huang Runqing Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen China China Mobile (Suzhou) Software Technology Company Limited Suzhou China
The intensified concerns arising from the widespread adoption of deep learning have led to increased scrutiny of intellectual property protection in DNN models. Existing audio watermarking techniques, predominantly ba... 详细信息
来源: 评论
Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
arXiv
收藏 引用
arXiv 2025年
作者: You, Zhichao Dong, Xuewen Li, Shujun Liu, Ximeng Ma, Siqi Shen, Yulong School of Computer Science & Technology Xidian University China Shaanxi Key Laboratory of Network and System Security Xi’an China University of Kent Canterbury United Kingdom College of Computer and Data Science Fuzhou University Fuzhou China School of System and Computing University of New South Wales CanberraACT2612 Australia
Reconstruction attacks against federated learning (FL) aim to reconstruct users’ samples through users’ uploaded gradients. Local differential privacy (LDP) is regarded as an effective defense against various attack... 详细信息
来源: 评论
Modulation of Asymmetric Magnetic Domain-Wall Motion via Noncolinear Interlayer Exchange Coupling
收藏 引用
IEEE Transactions on Magnetics 2025年 第5期61卷
作者: Zhou, Xiangqing Chen, Shiwei Wu, Chuangwen Li, Peizhi Meng, Dequan Tomasello, Riccardo Finocchio, Giovanni Liang, Shiheng Hubei University Key Laboratory for Intelligent Sensing System and Security of Ministry of Education School of Physics Wuhan430062 China Politecnico di Bari Department of Electrical and Information Engineering Bari70125 Italy University of Messina Department of Mathematical and Computer Sciences Physical Sciences and Earth Sciences Messina98166 Italy
The search of scalable approach to design field-free deterministic switching is currently a key challenge. Here, we investigate current and magnetic driven magnetization switching in a T-type magnetic heterojunction w... 详细信息
来源: 评论
CacheAlarm: Monitoring Sensitive Behaviors of Android Apps Using Cache Side Channel
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Tian, Jianwen Ma, Haoyu Gao, Debin Kuang, Xiaohui Academy of Military Sciences Institute of System Engineering China Beijing Jiaotong University School of Cyberspace Science and Technology Beijing100044 China Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100045 China Singapore Management University School of Computing and Information Systems Singapore
Malware attack has been a serious threat to the security and privacy of both individual and corporation users of the Android platform. Business entities seek to protect themselves by means of monitoring privacy-relate... 详细信息
来源: 评论