咨询与建议

限定检索结果

文献类型

  • 560 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 685 篇 工学
    • 491 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 192 篇 信息与通信工程
    • 131 篇 电气工程
    • 94 篇 控制科学与工程
    • 74 篇 生物工程
    • 66 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 44 篇 机械工程
    • 44 篇 生物医学工程(可授...
    • 34 篇 交通运输工程
    • 32 篇 网络空间安全
    • 28 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 168 篇 数学
    • 87 篇 生物学
    • 82 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 24 篇 化学
    • 24 篇 系统科学
  • 186 篇 管理学
    • 106 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 39 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 32 篇 法学
    • 22 篇 社会学
  • 15 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 27 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 computational mo...
  • 17 篇 optimization
  • 17 篇 accuracy
  • 16 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 13 篇 deep neural netw...
  • 12 篇 data privacy
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 12 篇 data models

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 university of ch...
  • 15 篇 huazhong univers...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 wang guoyin
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 959 篇 英文
  • 83 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1050 条 记 录,以下是181-190 订阅
排序:
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1435-1446页
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State Key Laboratory of Public Big Data Guizhou University Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Engineering Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ... 详细信息
来源: 评论
Robust Dynamic Broadcasting for Multi-Hop Wireless Networks Under Time-Varying Connectivity and Dynamic SINR
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Tian, Xiang Yu, Jiguo Luo, Chuanwen Yu, Dongxiao Wang, Guijuan Feng, Bin Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Beijing Forestry University School of Information Science and Technology Beijing100083 China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Taishan University School of Information Science and Technology 271000 China
Throughput-optimal dynamic broadcasting is an essential cornerstone for the efficient operation of Multi-hop Wireless Networks (MWNs). Most existing algorithms for this problem were developed assuming static interfere... 详细信息
来源: 评论
Adaptive Perception for Unified Visual Multi-modal Object Tracking
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: Hu, Xiantao Zhong, Bineng Liang, Qihua Shi, Liangtao Mo, Zhiyi Tai, Ying Yang, Jian Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining Guilin541004 China Guangxi Normal University Security Guilin541004 China Guangxi Normal University Intelligent Technology Guilin541004 China Guangxi Normal University Ministry of Education Guilin541004 China Wuzhou University School of Data Science Wuzhou543002 China Wuzhou University Software Engineering Wuzhou543002 China Nanjing University State Key Laboratory for Novel Software Technology Suzhou215163 China Nanjing University of Science and Technology School of Computer Science Nanjing210094 China Nanjing University of Science and Technology Engineering Nanjing210094 China
Recently, many multi-modal trackers prioritize RGB as the dominant modality, treating other modalities as auxiliary, and fine-tuning separately various multi-modal tasks. This imbalance in modality dependence limits t... 详细信息
来源: 评论
Locally repairable codes from combinatorial designs
收藏 引用
Science China(Information Sciences) 2020年 第2期63卷 174-188页
作者: Yu ZHANG Haibin KAN Shanghai Key Laboratory of Intelligent Information Processing School of Computer ScienceFudan University Fudan-Zhongan Joint Laboratory of Blockchain and Information Security Shanghai Engineering Research Center of Blockchain Shanghai Institute for Advanced Communication and Data Science
Locally repairable codes(LRCs) were proposed to reduce the repair degree in distributed storage systems. In particular, LRCs with availability are highly desirable for distributed storage systems, since this kind of... 详细信息
来源: 评论
Modeling and analysis of the dynamic mechanism of rumor propagation considering the process of rumor refuting
Nonlinear Science
收藏 引用
Nonlinear Science 2025年 3卷
作者: Xutao Li Junshan Pan Yong Hu Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security Key Laboratory of Intelligent Sensing System and Security (Hubei University) Ministry of Education School of Cyber Science and Technology Hubei University Wuhan 430062 Hubei China School of Physics Huazhong University of Science and Technology Wuhan 430074 Hubei China
The boost of rumor spreading by the Internet has caused a series of social problems. Refuting the rumor timely can alleviate the harm caused by rumor dissemination. To investigate the propagation mechanism of rumor af...
来源: 评论
Link prediction for attribute and structure learning based on attention mechanism
收藏 引用
Applied Soft Computing 2025年 179卷
作者: Renjuan Nie Guoyin Wang Qun Liu Chengxin Peng Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing 400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing 400065 China National Center for Applied Mathematics in Chongqing Chongqing Normal University Chongqing 401331 China
The link prediction problem within complex network analysis focus on accurately inferring future relationships between unconnected node pairs in networks. In real-world scenarios, many relationships can find effective...
来源: 评论
Sharing of Encrypted Lock keys in the Blockchain-Based Renting House system from Time- and Identity-Based Proxy Reencryption
收藏 引用
China Communications 2022年 第5期19卷 164-177页
作者: Zhiwei Wang Liping Qian Danwei Chen Guozi sun School of Computer Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210023China Guangxi Key Laboratory of Cryptography and Information Security Department of Computer SciencesGuilin University of Electronic TechnologyGuilin 541004China
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain *** CPA secure TIPRE ... 详细信息
来源: 评论
Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Can Tan, Xiaofeng Zhou, Jie Ding, Weiping Pedrycz, Witold The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The School of Artificial Intelligence and Computer Science Nantong University Nantong226019 China The Faculty of Data Science City University of Macau Macau999078 China The Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Warsaw Poland The Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia The Department of Computer Engineering Istinye University Istanbul Turkey
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m... 详细信息
来源: 评论
Simplifying graph contrastive learning with single feature fusion and column vector orthogonal noise
收藏 引用
Expert systems with Applications 2025年 288卷
作者: Lan You Zhen Zhang Qingxi Peng Christophe Claramunt Xing Zeng Hong Jin School of Computer Science and Information Engineering Hubei University Wuhan430062 Key Laboratory of Intelligent Sensing System and Security (Hubei University) Ministry of Education Wuhan 430062 Hubei Key Laboratory of Big Data Intelligent Analysis and Application (Hubei University) Wuhan 430062 School of Information Engineering Wuhan College Wuhan 430212 China Computer Science Naval Academy Research Institute Lanveoc-Poulmic BP 600 Brest 29240 France Okinawa Institute of Science and Technology Japan
Graph Contrastive Learning (GCL) has shown promise in recommendation systems by improving representation quality through data augmentation and consistency objectives. However, conventional GCL frameworks rely on multi...
来源: 评论
A novel biologically plausible spiking convolutional capsule network with optimized batch normalization for EEG-based emotion recognition
收藏 引用
Expert systems with Applications 2025年 288卷
作者: Kun Chen Zihao Yang Mincheng Cai Quan Liu Qingsong Ai Li Ma School of Information Engineering Wuhan University of Technology Wuhan 430070 China Key Laboratory of Intelligent Sensing System and Security(Hubei University) Ministry of Education Wuhan 430062 Hubei China Key Laboratory of Language Cognitive Science of Ministry of Education Beijing Language and Culture University Beijing 100083 China
Emotion recognition based on Electroencephalogram (EEG) is currently a hot topic in human-computer interaction, as EEG can more accurately reflect the characteristics of emotion. In recent years, EEG emotion recogniti... 详细信息
来源: 评论