咨询与建议

限定检索结果

文献类型

  • 560 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 685 篇 工学
    • 491 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 192 篇 信息与通信工程
    • 131 篇 电气工程
    • 94 篇 控制科学与工程
    • 74 篇 生物工程
    • 66 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 44 篇 机械工程
    • 44 篇 生物医学工程(可授...
    • 34 篇 交通运输工程
    • 32 篇 网络空间安全
    • 28 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 168 篇 数学
    • 87 篇 生物学
    • 82 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 24 篇 化学
    • 24 篇 系统科学
  • 186 篇 管理学
    • 106 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 39 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 32 篇 法学
    • 22 篇 社会学
  • 15 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 27 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 computational mo...
  • 17 篇 optimization
  • 17 篇 accuracy
  • 16 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 13 篇 deep neural netw...
  • 12 篇 data privacy
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 12 篇 data models

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 university of ch...
  • 15 篇 huazhong univers...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 wang guoyin
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 959 篇 英文
  • 83 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1050 条 记 录,以下是251-260 订阅
排序:
Personalized Review Recommendation based on Implicit dimension mining
Personalized Review Recommendation based on Implicit dimensi...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Xu, Bei Xu, Yifan School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Users usually browse product reviews before buying products from e-commerce websites. Lots of e-commerce websites can recommend reviews. However, existing research on review recommendation mainly focuses on the genera... 详细信息
来源: 评论
Detecting Vulnerabilities in Ethereum Smart Contracts with Deep Learning  4
Detecting Vulnerabilities in Ethereum Smart Contracts with D...
收藏 引用
4th International Conference on data Intelligence and security, ICDIS 2022
作者: Wu, Zhendong Li, Shan Wang, Bin Liu, Tianjian Zhu, Yongsheng Zhu, Chenming Hu, Mingqing National Key Laboratory of Science and Tecknology on Information System Security China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University China Zhejiang Electronic Information Products Inspection and Research Institute China IFLYTEK Co. Ltd China
Decentralized applications and smart contracts running on Ethereum have been widely applied in many fields, such as finance and logistics. On the one hand, the number of smart contracts surges. On the other hand, smar... 详细信息
来源: 评论
An Embedding-Based Multi-Modal Few-Shot Learning Method for Network Intrusion Detection  21
An Embedding-Based Multi-Modal Few-Shot Learning Method for ...
收藏 引用
21st International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Qiulin, He Jinquan, Zhang Yuanyuan, Huang School of Cybersecurity Xin Gu Industrial College Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China Dazhou Key Laboratory Government Data Security Dazhou635000 China
In this paper, we introduce an embedding-based few-shot learning framework, aiming to achieve classification by calculating the similarity measure between unknown samples and known samples in the embedding space. This... 详细信息
来源: 评论
Secure Cross-domain Medical data Sharing based on Distributed Cloud and Blockchain Services
Secure Cross-domain Medical Data Sharing based on Distribute...
收藏 引用
2023 IEEE International Conference on Web Services, ICWS 2023
作者: Cui, Jiasheng Duan, Li Ni, Wei Li, Chao Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Data61 Csiro MarsfieldNSW2122 Australia
Electronic Health Record (EHR) provides critical medical data. Sharing EHRs can add services and value for hospitals and patients and effectively improve medical services' quality. In the process of cross-hospital... 详细信息
来源: 评论
Multi-source Infection Pattern Mining Algorithms over Moving Objects  25
Multi-source Infection Pattern Mining Algorithms over Moving...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Chen, Yu Dai, Hua Yang, Geng Chen, Yanli Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210003 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210003 China
Using the trajectory data of moving objects to analyze and study the infection mode of viruses or germs has practical application value. The definition of infection pattern in existing works only considers one-to-one ... 详细信息
来源: 评论
A semantic and emotion-based dual latent variable generation model for a dialogue system
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第2期8卷 319-330页
作者: Ming Yan Xingrui Lou Chien Aun Chan Yan Wang Wei Jiang State Key Laboratory of Media Convergence and Communication Communication University of ChinaBeijingChina School of Information and Communications Engineering Communication University of ChinaBeijingChina Key Laboratory of Acoustic Visual Technology and Intelligent Control System Communication University of ChinaBeijingChina Department of Electrical and Electronic Engineering The University of MelbourneMelbourneVictoriaAustralia School of Data Science and Intelligent Media Communication University of ChinaBeijingChina
With the development of intelligent agents pursuing humanisation,artificial intelligence must consider emotion,the most basic spiritual need in human *** emotional dialogue systems usually use an external emotional di... 详细信息
来源: 评论
E2E-MFERC:AMulti-Face Expression Recognition Model for Group Emotion Assessment
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1105-1135页
作者: Lin Wang Juan Zhao Hu Song Xiaolong Xu Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing210042China School of Network Security Jinling Institute of TechnologyNanjing211169China State Grid Jiangsu Electric Power Company Limited Nanjing210000China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210042China
In smart classrooms, conducting multi-face expression recognition based on existing hardware devices to assessstudents’ group emotions can provide educators with more comprehensive and intuitive classroom effect anal... 详细信息
来源: 评论
Oscillation resolution for massive cell phone traffic data  1
Oscillation resolution for massive cell phone traffic data
收藏 引用
1st Workshop on Mobile data, Mobidata 2016, co-located with MobiSys 2016
作者: Qi, Ling Qiao, Yuanyuan Abdesslem, Fehmi Ben Ma, Zhanyu Yang, Jie Center for Data Science Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Network BUPT Beijing China Decisions Networks and Analytics Laboratory SICS Stockholm Sweden Center for Data Science Pattern Recognition and Intelligent System Lab BUPT Beijing China
Cellular towers capture logs of mobile subscribers whenever their devices connect to the network. When the logs show data traffic at a cell tower generated by a device, it reveals that this device is close to the towe... 详细信息
来源: 评论
An economic dispatch model based on scenario tree in industrial micro-grid with wind power  27
An economic dispatch model based on scenario tree in industr...
收藏 引用
27th Chinese Control and Decision Conference, CCDC 2015
作者: Ding, Hao Gao, Feng Liu, Kun Guan, Xiaohong State Key Laboratory for Manufacturing System Engineering Xi'An Jiaotong University Xi'an China Ministry of Education Key Lab for Intelligent Networks and Networks Security Xi'An Jiaotong University Xi'an China
Wind power is a kind of clean and renewable energy, and it is of great benefit to utilize it in an industrial micro-grid. This paper establishes an economic dispatch model of industrial micro-grid with wind power that... 详细信息
来源: 评论
Spiderweb Protector: Biomimetic Defense Against Targeted Attacks on Graph Neural Networks  21
Spiderweb Protector: Biomimetic Defense Against Targeted Att...
收藏 引用
21st International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Zhou, Zeyu Huang, Yuanyuan Wang, Yongli Li, Siyu Lu, Jiazhong He, Peilin Chengdu University of Information Technology Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China Dazhou Key Laboratory Government Data Security Dazhou635000 China University of Pittsburgh Department of Informatics and Networked Systems Pittsburgh15260 United States
Graph Neural Networks (GNNs) have emerged as powerful tools across diverse applications, including social networks, bioinformatics, and recommendation systems. However, their susceptibility to adversarial attacks, par... 详细信息
来源: 评论