咨询与建议

限定检索结果

文献类型

  • 529 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,019 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 657 篇 工学
    • 474 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 112 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 321 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 78 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 robustness
  • 13 篇 contrastive lear...
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 56 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 18 篇 hai jin
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 932 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1019 条 记 录,以下是261-270 订阅
排序:
Graph Structure Prefix Injection Transformer for Multi-Modal Entity Alignment
SSRN
收藏 引用
SSRN 2024年
作者: Li, Zhifei Luo, Xiangyu Zhang, Miao Zhang, Yan Xiao, Kui School of Computer Science and Information Engineering Hubei University Wuhan430062 China School of Cyber Science and Technology Hubei University Wuhan430062 China Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education Wuhan430062 China Hubei Key Laboratory of Big Data Intelligent Analysis and Application Hubei University Wuhan430062 China
Multi-modal entity alignment aims to integrate equivalent entities in diverse multi-modal knowledge graphs. However, previous studies have primarily focused on multi-modal fusion methods without considering the impact... 详细信息
来源: 评论
Higher order implicit CNDG-PML algorithm for left-handed materials
收藏 引用
Journal of systems Engineering and Electronics 2021年 第1期32卷 31-37页
作者: CHEN Yanfang WANG Liwei School of Electrical and Information Engineering Tianjin UniversityTianjin 300072China Tianjin Key Laboratory of Intelligent Information Processing in Remote Sensing Tianjin Zhongwei Aerospace Data System Technology Co.Ltd.Tianjin 300450China
By incorporating the higher order concept,the piecewise linear recursive convolution(PLRC)method and CrankNicolson Douglas-Gunn(CNDG)algorithm,the unconditionally stable complex frequency shifted nearly perfectly matc... 详细信息
来源: 评论
Steel Surface Defect Detection Based on Improved YOLOv8  20
Steel Surface Defect Detection Based on Improved YOLOv8
收藏 引用
20th International Conference on Natural Computation, Fuzzy systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Zhang, Jichen Zhang, Zhi College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Hubei Wuhan430065 China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Hubei Wuhan430065 China
There are some defects on the surface of steel that are difficult to detect, so we propose an improved algorithm based on YOLOv8 for detecting defects that are difficult to be detected. This improvement includes the i... 详细信息
来源: 评论
Genetic Algorithm for Block Relocation in Automated Warehouse  5
Genetic Algorithm for Block Relocation in Automated Warehous...
收藏 引用
5th International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2023
作者: Wang, Gang Lian, Mingchang Ding, Wei Chen, Songhang Chen, Hao Quanzhou Institute of Equipment Manufacturing Haixi Institutes Chinese Academy of Sciences Quanzhou362200 China College of Computer and Cyber Security Fujian Normal University Fujian Fuzhou350001 China Fujian Science & Technology Innovation Laboratory for Optoelectronic Information of China Fujian Fuzhou350108 China Fujian Provincial Key Laboratory of Intelligent Identification and Control of Complex Dynamic System Quanzhou362200 China
This paper is based on the research background of block relocation in the automated warehouse and proposes a solution utilizing AGV to relocate goods within the warehouse. Building upon the automated warehouse layout ... 详细信息
来源: 评论
A First Look at LLM-powered Smartphones
A First Look at LLM-powered Smartphones
收藏 引用
IEEE/ACM International Conference on Automated Software Engineering - Workshops (ASE Workshops)
作者: Liangxuan Wu Yanjie Zhao Chao Wang Tianming Liu Haoyu Wang Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology
The integration of Large Language Models (LLMs) into edge devices such as smartphones represents a significant leap in mobile technology, promising enhanced user experiences and novel functionalities. This paper prese... 详细信息
来源: 评论
KCPMA: k-degree Contact Pattern Mining Algorithms for Moving Objects
KCPMA: k-degree Contact Pattern Mining Algorithms for Moving...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: You Chen Hua Dai Mingfeng Jiang Qu Lu Pengyue Li Bohan Li Geng Yang Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China Nanjing University of Aeronautics and Astronautics Nanjing China
During infectious disease outbreaks, tracking contacted objects is important for suppressing the spread of the virus and using trajectories of moving objects to discover contacted objects is one of effective approache... 详细信息
来源: 评论
FELSDiff: Image Super-Resolution Based on Diffusion Model Fusing Feature Extraction with Latent Space  20
FELSDiff: Image Super-Resolution Based on Diffusion Model Fu...
收藏 引用
20th International Conference on Natural Computation, Fuzzy systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Wu, Cancan Zhang, Zhi Wuhan University of Science and Technology College of Computer Science and Technology Hubei Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan430065 China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Hubei Wuhan430065 China
In addressing issues like an excessive number of network parameters and the loss of fine texture details in image super-resolution reconstruction approaches based on diffusion models, this passage introduces a novel i... 详细信息
来源: 评论
Exploiting Robust Model Watermarking Against the Model Fine-Tuning Attack via Flat Minima Aware Optimizers
Exploiting Robust Model Watermarking Against the Model Fine-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Dongdong Lin Yue Li Bin Li Jiwu Huang Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China SZU-AFS Joint Innovation Center for AI Technology Shenzhen University Shenzhen China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Xiamen China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University Shenzhen China
With the rapid advancement of deep neural networks (DNNs), model watermarking has emerged as a widely adopted technique for safeguarding model copyrights. A prevalent method involves utilizing a watermark decoder to r... 详细信息
来源: 评论
Anomalous Hall effects in magnetic weak topological insulator films
收藏 引用
Physical Review B 2025年 第4期111卷 045409-045409页
作者: Rui Chen Xiao-Xia Yi Bin Zhou Dong-Hui Xu Department of Physics Hubei University Wuhan 430062 China Key Laboratory of Intelligent Sensing System and Security of Ministry of Education Hubei University Wuhan 430062 China Department of Physics and Chongqing Key Laboratory for Strongly Coupled Physics Chongqing University Chongqing 400044 China Center of Quantum Materials and Devices Chongqing University Chongqing 400044 China
The interplay between magnetism and strong topological insulator gives rise to distinct new topological phases and various intriguing phenomena, attracting significant attention in recent years. However, magnetic effe... 详细信息
来源: 评论
Community Detection Based on Deep Network Embedding with Dual Self-supervised Training  3rd
Community Detection Based on Deep Network Embedding with Dua...
收藏 引用
3rd International Conference on Big data and security, ICBDS 2021
作者: Chen, Yunfang Mao, Haotian Wang, Li Zhang, Wei School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China
We propose a community discovery method based on deep auto-encoding (DGAE_DST). Firstly, we use the pre-trained two-layer neural network and k-means algorithm to initialize the centroid vector, and then use the DNN mo... 详细信息
来源: 评论