咨询与建议

限定检索结果

文献类型

  • 560 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 685 篇 工学
    • 491 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 192 篇 信息与通信工程
    • 131 篇 电气工程
    • 94 篇 控制科学与工程
    • 74 篇 生物工程
    • 66 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 44 篇 机械工程
    • 44 篇 生物医学工程(可授...
    • 34 篇 交通运输工程
    • 32 篇 网络空间安全
    • 28 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 168 篇 数学
    • 87 篇 生物学
    • 82 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 24 篇 化学
    • 24 篇 系统科学
  • 186 篇 管理学
    • 106 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 39 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 32 篇 法学
    • 22 篇 社会学
  • 15 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 27 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 computational mo...
  • 17 篇 optimization
  • 17 篇 accuracy
  • 16 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 13 篇 deep neural netw...
  • 12 篇 data privacy
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 12 篇 data models

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 university of ch...
  • 15 篇 huazhong univers...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 wang guoyin
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 959 篇 英文
  • 83 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1050 条 记 录,以下是261-270 订阅
排序:
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Objec...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhou, Yongjie Xiong, Jinbo Bi, Renwan Tian, Youliang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Fujian Provincial Key Laboratory of Network System Information Security College of Computer and Cyberspace Security Fujian Normal University FJ Fuzhou350117 China
The connected autonomous vehicles (CAVs) are a key component of intelligent transportation systems (ITS) where vehicles communicate with each other to exchange sensing data from on-board sensors (e.g., high-definition... 详细信息
来源: 评论
Policy Network-Based Dual-Agent Deep Reinforcement Learning for Multi-Resource Task Offloading in Multi-Access Edge Cloud Networks
收藏 引用
China Communications 2024年 第4期21卷 53-73页
作者: Feng Chuan Zhang Xu Han Pengchao Ma Tianchun Gong Xiaoxue School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Institute of Intelligent Communication and Network Security Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and TelecommunicationsChongqing 400065China School of Information Engineering Guangdong University of TechnologyGuangzhou 510006China
The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC n... 详细信息
来源: 评论
A Fraud Detection Approach Based on Combined Feature Weighting  10th
A Fraud Detection Approach Based on Combined Feature Weighti...
收藏 引用
10th EAI International Conference on Cloud Computing, CloudComp 2020
作者: Liu, Xiaoqian Yu, Chenfei Xia, Bin Gu, Haiyan Wang, Zhenli Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Nanjing China Jiangsu Provincial Public Security Department Key Laboratory of Digital Forensics Nanjing China
data mining technology has yielded fruitful results in the area of crime discovery and intelligent decision making. Credit card is one of the most popular payment methods, providing great convenience and efficiency. H... 详细信息
来源: 评论
Feature Decoupled of Deep Mutual Information Maximization  2
Feature Decoupled of Deep Mutual Information Maximization
收藏 引用
2nd International Conference on Automation, Robotics and Computer Engineering, ICARCE 2023
作者: He, Xing Peng, Changgen Wang, Lin Tan, Weijie Wang, Zifan State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Key Laboratory of Pattern Recognition and Intelligent System Guizhou Minzu University Guiyang China Guizhou Big Data Academy Guizhou University Guiyang China Guizhou Minzu University Guizhou Key Laboratory of Pattern Recognition and Intelligent System Guiyang China Institute of Guizhou Aerospace Measuring and Testing Technology Guiyang China
In deep learning, supervised learning techniques usually require a large amount of expensive labeled data to train the network, and the feature representations extracted by the model usually mix multiple attributes, r... 详细信息
来源: 评论
Recognition of Disaster Images Based on Self-Supervised Learning  7
Recognition of Disaster Images Based on Self-Supervised Lear...
收藏 引用
7th International Conference on Cloud Computing and Big data Analytics, ICCCBDA 2022
作者: Wang, Linyong Wu, Ruiqi Li, Cen Zou, Zhiqiang Nanjing University of Posts and Telecommunications NanJing China College of Computer Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing NanJing China
Existing supervised deep learning model requires large amounts of labeled training data to learn new tasks. This is a limitation for many practical applications in disaster areas as well as in many other fields such a... 详细信息
来源: 评论
Distributed Image Retrieval Base on LSH Indexing on Spark  1st
Distributed Image Retrieval Base on LSH Indexing on Spark
收藏 引用
1st International Conference on Big data and security, ICBDS 2019
作者: Hou, Zelei Huang, Chao Wu, Jiagao Liu, Linfeng School of Computer Nanjing University of Posts and Telecommunications NanjingJiangsu210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing NanjingJiangsu210023 China
With the advent of the era of big data, how to process massive image, video and other multimedia data timely and accurately has become a new challenge in related fields. Aiming at the computational bottleneck and inef... 详细信息
来源: 评论
Machine Learning for Signal Demodulation in Underwater Wireless Optical Communications
收藏 引用
China Communications 2024年 第5期21卷 297-313页
作者: Ma Shuai Yang Lei Ding Wanying Li Hang Zhang Zhongdan Xu Jing Li Zongyan Xu Gang Li Shiyin Department of Strategic and Advanced Interdisciplinary Research Peng Cheng LaboratoryShenzhen 518055China School of Information and Control Engineering China University of Mining and TechnologyXuzhou 221116China Data-driven Intelligent Information System Laboratory Shenzhen Research Institute of Big DataShenzhen 518172China Ocean College Zhejiang UniversityZhoushan 316021China State Key Laboratory of Millimeter Waves Southeast UniversityNanjing 210096China
The underwater wireless optical communication(UWOC)system has gradually become essential to underwater wireless communication *** other existing works on UWOC systems,this paper evaluates the proposed machine learning... 详细信息
来源: 评论
Simultaneous Speech Extraction for Multiple Target Speakers Under Meeting Scenarios
收藏 引用
Journal of Shanghai Jiaotong University (Science) 2024年 1-7页
作者: Zeng, Bang Suo, Hongbin Wan, Yulong Li, Ming School of Computer Science Wuhan University Wuhan430027 China Suzhou Municipal Key Laboratory of Multimodal Intelligent Systems Duke Kunshan University Kunshan Jiangsu215316 China Data & amp AI Engineering System OPPO Beijing100125 China
The common target speech separation directly estimates the target source, ignoring the interrelationship between different speakers at each frame. We propose a multiple-target speech separation (MTSS) model to simulta... 详细信息
来源: 评论
Transmission line inspection system based on high performance unmanned helicopters  4
Transmission line inspection system based on high performanc...
收藏 引用
4th International Conference on Mechanical, Electronics, and Electrical and Automation Control, METMS 2024
作者: Li, Wei Li, Ming Meng, Xiangjiao Tianjin Key Laboratory of Intelligent Information Processing in Remote Sensing Tianjin Zhong Wei Aerospace Data System Technology Co. Ltd. Tianjin China
A high-performance unmanned helicopter based transmission line inspection system is proposed to address the issues of low single operation efficiency, low degree of autonomy, and single operation mode in the current m... 详细信息
来源: 评论
Alexa Skills: security Vulnerabilities and Countermeasures
Alexa Skills: Security Vulnerabilities and Countermeasures
收藏 引用
2022 IEEE Conference on Communications and Network security, CNS 2022
作者: Su, Dan Liu, Jiqiang Zhu, Sencun Wang, Xiaoyang Wang, Wei Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation China The Pennsylvania State University School of Eecs United States Beijing Jiaotong University Beijing Key Laboratory of Traffic Data Analysis and Mining China
The home voice assistants such as Amazon Alexa have become increasingly popular due to many interesting voice-activated services provided through special applications called skills. These skills, though useful, have a... 详细信息
来源: 评论