咨询与建议

限定检索结果

文献类型

  • 560 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 685 篇 工学
    • 491 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 192 篇 信息与通信工程
    • 131 篇 电气工程
    • 94 篇 控制科学与工程
    • 74 篇 生物工程
    • 66 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 44 篇 机械工程
    • 44 篇 生物医学工程(可授...
    • 34 篇 交通运输工程
    • 32 篇 网络空间安全
    • 28 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 168 篇 数学
    • 87 篇 生物学
    • 82 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 24 篇 化学
    • 24 篇 系统科学
  • 186 篇 管理学
    • 106 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 39 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 32 篇 法学
    • 22 篇 社会学
  • 15 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 27 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 computational mo...
  • 17 篇 optimization
  • 17 篇 accuracy
  • 16 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 13 篇 deep neural netw...
  • 12 篇 data privacy
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 12 篇 data models

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 university of ch...
  • 15 篇 huazhong univers...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 wang guoyin
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 959 篇 英文
  • 83 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1050 条 记 录,以下是271-280 订阅
排序:
A new RCNN-RF for efficient and robust parking lot available detection  16
A new RCNN-RF for efficient and robust parking lot available...
收藏 引用
16th International Conference on Digital Image Processing, ICDIP 2024
作者: Zhang, Qian Ran, Yaqin Luo, Di Xu, Kaili Shi, Jilaing School of Data Science and Information Engineering GuiZhou MinZu University Guiyang550025 China Guizhou Key Laboratory of Pattern Recognition and Intelligent System Guiyang550025 China
It's very meaningful to conduct the driver to the parking space available in the parking lot clearly and accurately by computer vision and computational intelligence. While it is an extremely difficult task, becau... 详细信息
来源: 评论
MTSS: multi-path traffic scheduling mechanism based on SDN
收藏 引用
Journal of systems Engineering and Electronics 2019年 第5期30卷 974-984页
作者: XU Xiaolong CHEN Yun HU Liuyun KUMAR Anup Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China Institute of Big Data Research at Yancheng Nanjing University of Posts and TelecommunicationsYancheng 224000China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Department of Computer Engineering and Computer Science University of LouisvilleLouisville KY40292USA
Large-scale and diverse businesses based on the cloud computing platform bring the heavy network traffic to cloud data ***,the unbalanced workload of cloud data center network easily leads to the network congestion,th... 详细信息
来源: 评论
An adaptive flow table adjustment algorithm for SDN  21
An adaptive flow table adjustment algorithm for SDN
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and systems, HPCC/SmartCity/DSS 2019
作者: Xu, Xiaolong Hu, Liuyun Lin, Haowei Fan, Zexuan School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
SDN (Software-defined networking) are important for current network systems, such as cloud systems. The characteristics of flow in SDN and the impact of flow table entries and controllers on data packet transmission a... 详细信息
来源: 评论
Distributed optimization strategy for multi-region power scheduling based on alternating direction method of multipliers  12
Distributed optimization strategy for multi-region power sch...
收藏 引用
12th World Congress on intelligent Control and Automation, WCICA 2016
作者: Sun, Chenlin Wu, Jiang Gao, Feng Guan, Xiaohong State Key Laboratory for Manufacturing System Engineering of xi'An Jiaotong University Xi'an710049 China Ministry of Education Key Lab for Intelligent Networks and Networks Security of xi'An Jiaotong University Xi'an710049 China
The large-scale and frequent cross-regional electricity allocations bring about the critical need to coordinate multi-region power scheduling. It is recognized that each sub-systems' taking charge of own schedulin... 详细信息
来源: 评论
Learning Disentangled Latent Factors for Individual Treatment Effect Estimation Using Variational Generative Adversarial Nets  25
Learning Disentangled Latent Factors for Individual Treatmen...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Bao, Qingsen Mao, Zeyong Chen, Lei Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Estimating individual treatment effect (ITE) is a challenging task due to the need for individual potential outcomes to be learned from biased data and counterfactuals are inherently unobservable. Some researchers pro... 详细信息
来源: 评论
A First Look at LLM-powered Smartphones  39
A First Look at LLM-powered Smartphones
收藏 引用
39th ACM/IEEE International Conference on Automated Software Engineering Workshops, ASEW 2024
作者: Wu, Liangxuan Zhao, Yanjie Wang, Chao Liu, Tianming Wang, Haoyu Huazhong University of Science and Technology Wuhan China Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China
The integration of Large Language Models (LLMs) into edge devices such as smartphones represents a significant leap in mobile technology, promising enhanced user experiences and novel functionalities. This paper prese... 详细信息
来源: 评论
A Client Selection Method Based on Loss Function Optimization for Federated Learning
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第10期137卷 1047-1064页
作者: Yan Zeng Siyuan Teng Tian Xiang Jilin Zhang Yuankai Mu Yongjian Ren Jian Wan School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China Key Laboratory of Complex System Modeling and Simulation Ministry of EducationHangzhou310018China Zhejiang Engineering Research Center of Data Security Governance Hangzhou310018China Intelligent Robotics Research Center Zhejiang LabHangzhou311100China HDU-ITMO Joint Institute Hangzhou Dianzi UniversityHangzhou310018China
Federated learning is a distributedmachine learningmethod that can solve the increasingly serious problemof data islands and user data privacy,as it allows training data to be kept locally and not shared with other **... 详细信息
来源: 评论
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud  27
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud
收藏 引用
27th IEEE International Conference on Parallel and Distributed systems, ICPADS 2021
作者: Jiang, Yu Xu, Xiaolong Lin, Kunda Duan, Weihua Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In order to select a composition scheme that meets user's needs and high performance from large-scale web services in the edge cloud, this paper proposes a trusted service composition optimization scheme called TS... 详细信息
来源: 评论
Maximum likelihood estimation based on random subspace EDA: Application to extrasolar planet detection  11th
Maximum likelihood estimation based on random subspace EDA: ...
收藏 引用
11th International Conference on Simulated Evolution and Learning, SEAL 2017
作者: Liu, Bin Chen, Ke-Jia School of Computer Science Nanjing University of Posts and Telecommunications NanjingJiangsu210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing NanjingJiangsu210023 China
This paper addresses maximum likelihood (ML) estimation based model fitting in the context of extrasolar planet detection. This problem is featured by the following properties: (1) the candidate models under considera... 详细信息
来源: 评论
APDPk-means: A new differential privacy clustering algorithm based on arithmetic progression privacy budget allocation  21
APDPk-means: A new differential privacy clustering algorithm...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and systems, HPCC/SmartCity/DSS 2019
作者: Fan, Zexuan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security AND Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
How to protect users' private data during network data mining has become a hot issue in the fields of big data and network information security. Most current researches on differential privacy k-means clustering a... 详细信息
来源: 评论