咨询与建议

限定检索结果

文献类型

  • 543 篇 期刊文献
  • 486 篇 会议

馆藏范围

  • 1,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 656 篇 工学
    • 464 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 172 篇 信息与通信工程
    • 113 篇 电气工程
    • 82 篇 控制科学与工程
    • 74 篇 生物工程
    • 53 篇 电子科学与技术(可...
    • 44 篇 机械工程
    • 44 篇 光学工程
    • 42 篇 生物医学工程(可授...
    • 33 篇 交通运输工程
    • 27 篇 网络空间安全
    • 26 篇 化学工程与技术
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 22 篇 仪器科学与技术
    • 22 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 164 篇 数学
    • 87 篇 生物学
    • 83 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 26 篇 化学
    • 24 篇 系统科学
  • 179 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 89 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 临床医学
    • 30 篇 基础医学(可授医学...
  • 31 篇 法学
    • 22 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 43 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 25 篇 deep learning
  • 22 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 19 篇 computational mo...
  • 19 篇 accuracy
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 17 篇 optimization
  • 16 篇 graph neural net...
  • 15 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 correlation

机构

  • 57 篇 hubei key labora...
  • 53 篇 school of comput...
  • 47 篇 school of cyber ...
  • 41 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 36 篇 jiangsu key labo...
  • 33 篇 national enginee...
  • 29 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 guangdong provin...
  • 15 篇 university of ch...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 26 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 18 篇 wang guoyin
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 15 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 949 篇 英文
  • 74 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1029 条 记 录,以下是21-30 订阅
排序:
Stacking U-Nets in U-shape: Redesigning the Information Flow in Model-based Networks for MRI Reconstruction
Stacking U-Nets in U-shape: Redesigning the Information Flow...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Model-based networks have shown convincing performance in MRI reconstruction. However, the unrolled cascades within the networks are constrained to solely obtain information from the preceding counterpart, resulting i... 详细信息
来源: 评论
Subsampling Decomposition based k-Space Refinement for Accelerated MRI Reconstruction
Subsampling Decomposition based k-Space Refinement for Accel...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
In accelerated MRI reconstruction problem, directly recovering all the missing k-space data from undersampled measurements is highly ill-posed and often leads to suboptimal performance. To address the problem, we prop... 详细信息
来源: 评论
Learning Preconditioners in Gates-controlled Deep Unfolding Networks based on Quasi-Newton Methods For Accelerated MRI Reconstruction
Learning Preconditioners in Gates-controlled Deep Unfolding ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Deep unfolding networks (DUNs) have made significant progress in MRI reconstruction, successfully tackling the problem of prolonged imaging time. However, the ill-conditioned nature of MRI reconstruction often causes ... 详细信息
来源: 评论
Virtual Petrochemical FireFighting Training system Design and Implementation  14th
Virtual Petrochemical FireFighting Training System Design an...
收藏 引用
14th International Conference on Frontier Computing, FC 2024
作者: Li, Hengdong Ye, Jun Zhang, Dian Trusted and Intelligent Data Analytic Research Group School of Cyberspace Security Hainan University Haikou China Key Laboratory of Internet Information Retrieval of Hainan Province Hainan University Haikou China
Due to the special and dangerous nature of flammable and explosive petrochemical substances, petrochemical storage and transportation involves great risks and is highly prone to fire and explosion and other accidents,... 详细信息
来源: 评论
Generating Is Believing: Membership Inference Attacks against Retrieval-Augmented Generation
Generating Is Believing: Membership Inference Attacks agains...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Yuying Liu, Gaoyang Wang, Chen Yang, Yang Key Laboratory of Intelligent Sensing System and Security Ministry of Education School of Artificial Intelligence Hubei University Wuhan China Hubei Key Laboratory of Smart Internet Technology Huazhong University of Science and Technology Wuhan China
Retrieval-Augmented Generation (RAG) is a state-of-the-art technique that mitigates issues such as hallucinations and knowledge staleness in Large Language Models (LLMs) by retrieving relevant knowledge from an extern... 详细信息
来源: 评论
Thermal engineering in ALD-grown ZGO thin films for high-performance photodetectors
收藏 引用
材料科学技术(英文版) 2025年 第6期209卷 19-26页
作者: Si-Tong Ding Yu-Chang Chen Cai-Yu Shi Lei Shen Qiu-Jun Yu Lang-Xi Ou Ze-Yu Gu Na Chen Ting-Yun Wang David Wei Zhang Hong-Liang Lu State Key Laboratory of ASIC and System Shanghai Institute of Intelligent Electronics & SystemsSchool of MicroelectronicsFudan UniversityShanghai 200433China Zhangjiang Fudan International Innovation Center Shanghai 201203China National Integrated Circuit Innovation Center Shanghai 201203China Key Laboratory of Specialty Fiber Optics and Optical Access Networks Shanghai Institute Communication and Data ScienceShanghai UniversityShanghai 200444China State Key Laboratory of ASIC and System Shanghai Institute of Intelligent Electronics & SystemsSchool of MicroelectronicsFudan UniversityShanghai 200433China Zhangjiang Fudan International Innovation Center Shanghai 201203China National Integrated Circuit Innovation Center Shanghai 201203China Jiashan Fudan Institute Jiaxing 314100China
Doped gallium oxide-based thin films are a class of wide-band semiconductor materials with the ad-vantages of chemically stable,tunable bandgap,and offer the benefit of ultraviolet *** order to obtain photodetectors(P... 详细信息
来源: 评论
POINTERGUESS: targeted password guessing model using pointer mechanism  24
POINTERGUESS: targeted password guessing model using pointer...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Kedong Xiu Ding Wang College of Cyber Science Nankai University Tianjin China and Key Laboratory of Data and Intelligent System Security (NKU) Ministry of Education Tianjin China and Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
Most existing targeted password guessing models view users' reuse behaviors as sequences of edit operations (e.g., insert and delete) performed on old passwords. These atomic edit operations are limited to modifyi...
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guoliang Li Ruiqi Zhang Zhe Sun Lingkai Xing Yu Zhang College of Cyber Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China College of Computer Science Nankai University China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
Efficient Cross-modal Prompt Learning with Semantic Enhancement for Domain-robust Fake News Detection  31
Efficient Cross-modal Prompt Learning with Semantic Enhancem...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wu, Fei Jin, Hao Hu, Changhui Ji, Yimu Jing, Xiao-Yuan Jiang, Guo-Ping College of Automation College of Artificial Intelligence Nanjing University of Posts and Telecommunications Nanjing China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Guangdong Provincial Key Laboratory of Petrochemical Equipment Intelligent Security Guangdong University of Petrochemical Technology Maoming China School of Computer Wuhan University Wuhan China
With the development of multimedia technology, online social media has become a major medium for people to access news, but meanwhile, it has also exacerbated the dissemination of multi-modal fake news. An automatic a... 详细信息
来源: 评论
IMPRESS: an importance-informed multi-tier prefix KV storage system for large language model inference  25
IMPRESS: an importance-informed multi-tier prefix KV storage...
收藏 引用
Proceedings of the 23rd USENIX Conference on File and Storage Technologies
作者: Weijian Chen Shuibing He Haoyang Qu Ruidong Zhang Siling Yang Ping Chen Yi Zheng Baoxing Huai Gang Chen The State Key Laboratory of Blockchain and Data Security Zhejiang University and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security and Zhejiang Key Laboratory of Big Data Intelligent Computing The State Key Laboratory of Blockchain and Data Security Zhejiang University Huawei Cloud
Modern advanced large language model (LLM) applications often prepend long contexts before user queries to improve model output quality. These contexts frequently repeat, either partially or fully, across multiple que...
来源: 评论