咨询与建议

限定检索结果

文献类型

  • 532 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,022 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 660 篇 工学
    • 475 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 112 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 321 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 78 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 18 篇 hai jin
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 935 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1022 条 记 录,以下是291-300 订阅
排序:
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable systems and Networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Yijun Hao Shusen Yang Fang Li Yifan Zhang Cong Zhao Xuebin Ren Peng Zhao Chenren Xu Shibo Wang National Engineering Laboratory for Big Data Analytics Xi’an Jiaotong University Xi’an China National Engineering Laboratory for Big Data Analytics and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Computer Science Peking University Beijing China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China National Engineering Laboratory for Big Data Analytics XiÃan Jiaotong University XiÃan China
Network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
Detecting Unknown Threats in Smart Contracts With Domain Adaptation
Detecting Unknown Threats in Smart Contracts With Domain Ada...
收藏 引用
Software Services Engineering (SSE) IEEE International Conference on
作者: Weiwei Ye Liu Yang Li Duan Chao Li Wei Ni Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China Information Security Evaluation Center of Civil Aviation Civil Aviation University of China Tianjin CSIRO Data 61 Sydney NSW Australia
Unknown smart contract vulnerabilities objectively exist in addition to common vulnerabilities, and their potential risks cannot be ignored. Therefore, it is crucial to enhance the model's ability to detect these ... 详细信息
来源: 评论
A Secure and Lightweight Aggregation Method for Blockchain-based Distributed Federated Learning
A Secure and Lightweight Aggregation Method for Blockchain-b...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: He Huang Li Duan Chao Li Wei Ni Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China Information Security Evaluation Center of Civil Aviation Civil Aviation University of China Tianjin CSIRO Data 61 Sydney NSW Australia
Federated learning (FL), typically coordinated by a centralized server, faces the risk of a single-point failure during the model aggregation process. Moreover, existing privacy protection methods for FL model paramet... 详细信息
来源: 评论
Secure Cross-domain Medical data Sharing based on Distributed Cloud and Blockchain Services
Secure Cross-domain Medical Data Sharing based on Distribute...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Jiasheng Cui Li Duan Wei Ni Chao Li Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China Data61 CSIRO Marsfield NSW Australia
Electronic Health Record (EHR) provides critical medical data. Sharing EHRs can add services and value for hospitals and patients and effectively improve medical services’ quality. In the process of cross-hospital di...
来源: 评论
Automatic skin lesion classification using a novel densely connected convolutional network integrated with an attention module
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第7期14卷 8943-8956页
作者: Shan, Pufang Chen, Jialei Fu, Chong Cao, Lin Tie, Ming Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China Science and Technology on Space Physics Laboratory Beijing100076 China School of Computer Science The University of Auckland Auckland New Zealand
Automated skin lesion classification in dermoscopy images remains challenging due to the existence of artefacts and intrinsic cutaneous features, diversity of lesion morphology, insufficiency of training data, and cla... 详细信息
来源: 评论
Partial Deep Domain Adaptation for Non-Intrusive Load Monitoring  21
Partial Deep Domain Adaptation for Non-Intrusive Load Monito...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Li, Yuying Yang, Yang Wang, Chen Liu, Runqin Jiang, Hongbo Liu, Wenping Hubei University Key Laboratory of Intelligent Sensing System and Security Ministry of Education School of Artificial Intelligence Wuhan China Huazhong University of Science and Technology Wuhan China China Unicom Central South Research Institute Changsha China Hunan University Changsha China Hubei University of Economics Wuhan China
With the widespread deployment of smart meters and the burgeoning integration of the Ubiquitous Power Internet of Things (UPIoT), Non-Intrusive Load Monitoring (NILM) has emerged as an essential technology, providing ... 详细信息
来源: 评论
ENSIOT: A Stacking Ensemble Learning Approach for IoT Device Identification
ENSIOT: A Stacking Ensemble Learning Approach for IoT Device...
收藏 引用
International Workshop on Quality of Service
作者: Kangli Niu Shenghao Liu Lingzhi Yi Xianjun Deng Suning Chen Laurence T. Yang Minmin Cheng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Safety Engineering Zhongnan University of Economics and Law
In order to resist network attacks on IoT devices, identifying IoT devices is the first step for ensuring device security. The traditional passive method identifies IoT devices by mining the potential relationship bet... 详细信息
来源: 评论
Big-Moe: Bypassing Isolated Gating For Generalized Multimodal Face Anti-Spoofing
Big-Moe: Bypassing Isolated Gating For Generalized Multimoda...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yingjie Ma Zitong Yu Xun Lin Weicheng Xie Linlin Shen College of Computer Science and Software Engineering Shenzhen University Great Bay University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing
In the domain of facial recognition security, multimodal Face Anti-Spoofing (FAS) is essential for countering presentation attacks. However, existing technologies encounter challenges due to modality biases and imbala... 详细信息
来源: 评论
Learning with Open-world Noisy data via Class-independent Margin in Dual Representation Space
arXiv
收藏 引用
arXiv 2025年
作者: Pan, Linchao Gao, Can Zhou, Jie Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China
Learning with Noisy Labels (LNL) aims to improve the model generalization when facing data with noisy labels, and existing methods generally assume that noisy labels come from known classes, called closed-set noise. H... 详细信息
来源: 评论