咨询与建议

限定检索结果

文献类型

  • 529 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,019 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 657 篇 工学
    • 474 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 112 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 321 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 78 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 robustness
  • 13 篇 contrastive lear...
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 56 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 18 篇 hai jin
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 932 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1019 条 记 录,以下是301-310 订阅
排序:
Design of Environment Monitoring system Based on Single-Chip Microcomputer
Design of Environment Monitoring System Based on Single-Chip...
收藏 引用
International Conference on intelligent Human-Machine systems and Cybernetics, IHMSC
作者: Fan Wang Guojun Liu Wei Zhang Wen Wang School of Computer Science and Information Engineering Hubei University Wuhan China Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education
This article proposes a real-time environment monitoring system based on single-chip microcomputer, which consists of the device and user. The user adopts WeChat small program, while the device includes STMicroelectro...
来源: 评论
Targeted Pareto Optimization for Subset Selection With Monotone Objective Function and Cardinality Constraint
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 1-1页
作者: Shang, Ke Wu, Guotong Pang, Lie Meng Ishibuchi, Hisao National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science and Engineering Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Southern University of Science and Technology Shenzhen China
Subset selection, a fundamental problem in various domains, is to choose a subset of elements from a large candidate set under a given objective or multiple objectives. Pareto optimization for subset selection (POSS) ... 详细信息
来源: 评论
Reducing Traffic Wastage in Video Streaming via Bandwidth-Efficient Bitrate Adaptation
arXiv
收藏 引用
arXiv 2024年
作者: Su, Hairong Wang, Shibo Yang, Shusen Huang, Tianchi Ren, Xuebin National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University China Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University China R&D department Sony
Bitrate adaptation (also known as ABR) is a crucial technique to improve the quality of experience (QoE) for video streaming applications. However, existing ABR algorithms suffer from severe traffic wastage, which ref... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
Quantum-inspired Hash Function Based on Parity-dependent Quantum Walks with Memory
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Qing Tang, Xueming Lu, Songfeng Yang, Hao Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
In this paper, we develop a generic controlled alternate quantum walk model (called CQWM-P) by combining parity-dependent quantum walks with distinct arbitrary memory lengths and then construct a quantum-inspired hash... 详细信息
来源: 评论
An Autoencoder-Like Nonnegative Matrix Co-Factorization for Improved Student Cognitive Modeling  38
An Autoencoder-Like Nonnegative Matrix Co-Factorization for ...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Yu, Shenbao Pan, Yinghui Zeng, Yifeng Doshi, Prashant Liu, Guoquan Poh, Kim-Leng Lin, Mingwei College of Computer and Cyber Security Fujian Normal University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer and Information Sciences Northumbria University United Kingdom Intelligent Thought and Action Lab School of Computing University of Georgia United States Financial Technology Research Institute Fudan University China College of Design and Engineering National University of Singapore Singapore
Student cognitive modeling (SCM) is a fundamental task in intelligent education, with applications ranging from personalized learning to educational resource allocation. By exploiting students' response logs, SCM ...
来源: 评论
SMPC Task Decomposition: A Theory for Accelerating Secure Multi-party Computation Task
arXiv
收藏 引用
arXiv 2023年
作者: Feng, Yuanqing Bai, Tao Lu, Songfeng Tang, Xueming Wu, Junjun Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
Today, we are in the era of big data, and data are becoming more and more important, especially private data. Secure Multi-party Computation (SMPC) technology enables parties to perform computing tasks without reveali... 详细信息
来源: 评论
Each Fake News is Fake in its Own Way: An Attribution Multi-Granularity Benchmark for Multimodal Fake News Detection
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Hao Ma, Zihan Zeng, Zhi Luo, Minnan Zeng, Weixin Tang, Jiuyang Zhao, Xiang Laboratory for Big Data and Decision Nation University of Defence Technology China School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University China
Social platforms, while facilitating access to information, have also become saturated with a plethora of fake news, resulting in negative consequences. Automatic multimodal fake news detection is a worthwhile pursuit... 详细信息
来源: 评论
Fu-W:A Hyperspectral Image Classification Algorithm Combining Mini Graph Convolutional Networks and Convolutional neural network  23
Fu-W:A Hyperspectral Image Classification Algorithm Combinin...
收藏 引用
6th International Conference on Big data Technologies, ICBDT 2023
作者: Shi, Jiechuan Liu, Kun Yuan, Hao Wang, Can Yang, Bo School of Information Science and Engineering University of Jinan Jinan250022 China China High-resolution Earth Observation System Shandong Center of Data and Application University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China
Convolutional Neural Network (CNN) is a widely used neural network in deep learning, and Graph Convolutional Network (GCN) is one of the most effective semi -supervised methods. It spread node information in a convers... 详细信息
来源: 评论
A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm  18th
A Cloud Computing User Experience Focused Load Balancing Met...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Luo, Jihai Dong, Chen Chen, Zhenyi Xu, Li Chen, Tianci College of Computer and Data Science - Fuzhou University Xueyuan Road Fujian Fuzhou360108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Department of Computer Science and Engineering University of South Florida TampaFL33620 United States College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China
The development of the software and hardware has brought about the abundance and overflow of computing resources. Many Internet companies can lease idle computing resources based on the peak and valley cycles of usage... 详细信息
来源: 评论