咨询与建议

限定检索结果

文献类型

  • 538 篇 期刊文献
  • 496 篇 会议

馆藏范围

  • 1,034 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 663 篇 工学
    • 477 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 114 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 323 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 79 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 48 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 34 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 21 篇 school of softwa...
  • 19 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 947 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1034 条 记 录,以下是311-320 订阅
排序:
Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes  35
Understanding and Detecting Privacy Leakage Vulnerabilities ...
收藏 引用
35th IEEE International Symposium on Software Reliability Engineering, ISSRE 2024
作者: Chen, Ziming Li, Yue Gao, Jianbo Zhang, Jiashuo Wang, Ke Hu, Jianbin Guan, Zhi Chen, Zhong Peking University School of Computer Science Beijing China Taiyuan University of Technology College of Computer Science and Technology Taiyuan China Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing China Peking University Chongqing Research Institute of Big Data Chongqing China Peking University National Engineering Research Center for Software Engineering Beijing China
The application on a blockchain cannot maintain secrecy because its data is replicated across all peers in the network. To remedy this problem, Hyperledger Fabric introduces private data collection (PDC) into its smar... 详细信息
来源: 评论
PM$^{2}$2VE: Power Metering Model for Virtualization Environments in Cloud data Centers
收藏 引用
IEEE Transactions on Cloud Computing 2023年 第3期11卷 3126-3138页
作者: Ziyu Shen Xusheng Zhang Zheng Liu Yun Li School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory for Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Virtualization technologies provide solutions for cloud computing. Virtual resource scheduling is a crucial task in data centers, and the power consumption of virtual resources is a critical foundation of virtualizati... 详细信息
来源: 评论
SCALABLE ATTRIBUTION OF ADVERSARIAL ATTACKS VIA MULTI-TASK LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Guo, Zhongyi Han, Keji Ge, Yao Ji, Wei Li, Yun Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
Deep neural networks (DNNs) can be easily fooled by adversarial attacks during inference phase when attackers add imperceptible perturbations to original examples, i.e., adversarial examples. Many works focus on adver... 详细信息
来源: 评论
Style-conditional Prompt Token Learning for Generalizable Face Anti-spoofing  24
Style-conditional Prompt Token Learning for Generalizable Fa...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Guo, Jiabao Liu, Huan Luo, Yizhi Hu, Xueli Zou, Hang Zhang, Yuan Liu, Hui Zhao, Bo Wuhan University Wuhan China Beijing Jiaotong University Beiijng China Sichuan Intelligent Transportation System Management Co. Ltd. Chengdu China Key Laboratory of Cyberspace Security Ministry of Education Zhengzhou China China Telecom Research Institute Beijing China China Telecom Research Institute Shanghai China Central China Normal University Wuhan China
Face anti-spoofing (FAS) based on domain generalization (DG) has attracted increasing attention from researchers. The reason for the poor generalization is that the model is overfitted to salient liveness-irrelevant s... 详细信息
来源: 评论
Four-dimensional Floquet topological insulator with an emergent second Chern number
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Zheng-Rong Chen, Rui Zhou, Bin Department of Physics Hubei University Wuhan430062 China Key Laboratory of Intelligent Sensing System and Security Ministry of Education Hubei University Wuhan430062 China
Floquet topological insulators have been widely investigated in lower-dimensional systems. However, Floquet topological insulators induced by time-periodic driving in higher-dimensional systems remain unexplored. In t... 详细信息
来源: 评论
Periodically driven four-dimensional topological insulator with tunable second Chern number
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Zheng-Rong Chen, Rui Zhou, Bin Department of Physics Hubei University Wuhan430062 China Key Laboratory of Intelligent Sensing System and Security Ministry of Education Hubei University Wuhan430062 China
In recent years, Floquet engineering has attracted considerable attention as a promising approach for tuning topological phase transitions. In this work, we investigate the effects of high-frequency time-periodic driv... 详细信息
来源: 评论
Predicting Genotype Information Related to COVID-19 for Molecular Mechanism Based on Computational Methods
收藏 引用
Computer Modeling in Engineering & Sciences 2021年 第10期129卷 31-45页
作者: Lejun Gong Xingxing Zhang Li Zhang Zhihong Gao Jiangsu Key Laboratory of Big Data Security&Intelligent Processing School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210046China Smart Health Big Data Analysis and Location Services Engineering Laboratory of Jiangsu Province Nanjing210046China College of Computer Science and Technology Nanjing Forestry UniversityNanjing210037China Zhejiang Engineering Research Center of Intelligent Medicine Wenzhou325035China
Novel coronavirus disease 2019(COVID-19)is an ongoing health *** studies are related to ***,its molecular mechanism remains *** rapid publication of COVID-19 provides a new way to elucidate its mechanism through compu... 详细信息
来源: 评论
You Are Catching My Attention: Are Vision Transformers Bad Learners under Backdoor Attacks?
You Are Catching My Attention: Are Vision Transformers Bad L...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Zenghui Yuan Pan Zhou Kai Zou Yu Cheng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Protagolabs Inc Microsoft Research
Vision Transformers (ViTs), which made a splash in the field of computer vision (CV), have shaken the dominance of convolutional neural networks (CNNs). However, in the process of industrializing ViTs, backdoor attack...
来源: 评论
Size-Invariance Matters: Rethinking Metrics and Losses for Imbalanced Multi-object Salient Object Detection  41
Size-Invariance Matters: Rethinking Metrics and Losses for I...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Feiran Xu, Qianqian Bao, Shilong Yang, Zhiyong Cong, Runmin Cao, Xiaochun Huang, Qingming Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Science Beijing Jiaotong University Beijing China School of Control Science and Engineering Shandong University Jinan China Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Cyber Science and Tech. Sun Yat-sen University Shenzhen Campus China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores the size-invariance of evaluation metrics in Salient Object Detection (SOD), especially when multiple targets of diverse sizes co-exist in the same image. We observe that current metrics are size-s... 详细信息
来源: 评论
A Recommendation system Based on Adaptive Genetic Algorithm for Enclosed Spaces  6
A Recommendation System Based on Adaptive Genetic Algorithm ...
收藏 引用
6th International Symposium on Autonomous systems, ISAS 2023
作者: Guo, Meng Chen, Songhang Wang, Yaozong Fujian Normal University College of Computer and Cyber Security Fuzhou China Fujian Institute of Research on the Structure of Matter Chinese Academy of Sciences Department of Quanzhou Institute of Equipment Manufacturing Quanzhou China Fujian Provincial Key Laboratory of Intelligent Identification and Control of Complex Dynamic System Department of Quanzhou Institute of Equipment Manufacturing Quanzhou China
Most of the management systems used in common enclosed spaces only have basic functions such as booking and payment, and do not have epidemic prevention and traceability functions. In the COVID-19 pandemic, enclosed s... 详细信息
来源: 评论