咨询与建议

限定检索结果

文献类型

  • 560 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 685 篇 工学
    • 491 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 192 篇 信息与通信工程
    • 131 篇 电气工程
    • 94 篇 控制科学与工程
    • 74 篇 生物工程
    • 66 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 44 篇 机械工程
    • 44 篇 生物医学工程(可授...
    • 34 篇 交通运输工程
    • 32 篇 网络空间安全
    • 28 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 168 篇 数学
    • 87 篇 生物学
    • 82 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 24 篇 化学
    • 24 篇 系统科学
  • 186 篇 管理学
    • 106 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 39 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 32 篇 法学
    • 22 篇 社会学
  • 15 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 27 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 computational mo...
  • 17 篇 optimization
  • 17 篇 accuracy
  • 16 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 13 篇 deep neural netw...
  • 12 篇 data privacy
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 12 篇 data models

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 university of ch...
  • 15 篇 huazhong univers...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 wang guoyin
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 959 篇 英文
  • 83 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1050 条 记 录,以下是341-350 订阅
排序:
MUSIZ: A generic framework for music resizing with stretching and cropping  11
MUSIZ: A generic framework for music resizing with stretchin...
收藏 引用
19th ACM International Conference on Multimedia ACM Multimedia 2011, MM'11
作者: Zhang, Liu Wang, Chaokun Ba, Yiyuan Wang, Hao Wang, Jianmin Department of Computer Science and Technology Tsinghua University China School of Software Tsinghua University Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security Ministry of Education China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS China
Content-aware music adaption, i.e. music resizing, in temporal constraints starts drawing attention from multimedia communities because of the need of real-world scenarios, e.g. animation production and radio advertis... 详细信息
来源: 评论
A Privacy Leak Detection Mechanism based on Service Binding  10
A Privacy Leak Detection Mechanism based on Service Binding
收藏 引用
10th International Symposium on system security, Safety, and Reliability, ISSSR 2024
作者: Wang, Boyang He, Jinling Du, Yuanhan Tang, Ming Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
With the development of mobile technology, users gradually store financial information and personal privacy data on mobile terminals, which makes mobile security particularly important. In order to effectively improve... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
FBOD: An Outlier Detection Algorithm based on data Features Suitable for Processing Large-scale datasets on Distributed Platforms  10
FBOD: An Outlier Detection Algorithm based on Data Features ...
收藏 引用
10th International Symposium on system security, Safety, and Reliability, ISSSR 2024
作者: Zhao, Jinbo He, Jinling Song, Hu Cheng, Xinyun Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
The primary objective of outlier detection is to identify values that are significantly different from other data in the dataset. However, most of the current algorithms are effective for small-scale data and their pe... 详细信息
来源: 评论
A Lexical Updating Algorithm for Sentiment Analysis on Chinese Movie Reviews  5
A Lexical Updating Algorithm for Sentiment Analysis on Chine...
收藏 引用
5th International Conference on Advanced Cloud and Big data, CBD 2017
作者: Song, Yiwei Gu, Kaiwen Li, Huakang Sun, Guozi Bell Honor School Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
With the prevalence of Internet, sentiment analysis gets popularity among the world. Researchers have made use of kinds of online documents like commodities reivews and movie reviews as training samples to train their... 详细信息
来源: 评论
intelligent Contract Timestamp Vulnerability Detection Based on key Control Flow Graph  36
Intelligent Contract Timestamp Vulnerability Detection Based...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Quan, Qing Yu Zeng, Cheng Wang, Yi Feng Wang, Jiao Ran School of Computer Science and Information Engineering Hubei University Wuhan China School of Artificial Intelligence Hubei University Wuhan China Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education Wuhan China
The extensive application of smart contract technology in the blockchain domain has positioned it as a key component of the digital economy. However, as the application scope of smart contracts expands, security issue... 详细信息
来源: 评论
Improvement of the DPoS Consensus Mechanism in Blockchain Based on PLTS  7
Improvement of the DPoS Consensus Mechanism in Blockchain Ba...
收藏 引用
7th IEEE International Conference on Big data security on Cloud, 7th IEEE International Conference on High Performance and Smart Computing, and 6th IEEE International Conference on intelligent data and security, Bigdatasecurity/HPSC/IDS 2021
作者: Chen, Shuyu Xie, Mingyue Liu, Jun Zhang, Yunan School of Big Data and Software Engineering Chongqing University Chongqing China College of Software Engineering Chongqing University of Posts and Telecommunications Chongqing China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
Contemporarily, DPoS is the fastest, most effective, decentralized and flexible consensus mechanism among all consensus mechanisms. Similar to the vote of the board, the holders cast a certain number of delegates to p... 详细信息
来源: 评论
A New Approach to the Position of Acupoints on the Back of Humans
收藏 引用
Recent Patents on Mechanical Engineering 2023年 第2期16卷 150-162页
作者: Xie, Shenglong Liu, Zijing Zhang, Liangan Song, Fengfeng Key Laboratory of Intelligent Manufacturing Quality Big Data Tracking and Analysis of Zhejiang Province China Jiliang University Zhejiang Hangzhou310018 China Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet Anhui University of Technology Anhui Ma’anshan243032 China Hangzhou Qiandaohu Ruichun Robot Research Institute Co. Ltd Zhejiang Hangzhou310018 China Zhejiang Shusi Robot Co. Ltd Zhejiang Huzhou313000 China
Aim: In order to realize the position of acupoints on the back of humans, a new acupoints positioning approach combined with machine vision technology is proposed in this paper. Background: The acupuncture point (acup... 详细信息
来源: 评论
Real-time stealth transmission via dither-based bias control
Real-time stealth transmission via dither-based bias control
收藏 引用
2023 Conference on Lasers and Electro-Optics, CLEO 2023
作者: Wang, Yuanxiang Shao, Weidong Zhong, Linsheng Dai, Xiaoxiao Yang, Qi Deng, Lei Liu, Deming Cheng, Mengfan Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan430074 China
We report a real-time 1 kbps stealthy transmission in the 10 Gbps QPSK public communication. The stealth data is embedded in dither signals of bias control. The scheme is compatible with existing optical transmission ... 详细信息
来源: 评论
G2G: Generalized Learning by Cross-Domain Knowledge Transfer for Federated Domain Generalization
G2G: Generalized Learning by Cross-Domain Knowledge Transfer...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xinqian Chen Jin Zhang Xiaoli Gong College of Computer Science Nankai University China Key Lab of Data and Intelligent System Security Ministry of Education China
We propose G2G, based on the global model of Generalized learning to solve the Federated Domain Generalization (FedDG) task. FedDG aims to collaboratively train a global model that can directly generalize to the unsee...
来源: 评论