咨询与建议

限定检索结果

文献类型

  • 538 篇 期刊文献
  • 496 篇 会议

馆藏范围

  • 1,034 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 663 篇 工学
    • 477 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 114 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 323 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 79 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 48 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 34 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 21 篇 school of softwa...
  • 19 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 947 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1034 条 记 录,以下是351-360 订阅
排序:
Topic-aware Incentive Mechanism for Task Diffusion in Mobile Crowdsourcing through Social Network
收藏 引用
ACM Transactions on Internet Technology 2021年 第1期22卷 1-23页
作者: Xu, Jia Zhou, Yuanhang Chen, Gongyu Ding, Yuqing Yang, Dejun Liu, Linfeng Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications 9 Wenyuan Rd Jiangsu Nanjing210023 China Colorado School of Mines 1500 Illinois St. GoldenCO80401 United States
Crowdsourcing has become an efficient paradigm to utilize human intelligence to perform tasks that are challenging for machines. Many incentive mechanisms for crowdsourcing systems have been proposed. However, most of... 详细信息
来源: 评论
Improvement of the square-root low bounds on the minimum distances of BCH codes and Matrix-product codes
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Xiaoqiang Li, Liuyi Wu, Yansheng Zheng, Dabin Lu, Shuxian Hubei Key Laboratory of Applied Mathematics Key Laboratory of Intelligent Sensing System and Security Ministry of Education Faculty of Mathematics and Statistics Hubei University Wuhan430062 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China National Mobile Communications Research Laboratory Southeast University Nanjing211111 China
The task of constructing infinite families of self-dual codes with unbounded lengths and minimum distances exhibiting square-root lower bounds is extremely challenging, especially when it comes to cyclic codes. Recent...
来源: 评论
Location and Lightpath Selection in Multi-Domain Optical data Center Networks
Location and Lightpath Selection in Multi-Domain Optical Dat...
收藏 引用
Mobile Internet, Cloud Computing and Information security (MICCIS), International Conference on
作者: Changle Xu Xu Zhang Chuan Feng Xiaoxue Gong School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing China
In the era of booming fifth-generation fixed networks (F5G), the service demands for high bandwidth continue to grow. Meanwhile, in multi-domain network scenarios, service requests are vulnerable to physical layer att... 详细信息
来源: 评论
Segment Routing based In-Band Network Telemetry in IPv6 over Optical Networks
Segment Routing based In-Band Network Telemetry in IPv6 over...
收藏 引用
Mobile Internet, Cloud Computing and Information security (MICCIS), International Conference on
作者: Wei Liu Xu Zhang Chuan Feng Xiaoxue Gong School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing China
With the rise of automated network operations, network telemetry has become increasingly important. Optical networks play a key role in modern communication systems because of their high bandwidth, low latency, and lo... 详细信息
来源: 评论
Fine-Grained Prompt Learning for Face Anti-Spoofing  24
Fine-Grained Prompt Learning for Face Anti-Spoofing
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Hu, Xueli Liu, Huan Yuan, Haocheng Fu, Zhiyang Luo, Yizhi Zhang, Ning Zou, Hang Gan, Jianwen Zhang, Yuan Key Laboratory of Cyberspace Security Ministry of Education Zhengzhou China Beijing Jiaotong University Beijing China Macau University of Science and Technology China Sichuan Intelligent Transportation System Management Co. Ltd. Chengdu China Institute of Forensic Science Beijing China China Telecom Research Institute Beijing China Wuzhou University Wuzhou China China Telecom Research Institute Shanghai China
There has been an increasing focus on domain-generalized (DG) face anti-spoofing (FAS). However, existing methods aim to project a shared visual space through adversarial training, making exploring the space without l... 详细信息
来源: 评论
MCU-Net: A Multi-prior Collaborative Deep Unfolding Network with Gates-controlled Spatial Attention for Accelerated MR Image Reconstruction
arXiv
收藏 引用
arXiv 2024年
作者: Qiao, Xiaoyu Li, Weisheng Wang, Guofen Huang, Yuping Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China College of Computer and Information Science Chongqing Normal University Chongqing China
Deep unfolding networks (DUNs) have demonstrated significant potential in accelerating magnetic resonance imaging (MRI). However, they often encounter high computational costs and slow convergence rates. Besides, they... 详细信息
来源: 评论
SFma-Unet: A Mamba-Based Spatial-Frequency Fusion Network for Medical Image Segmentation
SFma-Unet: A Mamba-Based Spatial-Frequency Fusion Network fo...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhanpeng Liu Yuqiang Zhang Bin Wang Yang Yang Lin Cai Institute of Artificial Intelligence Xiamen University Xiamen China Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China School of Life Sciences Hubei University Wuhan China
Recently, Mamba-based methods have gained popularity in medical image segmentation due to their ability to model long-range dependencies with linear computational complexity. However, current segmentation methods ofte... 详细信息
来源: 评论
Multi-task regression learning for survival analysis via prior information guided transductive matrix completion
收藏 引用
Frontiers of Computer Science 2020年 第5期14卷 99-112页
作者: Lei Chen Kai Shao Xianzhong Long Lingsheng Wang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing210023China MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Nanjing University of Aeronautics and AstronauticsNanjing211106China
Survival analysis aims to predict the occurrence time of a particular event of interest,which is crucial for the prognosis analysis of ***,due to the limited study period and potential losing tracks,the observed data ... 详细信息
来源: 评论
An Image Semantic Communication system Based on GAN and Relative Position-Encoding
收藏 引用
IEEE Communications Letters 2025年
作者: Zhang, Ziqi Tan, Weijie Li, Chunguo Guizhou University College of Big Data and Information Engineering Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptography Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
In image semantic communication, the complex wireless channel environment leads to the loss of image details and performance degradation during transmission. To address this issue, we propose an image semantic communi... 详细信息
来源: 评论
Learning Counterfactual Explanation of Graph Neural Networks Via Generative Flow Network
SSRN
收藏 引用
SSRN 2023年
作者: He, Kangjia Liu, Li Zhang, Youmin Wang, Ye Liu, Qun Wang, Guoyin School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China Chongqing Key Laboratory of Computational Intelligence Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China
Counterfactual subgraphs explain Graph Neural Networks (GNNs) by answering the question: "How would the prediction change if a certain subgraph were absent in the input instance?" The differentiable proxy ad... 详细信息
来源: 评论