咨询与建议

限定检索结果

文献类型

  • 560 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 685 篇 工学
    • 491 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 192 篇 信息与通信工程
    • 131 篇 电气工程
    • 94 篇 控制科学与工程
    • 74 篇 生物工程
    • 66 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 44 篇 机械工程
    • 44 篇 生物医学工程(可授...
    • 34 篇 交通运输工程
    • 32 篇 网络空间安全
    • 28 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 168 篇 数学
    • 87 篇 生物学
    • 82 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 24 篇 化学
    • 24 篇 系统科学
  • 186 篇 管理学
    • 106 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 39 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 32 篇 法学
    • 22 篇 社会学
  • 15 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 27 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 computational mo...
  • 17 篇 optimization
  • 17 篇 accuracy
  • 16 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 13 篇 deep neural netw...
  • 12 篇 data privacy
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 12 篇 data models

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 university of ch...
  • 15 篇 huazhong univers...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 wang guoyin
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 959 篇 英文
  • 83 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1050 条 记 录,以下是361-370 订阅
排序:
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion  10
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Gu, Qiliang Lu, Qin Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
A DQN-Based Approach for Online Service Placement in Mobile Edge Computing  16th
A DQN-Based Approach for Online Service Placement in Mobile ...
收藏 引用
16th EAI International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2020
作者: Jie, Xiaogan Liu, Tong Gao, Honghao Cao, Chenhong Wang, Peng Tong, Weiqin School of Computer Engineering and Science Shanghai University Shanghai China Shanghai Key Laboratory of Data Science Shanghai China Shanghai Institute for Advanced Communication and Data Science Shanghai University Shanghai China Shanghai Engineering Research Center of Intelligent Computing System Shanghai China
Due to the development of 5G networks, computation intensive applications on mobile devices have emerged, such as augmented reality and video stream analysis. Mobile edge computing is put forward as a new computing pa... 详细信息
来源: 评论
Four-dimensional Floquet topological insulator with an emergent second Chern number
收藏 引用
Physical Review B 2024年 第12期109卷 125303-125303页
作者: Zheng-Rong Liu Rui Chen Bin Zhou Department of Physics Hubei University Wuhan 430062 China Key Laboratory of Intelligent Sensing System and Security of Ministry of Education Hubei University Wuhan 430062 China
Floquet topological insulators have been widely investigated in lower-dimensional systems. However, Floquet topological insulators induced by time-periodic driving in higher-dimensional systems remain unexplored. In t... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
An Efficient and Truthful Online Incentive Mechanism for a Social Crowdsensing Network  16th
An Efficient and Truthful Online Incentive Mechanism for a S...
收藏 引用
16th EAI International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2020
作者: Fang, Lu Liu, Tong Gao, Honghao Cao, Chenhong Li, Weimin Tong, Weiqin School of Computer Engineering and Science Shanghai University Shanghai China Shanghai Key Laboratory of Data Science Shanghai China Shanghai Institute for Advanced Communication and Data Science Shanghai University Shanghai China Shanghai Engineering Research Center of Intelligent Computing System Shanghai China
Crowdsening plays an important role in spatiotemporal data collection by leveraging ubiquitous smart devices equipped with sensors. Considering rational and strategic device users, designing a truthful incentive mecha... 详细信息
来源: 评论
BadActs: A Universal Backdoor Defense in the Activation Space
arXiv
收藏 引用
arXiv 2024年
作者: Yi, Biao Chen, Sishuo Li, Yiming Li, Tong Zhang, Baolei Liu, Zheli College of Cyber Science Key Laboratory of Data and Intelligent System Security Ministry of Education Nankai University China Center for Data Science Peking University China Nanyang Technological University Singapore
Backdoor attacks pose an increasingly severe security threat to Deep Neural Networks (DNNs) during their development stage. In response, backdoor sample purification has emerged as a promising defense mechanism, aimin... 详细信息
来源: 评论
Nonreciprocity of energy transfer in a nonlinear asymmetric oscillator system with various vibration states
收藏 引用
Applied Mathematics and Mechanics(English Edition) 2023年 第5期44卷 727-744页
作者: Jian’en CHEN Jianling LI Minghui YAO Jun LIU Jianhua ZHANG Min SUN Tianjin Key Laboratory for Advanced Mechatronic System Design and Intelligent Control School of Mechanical EngineeringTianjin University of TechnologyTianjin 300384China National Demonstration Center for Experimental Mechanical and Electrical Engineering Education Tianjin University of TechnologyTianjin 300384China School of Aeronautics and Astronautics Tiangong UniversityTianjin 300387China Agricultural Information Institute of Chinese Academy of Agricultural Sciences Key Laboratory of Agricultural Big DataMinistry of Agriculture and Rural AffairsBeijing 100081China School of Science Tianjin Chengjian UniversityTianjin 300384China
The nonreciprocity of energy transfer is constructed in a nonlinear asymmetric oscillator system that comprises two nonlinear oscillators with different parameters placed between two identical linear *** slow-flow equ... 详细信息
来源: 评论
A Point Cloud Registration Method for Substations Based on an Improved SAC-IA Algorithm
A Point Cloud Registration Method for Substations Based on a...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Wang, Lei Chen, Yiping Zong, Haonan Wang, Lulu Yin, Jun School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210023 China
This paper proposes a point cloud registration method for substations based on an improved SAC-IA algorithm. This method optimizes the SAC-IA algorithm by filtering the randomly selected point pairs to ensure that the... 详细信息
来源: 评论
Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVs  26
Path Planning based on Reinforcement Learning with Improved ...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Ding, Qun Xu, Xiaolong Gui, Wenming Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Jinling Institute of Technology School of Computer Science Nanjing211169 China
As the emerging technology of Unmanned Aerial Vehicles (UAVs) becomes mature, UAVs are widely used in environmental monitoring, communication and other fields. In view of this, this paper analyzed the task of synergis... 详细信息
来源: 评论
A Social-Aware Mode Selection Algorithm for D2D Communications
A Social-Aware Mode Selection Algorithm for D2D Communicatio...
收藏 引用
International Conference on Communications, Signal Processing, and systems, CSPS 2018
作者: Lu, Wei-feng Lin, Wei-jun Chen, Si-guang Yang, Li-jun School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China College of IoT Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Aiming at mode selection in D2D communication, a mode selection strategy based on social-aware was proposed. In addition to physical connection status, users’ social relationships also served as an observation elemen... 详细信息
来源: 评论