咨询与建议

限定检索结果

文献类型

  • 538 篇 期刊文献
  • 496 篇 会议

馆藏范围

  • 1,034 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 663 篇 工学
    • 477 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 114 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 323 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 79 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 48 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 34 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 21 篇 school of softwa...
  • 19 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 947 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1034 条 记 录,以下是371-380 订阅
排序:
FBOD: An Outlier Detection Algorithm based on data Features Suitable for Processing Large-scale datasets on Distributed Platforms
FBOD: An Outlier Detection Algorithm based on Data Features ...
收藏 引用
International Symposium on system and Software Reliability (ISSSR)
作者: Jinbo Zhao Jinling He Hu Song Xinyun Cheng Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
The primary objective of outlier detection is to identify values that are significantly different from other data in the dataset. However, most of the current algorithms are effective for small-scale data and their pe... 详细信息
来源: 评论
BLRGCN: A dynamic traffic flow prediction model based on spatiotemporal graph convolutional network
BLRGCN: A dynamic traffic flow prediction model based on spa...
收藏 引用
IEEE International Conference on data Mining Workshops (ICDM Workshops)
作者: Qiuhao Shi Xiaolong Xu Xuanyan Liu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Because of the complex topology of urban road and the dynamic changes of traffic information over time, how to accurately and efficiently predict traffic flow has become a difficult problem. In order to capture spatio...
来源: 评论
ConvTrans-TPS: A Convolutional Transformer Model for Disk Failure Prediction in Large-Scale Network Storage systems
ConvTrans-TPS: A Convolutional Transformer Model for Disk Fa...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Shicheng Xu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Disk failure is one of the most important reliability problems in large-scale network storage systems. Disk failure may lead to serious data loss and even disastrous consequences if the missing data cannot be recovere...
来源: 评论
Improving Code Search with Multi-Modal Momentum Contrastive Learning
Improving Code Search with Multi-Modal Momentum Contrastive ...
收藏 引用
IEEE/ACM International Conference on Program Comprehension (ICPC)
作者: Zejian Shi Yun Xiong Yao Zhang Zhijie Jiang Jinjing Zhao Lei Wang Shanshan Li Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China Peng Cheng Laboratory Shenzhen China School of Computer National University of Defense Technology China National Key Laboratory of Science and Technology on Information System Security China
Contrastive learning has recently been applied to enhancing the BERT-based pre-trained models for code search. However, the existing end-to-end training mechanism cannot sufficiently utilize the pre-trained models due...
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Kaijun Deng Dezhi Zheng Jindong Xie Jinbao Wang Weicheng Xie Linlin Shen Siyang Song Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Department of Computer Science University of Exeter
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
Anomaly detection and traceback scheme for cloud-edge networks
Anomaly detection and traceback scheme for cloud-edge networ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xuanyan Liu Jinling He Hu Song Xinyun Cheng Luyun Hu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Cloud-edge networks (CEN) has revolutionized the traditional network architecture. However, there are many security issues in CEN needing to be solved. In this case, CEN administrator should be able to detect network ... 详细信息
来源: 评论
security Compressed Sensing Image Encryption Algorithm Based on Elliptic Curve  9th
Security Compressed Sensing Image Encryption Algorithm Based...
收藏 引用
9th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2023
作者: Jin, Anan Li, Xiang Xiong, Qingzhi School of Information Engineering East China University of Technology Jiangxi Nanchang330013 China Jiangxi Engineering Technology Research Center of Nuclear Geoscience Data Science and System East China University of Technology Jiangxi Nanchang330013 China Jiangxi Key Laboratory of Cybersecurity Intelligent Perception East China University of Technology Jiangxi Nanchang330013 China
Aiming to address the problems of high costs associated with the storage and transmission of environmental monitoring images, as well as potential security risks, this paper proposes a security compressed sensing imag... 详细信息
来源: 评论
Lgccn: A Label-Guided Contrastive Capsule Network for Few-Shot Text Classification
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Yang Xu, Xiaolong Xiao, Fu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Few-shot text classification aims to learn transferable knowledge from a limited dataset to perform classification tasks in unseen domains. Recently, metric-based meta-learning methods have demonstrated their advantag... 详细信息
来源: 评论
End-to-End Remote Sensing Image Scene Classification with Vision Transformers  23
End-to-End Remote Sensing Image Scene Classification with Vi...
收藏 引用
6th International Conference on Big data Technologies, ICBDT 2023
作者: Yuan, Hao Liu, Kun Shi, Jiechuan Wang, Can Wang, Weiwei School of Information Science and Engineering University of Jinan Jinan250022 China China High-resolution Earth Observation System Shandong Center of Data and Application University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China QiLu Research Institute Jinan250200 China
In recent years, the development of deep learning technology has led to widespread attention on Vision Transformer (ViT) as an emerging image classification method. Remote sensing image classification is an important ... 详细信息
来源: 评论
Evaluation of Continual Learning Methods for Object Hardness Recognition
Evaluation of Continual Learning Methods for Object Hardness...
收藏 引用
2023 IEEE International Conference on Real-Time Computing and Robotics, RCAR 2023
作者: Liu, Yiwen Fang, Senlin Liu, Chengliang Wang, Jingnan Mai, Ke Zhang, Yupo Yi, Zhengkun Wu, Xinyu Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Provincial Key Laboratory of Robotics and Intelligent System Shenzhen518055 China University of Chinese Academy of Sciences Beijing100049 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Siat Branch Shenzhen518055 China City University of Macau Faculty of Data Science 999078 China
How to solve the problem of continual learning of robotic tactile perception in an open, dynamic environment is a pressing task. Although continual learning has been extensively studied in computer vision, the evaluat... 详细信息
来源: 评论