咨询与建议

限定检索结果

文献类型

  • 532 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,022 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 660 篇 工学
    • 475 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 112 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 321 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 78 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 18 篇 hai jin
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 935 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1022 条 记 录,以下是381-390 订阅
排序:
Anomaly detection and traceback scheme for cloud-edge networks
Anomaly detection and traceback scheme for cloud-edge networ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xuanyan Liu Jinling He Hu Song Xinyun Cheng Luyun Hu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Cloud-edge networks (CEN) has revolutionized the traditional network architecture. However, there are many security issues in CEN needing to be solved. In this case, CEN administrator should be able to detect network ... 详细信息
来源: 评论
security Compressed Sensing Image Encryption Algorithm Based on Elliptic Curve  9th
Security Compressed Sensing Image Encryption Algorithm Based...
收藏 引用
9th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2023
作者: Jin, Anan Li, Xiang Xiong, Qingzhi School of Information Engineering East China University of Technology Jiangxi Nanchang330013 China Jiangxi Engineering Technology Research Center of Nuclear Geoscience Data Science and System East China University of Technology Jiangxi Nanchang330013 China Jiangxi Key Laboratory of Cybersecurity Intelligent Perception East China University of Technology Jiangxi Nanchang330013 China
Aiming to address the problems of high costs associated with the storage and transmission of environmental monitoring images, as well as potential security risks, this paper proposes a security compressed sensing imag... 详细信息
来源: 评论
Lgccn: A Label-Guided Contrastive Capsule Network for Few-Shot Text Classification
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Yang Xu, Xiaolong Xiao, Fu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Few-shot text classification aims to learn transferable knowledge from a limited dataset to perform classification tasks in unseen domains. Recently, metric-based meta-learning methods have demonstrated their advantag... 详细信息
来源: 评论
End-to-End Remote Sensing Image Scene Classification with Vision Transformers  23
End-to-End Remote Sensing Image Scene Classification with Vi...
收藏 引用
6th International Conference on Big data Technologies, ICBDT 2023
作者: Yuan, Hao Liu, Kun Shi, Jiechuan Wang, Can Wang, Weiwei School of Information Science and Engineering University of Jinan Jinan250022 China China High-resolution Earth Observation System Shandong Center of Data and Application University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China QiLu Research Institute Jinan250200 China
In recent years, the development of deep learning technology has led to widespread attention on Vision Transformer (ViT) as an emerging image classification method. Remote sensing image classification is an important ... 详细信息
来源: 评论
Evaluation of Continual Learning Methods for Object Hardness Recognition
Evaluation of Continual Learning Methods for Object Hardness...
收藏 引用
2023 IEEE International Conference on Real-Time Computing and Robotics, RCAR 2023
作者: Liu, Yiwen Fang, Senlin Liu, Chengliang Wang, Jingnan Mai, Ke Zhang, Yupo Yi, Zhengkun Wu, Xinyu Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Provincial Key Laboratory of Robotics and Intelligent System Shenzhen518055 China University of Chinese Academy of Sciences Beijing100049 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Siat Branch Shenzhen518055 China City University of Macau Faculty of Data Science 999078 China
How to solve the problem of continual learning of robotic tactile perception in an open, dynamic environment is a pressing task. Although continual learning has been extensively studied in computer vision, the evaluat... 详细信息
来源: 评论
Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning  24
Towards High-resolution 3D Anomaly Detection via Group-Level...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhu, Hongze Xie, Guoyang Hou, Chengbin Dai, Tao Gao, Can Wang, Jinbao Shen, Linlin National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong Hong Kong Department of Intelligent Manufacturing CATL Ningde China Fuzhou Fuyao Institute for Advanced Study Fuyao University of Science and Technology Fuzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China
High-resolution point clouds (HRPCD) anomaly detection (AD) plays a critical role in precision machining and high-end equipment manufacturing. Despite considerable 3D-AD methods that have been proposed recently, they ... 详细信息
来源: 评论
An online sparse least square support vector regression and particle filter for remaining useful life prediction of capacitive-type pressure transducer  3
An online sparse least square support vector regression and ...
收藏 引用
2024 3rd International Conference on Aerospace and Control Engineering, ICoACE 2024
作者: Wang, Senlin Dai, Lingfeng Guo, Mingzhe Lu, Yikang Fujian Institute of Research on the Structure of Matter Chinese Academy of Sciences Fujian Fuzhou362200 China Fujian Provincial Key Laboratory of Intelligent Identification and Control of Complex Dynamic System Quanzhou362200 China Fujian College University of Chinese Academy of Sciences Fujian Fuzhou350002 China School of Advanced Manufacturing Fuzhou University Fujian Quanzhou350108 China School of College of Computer and Cyberspace Security Fujian Normal University Fujian350007 China
This paper proposes a novel online sparse least square support vector regression without bias for forecasting capacitive type pressure transducer remaining useful life prediction (RUL). The proposed approach is based ... 详细信息
来源: 评论
Learning Multimodal Attention Mixed with Frequency Domain Information as Detector for Fake News Detection
Learning Multimodal Attention Mixed with Frequency Domain In...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Zihan Ma Huan Liu Zhi Zeng Hao Guo Xiang Zhao Minnan Luo School of Computer Science and Technology Xi’an Jiaotong University Xi'an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi'an China Laboratory for Big Data and Decision Nation University of Defence Technology Changsha China
Detecting fake news on social media has become a crucial task in combating online misinformation and countering malicious propaganda. Existing methods rely on semantic consistency across modalities to fuse features an... 详细信息
来源: 评论
A Fraud Detection Approach Based on Combined Feature Weighting  10th
A Fraud Detection Approach Based on Combined Feature Weighti...
收藏 引用
10th EAI International Conference on Cloud Computing, CloudComp 2020
作者: Liu, Xiaoqian Yu, Chenfei Xia, Bin Gu, Haiyan Wang, Zhenli Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Nanjing China Jiangsu Provincial Public Security Department Key Laboratory of Digital Forensics Nanjing China
data mining technology has yielded fruitful results in the area of crime discovery and intelligent decision making. Credit card is one of the most popular payment methods, providing great convenience and efficiency. H... 详细信息
来源: 评论
COMMITSHIELD: Tracking Vulnerability Introduction and Fix in Version Control systems
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Zhaonan Zhao, Yanjie Wei, Chen Wan, Zirui Liu, Yue Wang, Haoyu Huazhong University of Science and Technology Wuhan China MYbank Ant Group Hangzhou China Monash University Melbourne Australia Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Version control systems are commonly used to manage open-source software, in which each commit may introduce new vulnerabilities or fix existing ones. Researchers have developed various tools for detecting vulnerabili... 详细信息
来源: 评论