咨询与建议

限定检索结果

文献类型

  • 529 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,019 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 657 篇 工学
    • 474 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 112 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 321 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 78 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 robustness
  • 13 篇 contrastive lear...
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 56 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 18 篇 hai jin
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 932 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1019 条 记 录,以下是441-450 订阅
排序:
DarkFed: A data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
Cd-Vae: An Unsupervised Disentangled Representation Learning Framework for Visual data
SSRN
收藏 引用
SSRN 2023年
作者: Huang, Chengquan Cai, Jianghai Luo, Senyan Wang, Shunxia Yang, Guiyan Lei, Huan Zhou, Lihua Guizhou Key Laboratory of Pattern Recognition and Intelligent System Guizhou Minzu University Guiyang550025 China School of Data Science and Information Engineering Guizhou Minzu University Guiyang550025 China
Disentangled representation learning is a crucial research problem in the field of artificial intelligence, and learning meaningful representation of visual data is useful for improving the generalizability and interp... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature
Decentralized and Lightweight Cross-Chain Transaction Scheme...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Huiying Zou Jia Duan Xi Liu Wei Ren Tao Li Xianghan Zheng Kim-Kwang Raymond Choo School of Computer Science China University of Geosciences Wuhan China The Third Surveying and Mapping Institute of Hunan Province Hunan Engineering Research Center of Geographic Information Security and Application Hunan China Key Laboratory of Data Protection and Intelligent Management Sichuan University Ministry of Education China State Key Laboratory of Geo-Information Engineering and Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of MNR CASM Beijing China College of Computer and Big Data Fuzhou University School of Information and Intelligent Engineering Sanya College China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio USA
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. E... 详细信息
来源: 评论
A Residual-Variational Mode Decomposition to Detect Impact Signal
A Residual-Variational Mode Decomposition to Detect Impact S...
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Wenyu Liu Yuhu Liu Yi Chai National Key Laboratory of Integrated Circuits and Microsystems No.24 Research Institute China Electronics Technology Group Corporation ChongQing China School of Intelligent Technology and Engineering Chongqing University of Science and Technology ChongQing China State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University ChongQing China
Variational Mode Decomposition (VMD) has been widely used in signal process. However, number of modal and balance parameter limit the application of VMD seriously. To solve this problem, a novel method, residual-VMD (... 详细信息
来源: 评论
Combining Kernelized Autoencoding and Centroid Prediction for Dynamic Multi-objective Optimization
arXiv
收藏 引用
arXiv 2023年
作者: Hou, Zhanglu Zou, Juan Ruan, Gan Liu, Yuan Xia, Yizhang Hunan Engineering Research Center of Intelligent System Optimization and Security Key Laboratory of Intelligent Computing and Information Processing Ministry of Education of China Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Hunan Province Xiangtan411105 China CERCIA School of Computer Science University of Birmingham Edgbaston BirminghamB15 2TT United Kingdom
Evolutionary algorithms face significant challenges when dealing with dynamic multi-objective optimization because Pareto optimal solutions and/or Pareto optimal fronts change. This paper proposes a unified paradigm, ... 详细信息
来源: 评论
BADROBOT: JAILBREAKING EMBODIED LLMS IN THE PHYSICAL WORLD
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Zhu, Chenyu Wang, Xianlong Zhou, Ziqi Yin, Changgan Li, Minghui Xue, Lulu Wang, Yichen Hu, Shengshan Liu, Aishan Guo, Peijin Zhang, Leo Yu National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Beihang University China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Embodied AI represents systems where AI is integrated into physical entities. Large Language Model (LLM), which exhibits powerful language understanding abilities, has been extensively employed in embodied AI by facil... 详细信息
来源: 评论
Robust Visual Question Answering: datasets, Methods, and Future Challenges
arXiv
收藏 引用
arXiv 2023年
作者: Ma, Jie Wang, Pinghui Kong, Dechen Wang, Zewei Liu, Jun Pei, Hongbin Zhao, Junzhou Di, Jia The Ministry of Education of Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The Ministry of Education of Key Laboratory for Intelligent Networks and Network Security School of Automation Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The Shannxi Provincial Key Laboratory of Big Data Knowledge Engineering School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an710049 China
Visual question answering requires a system to provide an accurate natural language answer given an image and a natural language question. However, it is widely recognized that previous generic VQA methods often tend ... 详细信息
来源: 评论
AR-CNN: an attention ranking network for learning urban perception
收藏 引用
Science China(Information Sciences) 2022年 第1期65卷 164-174页
作者: Zhetao LI Ziwen CHEN Wei-Shi ZHENG Sangyoon OH Kien NGUYEN Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University School of Data and Computer Science Sun Yat-sen University Department of Computer and Information Engineering Ajou University Graduate School of Engineering Chiba University
An increasing number of deep learning methods is being applied to quantify the perception of urban environments, study the relationship between urban appearance and resident safety, and improve urban appearance. Most ... 详细信息
来源: 评论
TPE-H2MWD:an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2023年 第8期24卷 1169-1180页
作者: Xiuli CHAI Xiuhui CHEN Yakun MA Fang ZUO Zhihua GAN Yushu ZHANG School of Artificial Intelligence Henan Engineering Research Center for Industrial Internet of ThingsHenan UniversityZhengzhou450046China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China School of Software Intelligent Data Processing Engineering Research Center of Henan ProvinceInstitute of Intelligent Network SystemHenan UniversityKaifeng475004China College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing211106China
With the substantial increase in image transmission,the demand for image security is ***-like images can be obtained by conventional encryption schemes,and although the security of the images can be guaranteed,the noi... 详细信息
来源: 评论