咨询与建议

限定检索结果

文献类型

  • 538 篇 期刊文献
  • 496 篇 会议

馆藏范围

  • 1,034 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 663 篇 工学
    • 477 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 114 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 323 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 79 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 48 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 34 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 21 篇 school of softwa...
  • 19 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 947 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1034 条 记 录,以下是461-470 订阅
排序:
Achieving Network Resilience through Graph Neural Network-enabled Deep Reinforcement Learning
收藏 引用
IEEE Network 2025年
作者: Li, Xuzeng Zhang, Tao Wang, Jian Han, Zhen Liu, Jiqiang Kang, Jiawen Niyato, Dusit Jamalipour, Abbas Beijing Jiaotong University School of Cyberspace Science and Technology China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Guangdong University of Technology Technology School of Automation China Nanyang Technological University College of Computing and Data Science Singapore University of Sydney SydneyNSW2006 Australia
Deep reinforcement learning (DRL) has been widely used in many important tasks of communication networks. In order to improve the perception ability of DRL on the network, some studies have combined graph neural netwo... 详细信息
来源: 评论
Physically Secure and Privacy-Preserving Authentication Scheme for VANET
Physically Secure and Privacy-Preserving Authentication Sche...
收藏 引用
Artificial Intelligence of Things and systems (AIoTSys), International Conference on
作者: Dongmei Chen Yangfan Liang Lihui Li Yining Liu School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems Jiaxing University Jiaxing China School of Data Science and Artificial Intelligence Wenzhou University of Technology Wenzhou China
The communication between vehicles and other entities occurs over open wireless networks, making them susceptible to various security attacks In Vehicular Ad Hoc Network (VANET). Consequently, many researchers have pr... 详细信息
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
Real-time stealth transmission via dither-based bias control
Real-time stealth transmission via dither-based bias control
收藏 引用
Conference on Lasers and Electro-Optics (CLEO)
作者: Yuanxiang Wang Weidong Shao Linsheng Zhong Xiaoxiao Dai Qi Yang Lei Deng Deming Liu Mengfan Cheng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan China
We report a real-time 1 kbps stealthy transmission in the 10 Gbps QPSK public communication. The stealth data is embedded in dither signals of bias control. The scheme is compatible with existing optical transmission ... 详细信息
来源: 评论
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Hangtao Yao, Zeming Zhang, Leo Yu Hu, Shengshan Chen, Chao Liew, Alan Li, Zhetao School of Cyber Science and Engineering Huazhong University of Science and Technology China Swinburne University of Technology Australia Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China RMIT University Australia Xiangtan University China
Federated learning (FL) is vulnerable to poisoning attacks, where adversaries corrupt the global aggregation results and cause denial-of-service (DoS). Unlike recent model poisoning attacks that optimize the amplitude... 详细信息
来源: 评论
Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVs
Path Planning based on Reinforcement Learning with Improved ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qun Ding Xiaolong Xu Wenming Gui Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Jinling Institute of Technology Nanjing China
As the emerging technology of Unmanned Aerial Vehicles (UAVs) becomes mature, UAVs are widely used in environmental monitoring, communication and other fields. In view of this, this paper analyzed the task of synergis...
来源: 评论
FedCSA: Boosting the Convergence Speed of Federated Unlearning under data Heterogeneity
FedCSA: Boosting the Convergence Speed of Federated Unlearni...
收藏 引用
IEEE International Conference on Big data and Cloud Computing (BdCloud)
作者: Zhen Wang Daniyal M Alghazzawi Li Cheng Gaoyang Liu Chen Wang Zeng Cheng Yang Yang Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China King Abdulaziz University Jeddah Saudi Arabia Huazhong University of Science and Technology Wuhan China
The exponential growth of the Internet and the widespread availability of personal data have raised significant concerns regarding personal privacy and societal security. In response, the “right to be forgotten” has...
来源: 评论
Research on Control Optimization Method of Mine Ventilation system Based on intelligent Optimization Algorithm
收藏 引用
Journal of Computers (Taiwan) 2023年 第1期34卷 239-248页
作者: Lian, Wen-Li Qi, Jing-Jing Key Laboratory of Intelligent Data Information Processing and Control of Hebei Province Tangshan University Hebei Province Tangshan City063600 China Key Laboratory of Intelligent Motion Control System of Tangshan City Tangshan University Hebei Province Tangshan City063600 China Tangshan University Hebei Province Tangshan City063600 China
In view of the complex ventilation network in the mine, many influencing factors, and the complex establishment of the air demand model, this paper establishes an air volume optimization model with the minimum energy ... 详细信息
来源: 评论
Using Depth-Enhanced Spatial Transformation for Student Gaze Target Estimation in Dual-View Classroom Images
Using Depth-Enhanced Spatial Transformation for Student Gaze...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haonan Miao Peizheng Zhao Yuqi Sun Fang Nan Xiaolong Zhang Yaqiang Wu Feng Tian School of Computer Science and Technology Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Advanced Technology Xi’an Jiaotong-Liverpool University Suzhou China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an China
Dual-view gaze target estimation in classroom environments has not been thoroughly explored. Existing methods lack consideration of depth information, primarily focusing on 2D image information and neglecting the late... 详细信息
来源: 评论
Alexa Skills: security Vulnerabilities and Countermeasures
Alexa Skills: Security Vulnerabilities and Countermeasures
收藏 引用
IEEE Conference on Communications and Network security (CNS)
作者: Dan Su Jiqiang Liu Sencun Zhu Xiaoyang Wang Wei Wang Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University School of EECS The Pennsylvania State University Beijing Key Laboratory of Traffic Data Analysis and Mining Beijing Jiaotong University
The home voice assistants such as Amazon Alexa have become increasingly popular due to many interesting voice-activated services provided through special applications called skills. These skills, though useful, have a... 详细信息
来源: 评论