咨询与建议

限定检索结果

文献类型

  • 538 篇 期刊文献
  • 496 篇 会议

馆藏范围

  • 1,034 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 663 篇 工学
    • 477 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 114 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 323 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 79 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 48 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 34 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 21 篇 school of softwa...
  • 19 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 947 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1034 条 记 录,以下是531-540 订阅
排序:
Stable and Feature Decoupled of Deep Mutual Information Maximization Based on Wasserstein Distance
SSRN
收藏 引用
SSRN 2023年
作者: He, Xing Peng, Changgen Wang, Lin Tan, Weijie State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University PR Guiyang550025 China Guizhou Key Laboratory of Pattern Recognition and Intelligent System Guizhou Minzu University PR Guiyang550025 China Guizhou Big Data Academy Guizhou University PR Guiyang550025 China Key Laboratory of Advanced Manufacturing Technology Ministry of Education Guizhou University PR Guiyang550025 China
Deep learning techniques usually require large amounts of expensive labeled data to train networks, and the extracted deep representations are usually mixed with multiple attributes having uninterpretability, which li... 详细信息
来源: 评论
Improvement of the DPoS Consensus Mechanism in Blockchain Based on PLTS  7
Improvement of the DPoS Consensus Mechanism in Blockchain Ba...
收藏 引用
7th IEEE International Conference on Big data security on Cloud, 7th IEEE International Conference on High Performance and Smart Computing, and 6th IEEE International Conference on intelligent data and security, Bigdatasecurity/HPSC/IDS 2021
作者: Chen, Shuyu Xie, Mingyue Liu, Jun Zhang, Yunan School of Big Data and Software Engineering Chongqing University Chongqing China College of Software Engineering Chongqing University of Posts and Telecommunications Chongqing China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
Contemporarily, DPoS is the fastest, most effective, decentralized and flexible consensus mechanism among all consensus mechanisms. Similar to the vote of the board, the holders cast a certain number of delegates to p... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qiliang Gu Qin Lu Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
Robust Containment Control of Heterogeneous Uncertain Multi-Agent systems under Markovian Switching Topologies
Robust Containment Control of Heterogeneous Uncertain Multi-...
收藏 引用
Fully Actuated system Theory and Applications (CFASTA), Conference on
作者: Haihua Guo Cong Bi Xiang Xu Shenzhen Key Laboratory of Control Theory and Intelligent Systems Southern University of Science and Technology Shenzhen China Hong Kong Institute for Data Science City University of Hong Kong Hong Kong China College of Artificial Intelligence Nankai University Tianjin China School of System Design and Intelligent Manufacturing Southern University of Science and Technology Shenzhen China
This study addresses the robust output containment control problem of heterogeneous uncertain multi-agent systems under Markovian switching topologies. A novel distributed output feedback controller is proposed. Based... 详细信息
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Ru Li Aimin Li Rong Fei Xie Guo Fang-Xiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China Department of Computer Science Department of Mechanical Engineering Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ...
来源: 评论
Decoupling Learning and Remembering: a Bilevel Memory Framework with Knowledge Projection for Task-Incremental Learning
Decoupling Learning and Remembering: a Bilevel Memory Framew...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Wenju Sun Qingyong Li Jing Zhang Wen Wang Yangli-Ao Geng Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Frontiers Science Center for Smart High-speed Railway System Beijing Jiaotong University The Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyi University
The dilemma between plasticity and stability arises as a common challenge for incremental learning. In contrast, the human memory system is able to remedy this dilemma owing to its multilevel memory structure, which m...
来源: 评论
Question generation based on chat-response conversion
Question generation based on chat-response conversion
收藏 引用
作者: Zhong, Sheng-Hua Peng, Jianfeng Liu, Peiqi College of Computer Science and Software Engineering Shenzhen University Shenzhen China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China
Today, thanks to the major breakthrough of sequences to sequences model in the field of natural language, most of the dialogue generation tasks are focused on generating more effective responses. However, the response... 详细信息
来源: 评论
Robust Imagined Speech Production Using AI-Generated Content Network for Patients with Language Impairments
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xu, Xu Fu, Chong Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110004 China
Imagined speech production is critical for brain-computer interface systems. It is able to provide the communication ability for patients with language impairments. Nowadays, many studies have developed algorithms for... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Achieving Network Resilience through Graph Neural Network-enabled Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Li, Xuzeng Zhang, Tao Wang, Jian Han, Zhen Liu, Jiqiang Kang, Jiawen Niyato, Dusit Jamalipour, Abbas The School of Cyberspace Science and Technology Beijing Jiaotong University China The Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China The Technology School of Automation Guangdong University of Technology China The College of Computing and Data Science Nanyang Technological University Singapore The University of Sydney SydneyNSW2006 Australia
Deep reinforcement learning (DRL) has been widely used in many important tasks of communication networks. In order to improve the perception ability of DRL on the network, some studies have combined graph neural netwo... 详细信息
来源: 评论