咨询与建议

限定检索结果

文献类型

  • 533 篇 期刊文献
  • 496 篇 会议

馆藏范围

  • 1,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 658 篇 工学
    • 474 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 183 篇 信息与通信工程
    • 109 篇 电气工程
    • 89 篇 控制科学与工程
    • 74 篇 生物工程
    • 60 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 40 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 25 篇 安全科学与工程
    • 23 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 21 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 320 篇 理学
    • 159 篇 数学
    • 87 篇 生物学
    • 79 篇 物理学
    • 55 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 22 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 data privacy
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 48 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 34 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 21 篇 school of softwa...
  • 19 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 12 篇 feng gao
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong

语言

  • 945 篇 英文
  • 75 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1029 条 记 录,以下是581-590 订阅
排序:
Steel Surface Defect Detection Based on Improved YOLOv8
Steel Surface Defect Detection Based on Improved YOLOv8
收藏 引用
International Conference on Fuzzy systems and Knowledge Discovery (FSKD)
作者: Jichen Zhang Zhi Zhang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan Hubei China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan Hubei China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan Hubei China
There are some defects on the surface of steel that are difficult to detect, so we propose an improved algorithm based on YOLOv8 for detecting defects that are difficult to be detected. This improvement includes the i... 详细信息
来源: 评论
3D Virtual Sand Table Display system of Industrial Park Based on Augmented Reality
3D Virtual Sand Table Display System of Industrial Park Base...
收藏 引用
2021 IEEE International Conference on Industrial Application of Artificial Intelligence, IAAI 2021
作者: Lu, Hongyan He, Jie Cen, Caichun He, Jie Wuzhou University School of Big Data and Software Engineering Wuzhou China Wuzhou University School of Electronic and Information Engineering Wuzhou China Key Laboratory of Image Processing and Intelligent Information System at Guangxi University Wuzhou University Wuzhou China
To improve the interactivity of 3D virtual sand table displays, an industrial park 3D virtual sand table display system based on augmented reality is designed. The system consists of multiple modules. The design of th... 详细信息
来源: 评论
Securing Sdn/Nfv-Enabled Campus Networks with Software-Defined Perimeter-Based Zero-Trust Architecture
SSRN
收藏 引用
SSRN 2023年
作者: Ruambo, Francis A. Zou, Deqing Lopes, Ivandro O. Yuan, Bin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on Big Data Security Wuhan China National Engineering Research Center for Big Data Technology and System Wuhan China Services Computing Technology and System Lab Wuhan China Cluster and Grid Computing Lab Wuhan China Mbeya university of Science and Technology Mbeya131 Tanzania United Republic of Nucleo Operacional para a Sociedade de Informacao Cape Verde Songshan Laboratory Zhengzhou China
Network softwarization is a breakthrough in designing modern networks and providing numerous new network operations and services. This change is exemplified by Software Defined Networks (SDN) and Network Function Virt... 详细信息
来源: 评论
MSpace: Multi security namespace management for containers
Journal of Engineering Research (Kuwait)
收藏 引用
Journal of Engineering Research (Kuwait) 2025年
作者: Liang, Hao He, Gongshan Jiang, Jinhu National Digital Switching System Engineering & Technological Research Center Zhengzhou 450002 China Key Laboratory of Cyberspace Security Ministry of Education Zhengzhou 450002 China School of Computer Science Fudan University Shanghai 200438 China Institute of Big Data Fudan University Shanghai 200433 China
Existing system security frameworks like LSM are primarily designed for the operating system kernel and are not applicable to user-level container methods. This is primarily because the system security framework is de... 详细信息
来源: 评论
Darkfight: A Detection Method of Violent Behavior in Dark Place for intelligent Monitoring system
SSRN
收藏 引用
SSRN 2022年
作者: Wang, Jun Xu, Xiaolong Nanjing University of Posts & Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts & Telecommunications School of Computer Science Nanjing210023 China
With the continuous development of deep learning, the use of deep learning methods for intelligent violent behavior recognition has become an active research field in computer vision. However, there are relatively few... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Research on Enhanced Perception and Attention-Driven Person Re-Identification
Research on Enhanced Perception and Attention-Driven Person ...
收藏 引用
International Conference on Fuzzy systems and Knowledge Discovery (FSKD)
作者: Cancan Wu Dong Li Zhi Zhang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan Hubei China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan Hubei China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan Hubei China
When matching similarity among pedestrians in images, pedestrian re-identification algorithms are often disturbed by occlusions. A typical tactic is to improve the robustness of occlusion features in the model. Howeve... 详细信息
来源: 评论
ReconBoost: Boosting Can Achieve Modality Reconcilement
arXiv
收藏 引用
arXiv 2024年
作者: Hua, Cong Xu, Qianqian Bao, Shilong Yang, Zhiyong Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores a novel multi-modal alternating learning paradigm pursuing a reconciliation between the exploitation of uni-modal features and the exploration of cross-modal interactions. This is motivated by the ... 详细信息
来源: 评论
Fairness-aware Multiobjective Evolutionary Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Qingquan Liu, Jialin Yao, Xin The Research Institute of Trustworthy Autonomous System Southern University of Science and Technology Shenzhen518055 China The Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China The School of Data Science Lingnan University Hong Kong
Multiobjective evolutionary learning (MOEL) has demonstrated its advantages of training fairer machine learning models considering a predefined set of conflicting objectives, including accuracy and different fairness ... 详细信息
来源: 评论
SLBERT: An Improved FLAT-BERT for Named Entity Recognition
SSRN
收藏 引用
SSRN 2022年
作者: Fei, Yuefan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Nanjing China
Named Entity Recognition (NER) aims to identify named entities mentioned in unstructured text and classify them into predefined named entity classes. Although models using word fusion have achieved relatively high per... 详细信息
来源: 评论