咨询与建议

限定检索结果

文献类型

  • 543 篇 期刊文献
  • 486 篇 会议

馆藏范围

  • 1,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 656 篇 工学
    • 464 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 172 篇 信息与通信工程
    • 113 篇 电气工程
    • 82 篇 控制科学与工程
    • 74 篇 生物工程
    • 53 篇 电子科学与技术(可...
    • 44 篇 机械工程
    • 44 篇 光学工程
    • 42 篇 生物医学工程(可授...
    • 33 篇 交通运输工程
    • 27 篇 网络空间安全
    • 26 篇 化学工程与技术
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 22 篇 仪器科学与技术
    • 22 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 164 篇 数学
    • 87 篇 生物学
    • 83 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 26 篇 化学
    • 24 篇 系统科学
  • 179 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 89 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 临床医学
    • 30 篇 基础医学(可授医学...
  • 31 篇 法学
    • 22 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 43 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 25 篇 deep learning
  • 22 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 19 篇 computational mo...
  • 19 篇 accuracy
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 17 篇 optimization
  • 16 篇 graph neural net...
  • 15 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 correlation

机构

  • 57 篇 hubei key labora...
  • 53 篇 school of comput...
  • 47 篇 school of cyber ...
  • 41 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 36 篇 jiangsu key labo...
  • 33 篇 national enginee...
  • 29 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 guangdong provin...
  • 15 篇 university of ch...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 26 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 18 篇 wang guoyin
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 15 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 949 篇 英文
  • 74 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1029 条 记 录,以下是71-80 订阅
排序:
Learning with Open-world Noisy data via Class-independent Margin in Dual Representation Space
arXiv
收藏 引用
arXiv 2025年
作者: Pan, Linchao Gao, Can Zhou, Jie Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China
Learning with Noisy Labels (LNL) aims to improve the model generalization when facing data with noisy labels, and existing methods generally assume that noisy labels come from known classes, called closed-set noise. H... 详细信息
来源: 评论
Federated Hybrid-Supervised Learning for Universal Medical Image Segmentation
Federated Hybrid-Supervised Learning for Universal Medical I...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Shenhai Zheng Sian Wen Congyu Li Qing Chen Laquan Li College of Computer Science and Technology Chongqing University of Posts and Telecommunications China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education China School of Science Chongqing University of Posts and Telecommunications China
Federated Learning (FL) is an advanced technology that tackles the challenge of blocked data arising from privacy concerns, enabling the training of deep learning models without the need for data sharing. However, FL ... 详细信息
来源: 评论
MAGIC: detecting advanced persistent threats via masked graph representation learning  24
MAGIC: detecting advanced persistent threats via masked grap...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Zian Jia Yun Xiong Yuhong Nan Yao Zhang Jinjing Zhao Mi Wen Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China School of Software Engineering Sun Yat-sen University China National Key Laboratory of Science and Technology on Information System Security China Shanghai University of Electric Power China
Advance Persistent Threats (APTs), adopted by most delicate attackers, are becoming increasing common and pose great threat to various enterprises and institutions. data provenance analysis on provenance graphs has em...
来源: 评论
DBSSL: A Scheme to Detect Backdoor Attacks in Self-Supervised Learning Models
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Huang, Yuxian Yang, Geng Yuan, Dong Yu, Shui Nanjing University of Posts and Telecommunication College of Computer Science and Software China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China University of Sydney School of Electrical and Information Engineering Australia University of Technology Sydney School of Computer Science Australia
Recently, self-supervised learning has garnered significant attention for its ability to extract high-quality features from unlabeled data. However, existing research indicates that backdoor attacks can pose significa... 详细信息
来源: 评论
Several classes of linear codes with few weights derived from Weil sums
arXiv
收藏 引用
arXiv 2025年
作者: Hu, Zhao Qiu, Mingxiu Li, Nian Tang, Xiaohu Wu, Liwei Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security School of Cyber Science and Technology Hubei University Wuhan430062 China State Key Laboratory of Integrated Service Networks Xi’an710071 China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan430062 China Southwest Jiaotong University Chengdu610031 China Wuhan Maritime Communication Research Institute China
Linear codes with few weights have applications in secret sharing, authentication codes, association schemes and strongly regular graphs. In this paper, several classes of t-weight linear codes over Fq are presented w... 详细信息
来源: 评论
Privacy Law Enforcement Under Centralized Governance: A Qualitative Analysis of Four Years’ Special Privacy Rectification Campaigns
arXiv
收藏 引用
arXiv 2025年
作者: Jing, Tao Li, Yao Ye, Jingzhou Wang, Jie Wang, Xueqiang School of Cyber Science and Engineering Huazhong University of Science and Technology China JinYinHu Laboratory China University of Central Florida United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
In recent years, major privacy laws like the GDPR have brought about positive changes. However, challenges remain in enforcing the laws, particularly due to under-resourced regulators facing a large number of potentia... 详细信息
来源: 评论
A comprehensive survey on shadow removal from document images: datasets, methods, and opportunities
收藏 引用
Vicinagearth 2025年 第1期2卷 1-18页
作者: Wang, Bingshu Li, Changping Zou, Wenbin Zhang, Yongjun Chen, Xuhang Chen, C.L. Philip School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing & Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen University Shenzhen China Yongjun Zhang is with the State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Computer Science and Engineering Huizhou University Huizhou China School of Computer Science and Engineering South China University of Technology and Pazhou Lab Guangzhou China
With the rapid development of document digitization, people have become accustomed to capturing and processing documents using electronic devices such as smartphones. However, the captured document images often suffer...
来源: 评论
A Provably Secure Certificateless Signature Scheme With Anonymity for Healthcare IIoT
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Qiao, Zirui Xu, Ran Zhou, Yanwei Yang, Bo Zhu, Tianqing Zhang, Mingwu Xi’an University of Posts and Telecommunications School of Cyberspace Security Xi’an China Ministry of Education Key Laboratory of Data Protection and Intelligent Management China Shaanxi Normal University School of Computer Science Xi’an China City University of Macau Faculty of Data Science Macau China Hubei University of Technology School of Computer Wuhan China
The industrial Internet of Things (IIoT) is changing our way of life and work. As the number of mobile devices connected to IIoT increases, users will face many security challenges such as insecure communication envir... 详细信息
来源: 评论
Mamba Adapter: Efficient Multi-Modal Fusion for Vision-Language Tracking
收藏 引用
IEEE Transactions on Circuits and systems for Video Technology 2025年
作者: Shi, Liangtao Zhong, Bineng Liang, Qihua Hu, Xiantao Mo, Zhiyi Song, Shuxiang Ministry of Education Guangxi Normal University Key Laboratory of Education Blockchain and Intelligent Technology Guilin541004 China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security Guilin541004 China Wuzhou University School of Data Science and Software Engineering Wuzhou543002 China
Utilizing the high-level semantic information of language to compensate for the limitations of vision information is a highly regarded approach in single-object tracking. However, most existing vision-language (VL) tr... 详细信息
来源: 评论
VFLMonitor: Defending One-Party Hijacking Attacks in Vertical Federated Learning
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4828-4843页
作者: Xiangrui Xu Yiwen Zhao Yufei Han Yongsheng Zhu Zhen Han Guangquan Xu Bin Wang Shouling Ji Wei Wang School of Information Science and Technology Qingdao University of Science and Technology Qingdao China Thomas Lord Department of Computer Science University of Southern California Los Angeles CA USA INRIA Rennes Brittany France Institute of Computing Technologies China Academy of Railway Sciences Corporation Ltd. Beijing China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China Tianjin Key Laboratory of Advanced Networking (TANK) College of Intelligence and Computing Tianjin University Tianjin China Zhejiang Key Laboratory of Artificial Intelligence of Things (AIoT) Network and Data Security Hangzhou China College of Computer Science and Technology Zhejiang University Zhejiang China Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China
Vertical Federated Learning (VFL) is susceptible to various one-party hijacking attacks, such as Replay and Generation attacks, where a single malicious client can manipulate the model to produce attacker-specified re... 详细信息
来源: 评论