咨询与建议

限定检索结果

文献类型

  • 532 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,022 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 660 篇 工学
    • 475 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 112 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 321 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 78 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 18 篇 hai jin
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 935 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1022 条 记 录,以下是791-800 订阅
排序:
VG-Net: Sensor Time Series Anomaly Detection with Joint Variational Autoencoder and Graph Neural Network
VG-Net: Sensor Time Series Anomaly Detection with Joint Vari...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Shuai Wang Shenghao Liu Xiaoxuan Fan Haijun Wang Yinxin Zhou Hanjun Gao Hongwei Lu Xianjun Deng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hunan Technical College of Railway High-speed China Nanjing University of Posts and Telecommunications China China National Nuclear Power Co Ltd China
intelligent Cyber-Physical systems typically utilize sensors to gather a significant amount of raw data which often possesses temporal and high-dimensional characteristics. Ensuring the data reliability is crucial for... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
HRPGAN: A GAN-based Model to Generate High-resolution Remote Sensing Images  7
HRPGAN: A GAN-based Model to Generate High-resolution Remote...
收藏 引用
7th Annual International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2019
作者: Sun, Hai Wang, Ping Chang, Yifan Qi, Li Wang, Hailei Xiao, Dan Zhong, Cheng Wu, Xuelian Li, Wenbo Sun, Bingyu Co.Ltd Shanghai China Department of Airborne Remote Sensing National Disaster Reduction Center of China Beijing China Institute of Technology Innovation Hefei Institute of Physical Science Chinese Academy of Sciences Hefei China Third Research Institute of the Ministry of Public Security Shanghai China Guizhou Key Laboratory of Economics System Simulation Guizhou University of Finance and Economics Guiyang China Beijing Aerospace Flight Control Center Beijing China Institute of Intelligent Machines Chinese Academy of Sciences Hefei China
Generative adversarial networks (GAN) has been mainly used in the generation of natural images such as MNIST, CIFAR10 as well as Imagenet datasets and achieves satisfying generation results. However, GAN always fails ... 详细信息
来源: 评论
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control with On-chain and Off-chain system
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Chao Hou, Cankun Jiang, Tianyu Ning, Jianting Qiao, Hui Wu, Yusen Fujian Provincial Key Laboratory of Data Intensive Computing the Key Laboratory of Intelligent Computing and Information Processing Fujian China The School of Computer Science and Technology Xidian University Shaanxi Xi’an710071 China The Department of Computer Science University of Miami MiamiFL33146 United States College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China The Faculty of Data Science City University of Macau China
data-driven landscape across finance, government, and healthcare, the continuous generation of information demands robust solutions for secure storage, efficient dissemination, and fine-grained access control. Blockch... 详细信息
来源: 评论
Optimizing Location Quality in Privacy Preserving Crowdsensing
Optimizing Location Quality in Privacy Preserving Crowdsensi...
收藏 引用
2019 IEEE Global Communications Conference (GLOBECOM)
作者: Yuhui Zhang Ming Li Dejun Yang Jian Tang Guoliang Xue Colorado School of Mines Golden CO Colorado School of Mines Golden CO USA Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Syracuse University Syracuse NY Arizona State University Tempe AZ
Crowdsensing enables a wide range of data collection, where the data are usually tagged with private locations. Protecting users' location privacy has been a central issue. The study of various location perturbati... 详细信息
来源: 评论
Fast Estimation of Relative Transformation Based on Fusion of Odometry and UWB Ranging data
arXiv
收藏 引用
arXiv 2024年
作者: Fu, Yuan Zhang, Zheng Zeng, Guangyang Liu, Chun Wu, Junfeng Ren, Xiaoqiang School of Mechatronic Engineering and Automation Shanghai University China Shanghai Artificial Intelligence Laboratory China Institute of Artificial Intelligence Shanghai University China School of Data Science The Chinese University of HongKong Shenzhen China Key Laboratory of Marine Intelligent Unmanned Swarm Technology and System Ministry of Education China
MSC Codes 93J08In this paper, we investigate the problem of estimating the 4-DOF (three-dimensional position and orientation) robot-robot relative frame transformation using odometers and distance measurements between... 详细信息
来源: 评论
TomoSAR-ALISTA: Efficient TomoSAR imaging via deep unfolded network
TomoSAR-ALISTA: Efficient TomoSAR imaging via deep unfolded ...
收藏 引用
International Conference on Radar systems (RADAR 2022)
作者: M. Wang Z. Zhang Y. Wang S. Gao X. Qiu Key Laboratory of Technology in Geo-spatial Information Processing and Application System Chinese Academy of Sciences Beijing 100190 People's Republic of China Key Laboratory of Intelligent Aerospace Big Data Application Technology Suzhou 215123 People's Republic of China Electrical and Computer Engineering Department George Mason University Fairfax VA 22030 USA
Synthetic aperture radar (SAR) tomography (TomoSAR) has attracted remarkable interest for its ability in achieving threedimensional reconstruction along the elevation direction from multiple observations. In recent ye...
来源: 评论
Learning from pseudo lesion: A self-supervised framework for covid-19 diagnosis
arXiv
收藏 引用
arXiv 2021年
作者: Li, Zhongliang Jin, Zhihao Li, Xuechen Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China
The Coronavirus disease 2019 (COVID-19) has rapidly spread all over the world since its first report in December 2019 and thoracic computed tomography (CT) has become one of the main tools for its diagnosis. In recent... 详细信息
来源: 评论
CA-Edit: Causality-Aware Condition Adapter for High-Fidelity Local Facial Attribute Editing
arXiv
收藏 引用
arXiv 2024年
作者: Xian, Xiaole He, Xilin Niu, Zenghao Zhang, Junliang Xie, Weicheng Song, Siyang Yu, Zitong Shen, Linlin Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Key Laboratory of Intelligent Information Processing China University of Exeter United Kingdom Great Bay University China
For efficient and high-fidelity local facial attribute editing, most existing editing methods either require additional finetuning for different editing effects or tend to affect beyond the editing regions. Alternativ...
来源: 评论
Exploring the Spatial Correlation of Shadowing in RF-based Device-Free Localization by Block Sparse Bayesian Learning
Exploring the Spatial Correlation of Shadowing in RF-based D...
收藏 引用
IEEE International Conference on Robotics and Biomimetics
作者: Jiaju Tan Xin Zhao Xuemei Guo Guoli Wang School of Mathematics and Computational Science Wuyi University Jiangmen China Tianjin Key Laboratory of Intelligent Robotic (tjKLIR) Institute of Robotics and Automatic Information System (IRAIS) Nankai University Tianjin China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education School of Data and Computer Science Sun Yat-sen University Guangzhou China
Device-Free Localization (DFL) realized by the Radio Frequency (RF) signal sensing, is an emerging technology to obtain the target’s position without needing the target carrying any electronic devices or tags. Due to... 详细信息
来源: 评论