咨询与建议

限定检索结果

文献类型

  • 560 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 685 篇 工学
    • 491 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 192 篇 信息与通信工程
    • 131 篇 电气工程
    • 94 篇 控制科学与工程
    • 74 篇 生物工程
    • 66 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 44 篇 机械工程
    • 44 篇 生物医学工程(可授...
    • 34 篇 交通运输工程
    • 32 篇 网络空间安全
    • 28 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 168 篇 数学
    • 87 篇 生物学
    • 82 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 24 篇 化学
    • 24 篇 系统科学
  • 186 篇 管理学
    • 106 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 39 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 32 篇 法学
    • 22 篇 社会学
  • 15 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 27 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 computational mo...
  • 17 篇 optimization
  • 17 篇 accuracy
  • 16 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 13 篇 deep neural netw...
  • 12 篇 data privacy
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 12 篇 data models

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 university of ch...
  • 15 篇 huazhong univers...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 wang guoyin
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 959 篇 英文
  • 83 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1050 条 记 录,以下是851-860 订阅
排序:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools
arXiv
收藏 引用
arXiv 2023年
作者: Dong, Feng Li, Shaofei Jiang, Peng Li, Ding Wang, Haoyu Huang, Liangyi Xiao, Xusheng Chen, Jiedong Luo, Xiapu Guo, Yao Chen, Xiangqun Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science Peking University China Arizona State University United States Sangfor Technologies Inc. China The Hong Kong Polytechnic University Hong Kong
Provenance-Based Endpoint Detection and Response (P-EDR) systems are deemed crucial for future APT defenses. Despite the fact that numerous new techniques to improve P-EDR systems have been proposed in academia, it is...
来源: 评论
NODLINK: An Online system for Fine-Grained APT Attack Detection and Investigation
arXiv
收藏 引用
arXiv 2023年
作者: Li, Shaofei Dong, Feng Xiao, Xusheng Wang, Haoyu Shao, Fei Chen, Jiedong Guo, Yao Chen, Xiangqun Li, Ding School of Computer Science Peking University China Arizona State University United States Case Western Reserve University United States Sangfor Technologies Inc. China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Advanced Persistent Threats (APT) attacks have plagued modern enterprises, causing significant financial losses. To counter these attacks, researchers propose techniques that capture the complex and stealthy scenarios... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qiliang Gu Qin Lu Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
Robust Containment Control of Heterogeneous Uncertain Multi-Agent systems under Markovian Switching Topologies
Robust Containment Control of Heterogeneous Uncertain Multi-...
收藏 引用
Fully Actuated system Theory and Applications (CFASTA), Conference on
作者: Haihua Guo Cong Bi Xiang Xu Shenzhen Key Laboratory of Control Theory and Intelligent Systems Southern University of Science and Technology Shenzhen China Hong Kong Institute for Data Science City University of Hong Kong Hong Kong China College of Artificial Intelligence Nankai University Tianjin China School of System Design and Intelligent Manufacturing Southern University of Science and Technology Shenzhen China
This study addresses the robust output containment control problem of heterogeneous uncertain multi-agent systems under Markovian switching topologies. A novel distributed output feedback controller is proposed. Based... 详细信息
来源: 评论
A Malware Identification and Detection Method Using Mixture Correntropy-Based Deep Neural Network  3rd
A Malware Identification and Detection Method Using Mixture ...
收藏 引用
3rd International Conference on Cyberspace data and Intelligence, Cyber DI 2019, and the International Conference on Cyber-Living, Cyber-Syndrome, and Cyber-Health, CyberLife 2019
作者: Luo, Xiong Li, Jianyuan Wang, Weiping Gao, Yang Zhao, Wenbing School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China Beijing Key Laboratory of Knowledge Engineering for Materials Science Beijing100083 China Beijing Intelligent Logistics System Collaborative Innovation Center Beijing101149 China Department of Electrical and Computer Engineering University of Pittsburgh PittsburghPA15261 United States China Information Technology Security Evaluation Center Beijing100085 China Department of Electrical Engineering and Computer Science Cleveland State University ClevelandOH44115 United States
With the rapid development of CPS technology, the identification and detection of malware has become a matter of concern in the industrial application of CPS. Currently, advanced machine learning methods such as deep ... 详细信息
来源: 评论
Robust Imagined Speech Production Using AI-Generated Content Network for Patients with Language Impairments
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xu, Xu Fu, Chong Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110004 China
Imagined speech production is critical for brain-computer interface systems. It is able to provide the communication ability for patients with language impairments. Nowadays, many studies have developed algorithms for... 详细信息
来源: 评论
Secure Cryptography Infrastructures in the Cloud
Secure Cryptography Infrastructures in the Cloud
收藏 引用
IEEE Global Communications Conference
作者: Dawei Chu Kaijie Zhu Quanwei Cai Jingqiang Lin Fengjun Li Le Guan Lingchen Zhang State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences National Digital Switching System Engineering & Technological R&D Center CHINA Data Assurance and Communication Security Research Center Chinese Academy of Sciences Department of Electrical Engineering and Computer Science The University of Kansas USA Department of Computer Science University of Georgia USA
Information systems are deployed in clouds as virtual machines (VMs) for better agility, elasticity and reliability. It is necessary to safekeep their cryptographic keys, e.g., the private keys used in TLS and SSH, ag... 详细信息
来源: 评论
Towards Unified Token Learning for Vision-Language Tracking
arXiv
收藏 引用
arXiv 2023年
作者: Zheng, Yaozong Zhong, Bineng Liang, Qihua Li, Guorong Ji, Rongrong Li, Xianxian The Key Laboratory of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin541004 China The Guangxi Key Laboratory of Multi-Source Information Mining and Security Guangxi Normal University Guilin541004 China The School of Computer Science and Technology Key Laboratory of Big Data Mining and Knowledge Management University of Chinese Academy of Sciences Beijing100049 China Media Analytics and Computing Lab Department of Artificial Intelligence School of Informatics Xiamen University 361005 China
In this paper, we present a simple, flexible and effective vision-language (VL) tracking pipeline, termed MMTrack, which casts VL tracking as a token generation task. Traditional paradigms address VL tracking task ind... 详细信息
来源: 评论
Train delays prediction based on feature selection and random forest
Train delays prediction based on feature selection and rando...
收藏 引用
International Conference on intelligent Transportation
作者: Yuanyuan Ji Wei Zheng Hairong Dong Pengfei Gao National Research Center of Railway Safety Assessment Beijing Jiaotong University Beijing China National Research Centre of Railway Safety Assessment and the Beijing Key Laboratory of Intelligent Traffic Data Security and Privacy Protection Technology Beijing Jiaotong University Beijing State Key Lab of Rail Traffic Control & Safety Beijing Jiaotong University Beijing
Although trains are more efficient and convenient than other transportation, delays often occur. Accurately predicting the delay time of trains is of great significance to both dispatchers and passengers. The method f... 详细信息
来源: 评论
A survey of facial expression recognition based on deep learning
A survey of facial expression recognition based on deep lear...
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Heng Wei Zhi Zhang Collage of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan China
Facial expression recognition is the key research direction in many fields such as machine vision, pattern recognition and artificial intelligence. lt has become a research hotspot of many scholars and experts. This p... 详细信息
来源: 评论