咨询与建议

限定检索结果

文献类型

  • 532 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,022 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 660 篇 工学
    • 475 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 112 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 321 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 78 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 18 篇 hai jin
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 935 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1022 条 记 录,以下是851-860 订阅
排序:
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhang, Junwei Liu, Wei Hou, Junhui Li, Minghui Zhang, Leo Yu Jin, Hai Sun, Lichao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China Cluster and Grid Computing Lab China National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Services Computing Technology and System Lab China City University of Hong Kong Hong Kong Deakin University Australia Lehigh University United States
Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models ... 详细信息
来源: 评论
High Performance Solar-Blind Photodetectors Based on Plasma-Enhanced Atomic Layer Deposition of Thin Ga2o3 Films Annealed Under Different Atmosphere
SSRN
收藏 引用
SSRN 2022年
作者: Chen, Yu-Chang Chen, Ding-Bo Zeng, Guang Li, Xiao-Xi Li, Yu-Chun Zhao, Xue-Feng Chen, Na Wang, Ting-Yun Zhang, David Wei Lu, Hong-Liang State Key Laboratory of ASIC and System Shanghai Institute of Intelligent Electronics & Systems School of Microelectronics Fudan University Shanghai200433 China Yiwu Research Institute of Fudan University Chengbei Road Zhejiang Yiwu City322000 China Key Laboratory of Specialty Fiber Optics and Optical Access Networks Shanghai Institute Communication and Data Science Shanghai University Shanghai200444 China
Solar-blind photodetectors (SBPDs) have attracted great interests for the potential applications as missile guidance, biological detection, and ultra-violet imaging. Despite the large number of Ga 2 O 3 -SBPDs reporte... 详细信息
来源: 评论
Simulate Human Saccadic Scan-Paths in Target Searching
收藏 引用
International Journal of Intelligence Science 2016年 第1期6卷 1-9页
作者: Lijuan Duan Jun Miao David M. W. Powers Jili Gu Laiyun Qing Beijing Key Laboratory of Trusted Computing Beijing Key Laboratory on Integration and Analysis of Large-Scale Stream Data College of Computer Science and Technology Beijing University of Technology Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences(CAS) Institute of Computing Technology CAS Beijing China School of Computer Science Engineering & Maths Flinders University of South Australia Adelaide South Australia Beijing Samsung Telecom R&D Center Beijing China University of Chinese Academy of Sciences Beijing China
Human saccade is a dynamic process of information pursuit. There are many methods using either global context or local context cues to model human saccadic scan-paths. In contrast to them, this paper introduces a mode... 详细信息
来源: 评论
Integrated Multi-Omics Analysis Identities a Machine Learning-Derived Signature for Predicting Prognosis and Therapeutic Vulnerability in Clear Cell Renal Cell Carcinoma
SSRN
收藏 引用
SSRN 2024年
作者: Chi, Shengqiang Ma, Jing Ding, Yiming Lu, Zeyi Zhou, Zhenwei Wang, Mingchao Li, Gonghui Chen, Yuanlei Research Center for Data Hub and Security Zhejiang Laboratory Hangzhou311121 China Department of Urology Sir Run Run Shaw Hospital Zhejiang University School of Medicine Hangzhou310016 China The Engineering Research Center of EMR and Intelligent Expert System Ministry of Education College of Biomedical Engineering and Instrument Science Zhejiang University Hangzhou310027 China
Background: Clear cell renal cell carcinoma (ccRCC) shows considerable variation within and between tumors, presents varying treatment responses among patients, possibly due to molecular distinctions. Methods: To addr... 详细信息
来源: 评论
Partial Deep Domain Adaptation for Non-Intrusive Load Monitoring
Partial Deep Domain Adaptation for Non-Intrusive Load Monito...
收藏 引用
IEEE International Conference on Big data and Cloud Computing (BdCloud)
作者: Yuying Li Yang Yang Chen Wang Runqin Liu Hongbo Jiang Wenping Liu Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China Huazhong University of Science and Technology Wuhan China China Unicom Central South Research Institute Changsha China Hunan University Changsha China Hubei University of Economics Wuhan China
With the widespread deployment of smart meters and the burgeoning integration of the Ubiquitous Power Internet of Things (UPIoT), Non-Intrusive Load Monitoring (NILM) has emerged as an essential technology, providing ...
来源: 评论
Sledge: Towards Efficient Live Migration of Docker Containers
Sledge: Towards Efficient Live Migration of Docker Container...
收藏 引用
IEEE International Conference on Cloud Computing, CLOUD
作者: Bo Xu Song Wu Jiang Xiao Hai Jin Yingxi Zhang Guoqiang Shi Tingyu Lin Jia Rao Li Yi Jizhong Jiang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory of Intelligent Manufacturing System Technology Beijing China The University of Texas at Arlington Arlington TX USA Alibaba Cloud Computing Co. Ltd. Hangzhou China
Modern large-scale cloud platforms require live migration technique on Docker containers with stateful workload to support load balancing, host maintenance, and Quality of Service (QoS) improvement. Efficient and scal... 详细信息
来源: 评论
Uplink Precoding Design for Cell-Free Massive MIMO With Iteratively Weighted MMSE
Uplink Precoding Design for Cell-Free Massive MIMO With Iter...
收藏 引用
作者: Wang, Zhe Zhang, Jiayi Ngo, Hien Quoc Ai, Bo Debbah, Merouane Frontiers Science Center for Smart High-Speed Railway System The School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China Institute of Electronics Communications and Information Technology Queen’s University Belfast BelfastBT3 9DT United Kingdom State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China Henan Joint International Research Laboratory of Intelligent Networking and Data Analysis The Frontiers Science Center for Smart High-Speed Railway System Zhengzhou University Zhengzhou450001 China Peng Cheng Laboratory Research Center of Networks and Communications Shenzhen518066 China Technology Innovation Institute Abu Dhabi United Arab Emirates CentraleSupélec University Paris-Saclay Gif-sur-Yvette91192 France
In this paper, we investigate a cell-free massive multiple-input multiple-output system with both access points and user equipments equipped with multiple antennas over the Weichselberger Rayleigh fading channel. We s... 详细信息
来源: 评论
DNN Task Assignment in UAV Networks: A Generative AI Enhanced Multi-Agent Reinforcement Learning Approach
arXiv
收藏 引用
arXiv 2024年
作者: Tang, Xin Chen, Qian Weng, Wenjie Liao, Binhan Wang, Jiacheng Cao, Xianbin Li, Xiaohuan Guangxi University Key Laboratory of Intelligent Networking and Scenario System School of Information and Communication Guilin University of Electronic Technology Guilin541004 China The College of Computing and Data Science Nanyang Technological University 639798 Singapore School of Architecture and Transportation Engineering Guilin University of Electronic Technology Guilin541004 China National Engineering Laboratory for Comprehensive Transportation Big Data Application Technology Guangxi Nanning530001 China College of Computing and Data Science Nanyang Technological University 639798 Singapore School of Electronic and Information Engineering The Key Laboratory of Advanced Technology of Near Space Information System Ministry of Industry and Information Technology of China Beihang University Beijing100191 China
Unmanned Aerial Vehicles (UAVs) possess high mobility and flexible deployment capabilities, prompting the development of UAVs for various application scenarios within the Internet of Things (IoT). The unique capabilit... 详细信息
来源: 评论
Factors correlation mining on railway accidents using association rule learning algorithm
Factors correlation mining on railway accidents using associ...
收藏 引用
International Conference on intelligent Transportation
作者: Yakun Wang Wei Zheng Hairong Dong Pengfei Gao National Research Center of Railway Safety Assessment Beijing Jiaotong University Beijing China National Research Centre of Railway Safety Assessment and the Beijing Key Laboratory of Intelligent Traffic Data Security and Privacy Protection Technology Beijing Jiaotong University Beijing China State Key Lab of Rail Traffic Control & Safety Beijing Jiaotong University Beijing China
Although much research work for the operation safety has been taken in the railway domain, some accidents still occur because past experiences of accident analysis were not fully accumulated for safety improvement. Th... 详细信息
来源: 评论
A Dynamic Fault Tree Based CBTC Onboard ATP system Safety Analysis Method*
A Dynamic Fault Tree Based CBTC Onboard ATP System Safety An...
收藏 引用
International Conference on intelligent Transportation
作者: Pengfei Gao Chao Liu Hairong Dong Wei Zheng National Research Centre of Railway Safety Assessment and the Beijing Key Laboratory of Intelligent Traffic Data Security and Privacy Protection Technology Beijing Jiaotong University Beijing China National Research Centre of Railway Safety Assessment Beijing Jiaotong University Beijing China State Key Lab of Rail Traffic Control & Safety Beijing Jiaotong University Beijing China
To obtain refined safety requirements during system architecture design stage, the traditional static fault tree analysis mothed is widely used to analyse the logical relationship between basic hazardous events leadin... 详细信息
来源: 评论