咨询与建议

限定检索结果

文献类型

  • 560 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 685 篇 工学
    • 491 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 192 篇 信息与通信工程
    • 131 篇 电气工程
    • 94 篇 控制科学与工程
    • 74 篇 生物工程
    • 66 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 44 篇 机械工程
    • 44 篇 生物医学工程(可授...
    • 34 篇 交通运输工程
    • 32 篇 网络空间安全
    • 28 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 168 篇 数学
    • 87 篇 生物学
    • 82 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 24 篇 化学
    • 24 篇 系统科学
  • 186 篇 管理学
    • 106 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 39 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 32 篇 法学
    • 22 篇 社会学
  • 15 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 27 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 computational mo...
  • 17 篇 optimization
  • 17 篇 accuracy
  • 16 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 13 篇 deep neural netw...
  • 12 篇 data privacy
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 12 篇 data models

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 university of ch...
  • 15 篇 huazhong univers...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 wang guoyin
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 959 篇 英文
  • 83 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1050 条 记 录,以下是861-870 订阅
排序:
Analysis on Attention Mechanism Application Schemes for Automatic Question Answering systems
Analysis on Attention Mechanism Application Schemes for Auto...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Xinyuan Lu Xiaolong Xu Yanfei Sun Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing Jiangsu China Office of Scientific R&D Nanjing University of Posts and Telecommunications Nanjing Jiangsu China
An automatic question answering system is generally composed of the question analysis module, the information retrieval module, the answer selection module, etc. The core component of automatic question answering syst... 详细信息
来源: 评论
Automatic Generation Method of Ancient Poetry Based on LSTM
Automatic Generation Method of Ancient Poetry Based on LSTM
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Hanshuang Zhang Zhi Zhang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan China
This paper mainly focuses on the literary genre of ancient poetry with a certain rhythm and cadence, and proposes a novel automatic generation model of ancient poetry. The model uses about 300,000 Tang poems and Song ... 详细信息
来源: 评论
Multi-Object Tracking Based on Anchor-Free Detection and Message Passing Association
Multi-Object Tracking Based on Anchor-Free Detection and Mes...
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Zhou Fang Zhi Zhang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan China
Due to the current multi-target tracking work, in the scene of dense and staggered targets, the tracked targets are prone to ID switch, which greatly affects the tracking effect. Aiming at this problem, this paper pro... 详细信息
来源: 评论
Realizing Emotional Interactions to Learn User Experience and Guide Energy Optimization for Mobile Architectures  22
Realizing Emotional Interactions to Learn User Experience an...
收藏 引用
Proceedings of the 55th Annual IEEE/ACM International Symposium on Microarchitecture
作者: Xueliang Li Zhuobin Shi Junyang Chen Yepang Liu National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China College of Computer Science and Software Engineering Shenzhen University China Research Institute of Trustworthy Autonomous Systems Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation and Department of Computer Science and Engineering Southern University of Science and Technology China
In the age of AI, mobile architectures such as smartphones are still "cold machines"; machines do not feel. If the architecture is able to feel users' feelings and runtime user experience (UX), it will a...
来源: 评论
Network-coding-based video transmission via WiFi direct in local mobile networks
Network-coding-based video transmission via WiFi direct in l...
收藏 引用
International Conference on intelligent system and Knowledge Engineering, ISKE
作者: Lei Wang Qing Wang Zhongwei Sun Jun Yin Lijie Xu Yuwang Yang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing P.R. China School of Computer Nanjing University of Posts and Telecommunications Nanjing P.R. China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing P.R. China
It will incur high expense by sharing large-scale files (such as video) with others through commercial 4G networks. When the users are located at the same area, the traffic cost could be saved via the technology of Wi... 详细信息
来源: 评论
Detecting DTI Using Graph Embedding and Multi-Head Attention Mechanism
Detecting DTI Using Graph Embedding and Multi-Head Attention...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xiaoli Lin Yaoyu Chen Wenli Yang HaiPing Yu Zimo Wu Xiaolong Zhang Hubei Key Laboratory of Intelligent Information Processing and Real-Time Industrial System School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China School of Information Wuhan Vocational College Professional Committee of Graphics and Big Data China Graphics Society Wuhan China
Drug-target interaction (DTI) prediction has an important role in drug discovery, significantly expediting the drug design and development process. This paper proposes a new model, ERW_BiAN, that seamlessly integrates... 详细信息
来源: 评论
VFL: A Verifiable Federated Learning with Privacy-Preserving for Big data in Industrial IoT
arXiv
收藏 引用
arXiv 2020年
作者: Fu, Anmin Zhang, Xianglong Xiong, Naixue Gao, Yansong Wang, Huaqun School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Northeastern State University Department of Mathematics and Computer Science TahlequahOK United States Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
Due to the strong analytical ability of big data, deep learning has been widely applied to model the collected data in industrial IoT. However, for privacy issues, traditional data-gathering centralized learning is no... 详细信息
来源: 评论
TRUST: A Toolkit for TEE-Assisted Secure Outsourced Computation over Integers
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Bowen Li, Jiuhui Xu, Peiming Li, Xiaoguo Pei, Qingqi Shen, Yulong Guangzhou Institute of Technology Xidian University Guangzhou510555 China State Key Laboratory of Public Big Data Guizhou University Guiyang550025 China Electric Power Research Institute CSG Guangdong Guangzhou510663 China Guangdong Provincial Key Laboratory of Power System Network Security Guangdong Guangzhou510663 China The College of Computer Science Chongqing University Chongqing400044 China The State Key Laboratory of Integrated Service Networks Xidian University Xi’an710126 China
Secure outsourced computation (SOC) provides secure computing services by taking advantage of the computation power of cloud computing and the technology of privacy computing (e.g., homomorphic encryption). Expanding ... 详细信息
来源: 评论
Discovering communities of malapps on android-based mobile cyber-physical systems
arXiv
收藏 引用
arXiv 2018年
作者: Su, Dan Liu, Jiqiang Wang, Wei Wang, Xiaoyang Du, Xiaojiang Guizani, Mohsen Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing100044 China Dept. of Computer and Information Sciences Temple University PhiladelphiaPA19122 United States Dept. of Electrical and Computer Engineering University of Idaho MoscowID United States
Android-based devices like smartphones have become ideal mobile cyber-physical systems (MCPS) due to their powerful processors and variety of sensors. In recent years, an explosively and continuously growing number of... 详细信息
来源: 评论
Towards Demystifying Android Adware: dataset and Payload Location
Towards Demystifying Android Adware: Dataset and Payload Loc...
收藏 引用
IEEE/ACM International Conference on Automated Software Engineering - Workshops (ASE Workshops)
作者: Chao Wang Tianming Liu Yanjie Zhao Lin Zhang Xiaoning Du Li Li Haoyu Wang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Monash University Clayton Australia Huazhong University of Science and Technology Wuhan China The National Computer Emergency Response Team/Coordination Center of China (CNCERT/CC) Beijing China Beihang University Beijing China
Adware represents a pervasive threat in the mobile ecosystem, yet its inherent characteristics have been largely overlooked by previous research. This work takes a crucial step towards demystifying Android adware. We ... 详细信息
来源: 评论