咨询与建议

限定检索结果

文献类型

  • 532 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,022 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 660 篇 工学
    • 475 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 112 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 321 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 78 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 18 篇 hai jin
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 935 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1022 条 记 录,以下是951-960 订阅
排序:
MACCoM: A multiple attention and convolutional cross-mixer framework for detailed 2D biomedical image segmentation
收藏 引用
Computers in Biology and Medicine 2024年 179卷 108847-108847页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Ejiyi, Makuachukwu Bennedith Ukwuoma, Chiagoziem Ejiyi, Thomas Ugochukwu Muoka, Gladys Wavinya Gyarteng, Emmanuel S.A. Bamisile, Olusola O. Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China Pharmacy Department University of Nigeria Nsukka Enugu State Nsukka Nigeria Department of Pure and Industrial Chemistry University of Nigeria Nsukka Enugu State Nsukka Nigeria School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Research Center Chengdu University of Technology Chengdu China
The UNet architecture, which is widely used for biomedical image segmentation, has limitations like blurred feature maps and over- or under-segmented regions. To overcome these limitations, we propose a novel network ... 详细信息
来源: 评论
Joint object contour points and semantics for instance segmentation
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Wenchao Fu, Chong Zhu, Mai Cao, Lin Tie, Ming Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China Science and Technology on Space Physics Laboratory Beijing100076 China School of Computer Science University of Auckland New Zealand
The attributes of object contours has great significance for instance segmentation task. However, most of the current popular deep neural networks do not pay much attention to the object edge information. Inspired by ...
来源: 评论
Crsanet: Class Representations Self-Attention Network for the Segmentation of Thyroid Nodules
SSRN
收藏 引用
SSRN 2023年
作者: Sun, Shiyao Fu, Chong Xu, Sen Wen, Yingyou Ma, Tao School of Computer Science and Engineering Northeastern University Shenyang110819 China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China General Hospital of Northern Theatre Command Shenyang110016 China Medical Imaging Research Department Neusoft Research of Intelligent Healthcare Technology Co. Ltd. Shenyang China Dopamine Group Ltd. Auckland1542 New Zealand
Segmenting accurate thyroid nodules in medical ultrasound images is always non-trivial due to the large variation in size, shape and texture of nodules, and also the presence of surrounding tissues and organs with sim... 详细信息
来源: 评论
Correction to: Incentive mechanisms for mobile crowd sensing based on supply-demand relationship
收藏 引用
Peer-to-Peer Networking and Applications 2019年 第3期13卷 1069-1069页
作者: Xu, Jia Lu, Wei Xu, Lijie Yang, Dejun Li, Tao Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Department of Computer Science Colorado School of Mines Golden USA
Correction is needed in the original article. The university name in affiliation (1) is changed from “University of Posts and Telecommunications” to “Nanjing University of Posts and Telecommunications”.
来源: 评论
Impact of Prior Knowledge and data Correlation on Privacy Leakage: A Unified Analysis
arXiv
收藏 引用
arXiv 2019年
作者: Li, Yanan Ren, Xuebin Yang, Shusen Yang, Xinyu National Engineering Laboratory for Big Data Analytics [NEL-BDA Xi’an Jiaotong University Xi’an Shaanxi710049 China School of Mathematics and Statistics Xi’an Jiaotong University Xi’an Shaanxi710049 China School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an Shaanxi710049 China Ministry of Education Key Lab for Intelligent Networks and Network Security [MOE KLINNS Lab Xi’an Jiaotong University Xi’an Shaanxi710049 China
It has been widely understood that differential privacy (DP) can guarantee rigorous privacy against adversaries with arbitrary prior knowledge. However, recent studies demonstrate that this may not be true for correla... 详细信息
来源: 评论
LDGCN: An Edge-End Lightweight Dual GCN Based on Single-Channel EEG for Driver Drowsiness Monitoring
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Jingwei Wang, Chuansheng Huang, Jiayan Fan, Haoyi Grau, Antoni Zhang, Fuquan The College of Computer and Big Data Fuzhou University Fuzhou China The Department of Automatic Control Polytechnic University of Catalonia Barcelona Spain The New Engineering Industry College Putian University Putian China School of Computer and Artificial Intelligence Zhengzhou University China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China College of Computer and Control Engineering Minjiang University Fuzhou China Key Laboratory of Sichuan Province Sichuan Conservatory of Music Chengdu China Fuzhou Technology Innovation Center of Intelligent Manufacturing information System Minjiang University Fuzhou China Fujian Polytechnic Normal University Fujian Province University Fuzhou China
Driver drowsiness electroencephalography (EEG) signal monitoring can timely alert drivers of their drowsiness status, thereby reducing the probability of traffic accidents. Graph convolutional networks (GCNs) have sho... 详细信息
来源: 评论
Poisoning attack against estimating from pairwise comparisons
arXiv
收藏 引用
arXiv 2021年
作者: Ma, Ke Xu, Qianqian Zeng, Jinshan Cao, Xiaochun Huang, Qingming The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen518055 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer and Information Engineering Jiangxi Normal University Jiangxi Nanchang330022 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China The School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Big Data Mining and Knowledge Management The School of Economics and Management University of Chinese Academy of Sciences Beijing100049 China
As pairwise ranking becomes broadly employed for elections, sports competitions, recommendation, information retrieval and so on, attackers have strong motivation and incentives to manipulate or disrupt the ranking li... 详细信息
来源: 评论
GenFace: A Large-Scale Fine-Grained Face Forgery Benchmark and Cross Appearance-Edge Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Yu, Zitong Wang, Tianyi Huang, Xiaobin Shen, Linlin Gao, Zan Ren, Jianfeng Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Nanyang Technological University 50 Nanyang Ave Block N 4 639798 Singapore Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University China Jinan250014 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China School of Computer Science University of Nottingham Ningbo China
The rapid advancement of photorealistic generators has reached a critical juncture where the discrepancy between authentic and manipulated images is increasingly indistinguishable. Thus, benchmarking and advancing tec... 详细信息
来源: 评论
TomoSAR-ALISTA: Efficient TomoSAR Imaging via Deep Unfolded Network
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Muhan Zhang, Zhe Wang, Yue Gao, Silin Qiu, Xiaolan Key Laboratory of Technology in Geo-spatial Information Processing and Application System Chinese Academy of Sciences Beijing100190 China Key Laboratory of Intelligent Aerospace Big Data Application Technology Suzhou215123 China Suzhou Aerospace Information Research Institute Suzhou215123 China School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Beijing100049 China Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China Electrical and Computer Engineering Department George Mason University FairfaxVA22030 United States
Synthetic aperture radar (SAR) tomography (TomoSAR) has attracted remarkable interest for its ability in achieving three-dimensional reconstruction along the elevation direction from multiple observations. In recent y... 详细信息
来源: 评论
Distilled Transformers with Locally Enhanced Global Representations for Face Forgery Detection
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Li, Qiufu Yu, Zitong Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Guangdong Shenzhen518060 China School of Computing and Information Technology Great Bay University Guangdong Dongguan523000 China
Face forgery detection (FFD) is devoted to detecting the authenticity of face images. Although current CNN-based works achieve outstanding performance in FFD, they are susceptible to capturing local forgery patterns g... 详细信息
来源: 评论