咨询与建议

限定检索结果

文献类型

  • 560 篇 期刊文献
  • 490 篇 会议

馆藏范围

  • 1,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 685 篇 工学
    • 491 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 192 篇 信息与通信工程
    • 131 篇 电气工程
    • 94 篇 控制科学与工程
    • 74 篇 生物工程
    • 66 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 44 篇 机械工程
    • 44 篇 生物医学工程(可授...
    • 34 篇 交通运输工程
    • 32 篇 网络空间安全
    • 28 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 21 篇 建筑学
  • 332 篇 理学
    • 168 篇 数学
    • 87 篇 生物学
    • 82 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 24 篇 化学
    • 24 篇 系统科学
  • 186 篇 管理学
    • 106 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 39 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 32 篇 法学
    • 22 篇 社会学
  • 15 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 27 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 computational mo...
  • 17 篇 optimization
  • 17 篇 accuracy
  • 16 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 13 篇 deep neural netw...
  • 12 篇 data privacy
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 12 篇 data models

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 47 篇 school of cyber ...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 33 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 16 篇 university of ch...
  • 15 篇 huazhong univers...

作者

  • 37 篇 xu xiaolong
  • 29 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 wang guoyin
  • 16 篇 xu qianqian
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 959 篇 英文
  • 83 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security"
1050 条 记 录,以下是961-970 订阅
排序:
Disentangled Representation Learning with Transmitted Information Bottleneck
arXiv
收藏 引用
arXiv 2023年
作者: Dang, Zhuohang Luo, Minnan Jia, Chengyou Dai, Guang Wang, Jihong Chang, Xiaojun Wang, Jingdong The School of Computer Science and Technology The Ministry of Education Key Laboratory of Intelligent Networks and Network Security The Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Shaanxi Xi’an710049 China The SGIT AI Laboratory Xi’an710048 China The State Grid Shaanxi Electric Power Company Ltd. State Grid Corporation of China Xi’an710048 China The School of Information Science and Technology University of Science and Technology of China Hefei230026 China Abu Dhabi United Arab Emirates Baidu Inc Beijing100085 China
Encoding only the task-related information from the raw data, i.e., disentangled representation learning, can greatly contribute to the robustness and generalizability of models. Although significant advances have bee... 详细信息
来源: 评论
Fog-assisted multi-user swipt networks: Local computing or offloading
arXiv
收藏 引用
arXiv 2019年
作者: Zheng, Haina Xiong, Ke Fan, Pingyi Zhong, Zhangdui Letaief, Khaled Ben School of Computer and Information Technology Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing100044 China National Laboratory for Information Science and Technology Department of Electronic Engineering Tsinghua University Beijing100084 China State Key Lab of Rail Traffic Control and Safety Beijing Engineering Research Center of High-speed Railway Broadband Mobile Communications Beijing Jiaotong University Beijing100044 China Clear Water Bay Hong Kong
This paper investigates a fog computing-assisted multi-user simultaneous wireless information and power transfer (SWIPT) network, where multiple sensors with power splitting (PS) receiver architectures receive informa... 详细信息
来源: 评论
ITrace: An implicit trust inference method for trust-aware collaborative filtering
收藏 引用
AIP Conference Proceedings 2018年 第1期1955卷
作者: Xu He Bin Liu Kejia Chen School of Computer Science Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210023 China
The growth of Internet commerce has stimulated the use of collaborative filtering (CF) algorithms as recommender systems. A CF algorithm recommends items of interest to the target user by leveraging the votes given by...
来源: 评论
Similarity Mining via Implicit Matching Pattern Learning for Kinship Verification
Similarity Mining via Implicit Matching Pattern Learning for...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Xiaoke Zhu Danyang Li Xiaopan Chen Fumin Qi Fan Zhang Xiao-Yuan Jing School of Computer and Information Engineering Henan University Kaifeng China Henan Engineering Research Center of Intelligent Technology and Application Henan University Kaifeng China Department of System Operation National Supercomuting Center in Shenzhen Shenzhen China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China School of Computer Science Wuhan University Wuhan China
Facial image based kinship verification aims to decide whether there exists kinship between the given facial images. In practice, the cross-generation differences will cause adverse effects on kinship verification, wh... 详细信息
来源: 评论
Unbalanced incomplete multi-view clustering via the scheme of view evolution: Weak views are meat;strong views do eat
arXiv
收藏 引用
arXiv 2020年
作者: Fang, Xiang Hu, Yuchong Zhou, Pan Wu, Dapeng Oliver The School of Computer Science and Technology Key Laboratory of Information Storage System Ministry of Education of China Huazhong University of Science and Technology Wuhan430074 China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China The Department of Electrical and Computer Engineering University of Florida GainesvilleFL32611 United States
Incomplete multi-view clustering is an important technique to deal with real-world incomplete multi-view data. Previous methods assume that all views have the same incompleteness, i.e., balanced incompleteness. Howeve... 详细信息
来源: 评论
Siamese Delta Network with Multimodality Fusion for systemic Treatment Response Prediction in Pancreatic Cancer*
Siamese Delta Network with Multimodality Fusion for Systemic...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
作者: Peijun Hu Xiang Li Na Lu Xueli Bai Tingbo Liang Jingsong Li Research Center for Healthcare Data Science Zhejiang Laboratory Hangzhou China Department of Hepatobiliary and Pancreatic Surgery First Affiliated Hospital Zhejiang University School of Medicine Hangzhou China Zhejiang Provincial Key Laboratory of Pancreatic Disease Hangzhou China Zhejiang University Cancer Center Hangzhou China Engineering Research Center of EMR and Intelligent Expert System Ministry of Education College of Biomedical Engineering and Instrument Science Zhejiang University Hangzhou China
systemic treatment is a main way for pancreas cancer patients that are ineligible for surgery. A subgroup of patients showed good response to systemic treatment and the rest received limited benefits. CT images provid...
来源: 评论
Novel Color Orthogonal Moments-Based Image Representation and Recognition
Research Square
收藏 引用
Research Square 2020年
作者: He, Bing Liu, Jun Yang, Tengfei Xiao, Bin Peng, Yanguo School of Physics and Electrical Engineering Weinan Normal University Weinan714000 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an University of Posts & Telecommunications Xi’an710121 China School of Computer Science and Technology Weinan Normal University Weinan714000 China School of Cyberspace Security Xi’an University of Posts & Telecommunications Xi’an710121 China Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China School of Computer Science and Technology Xidian University Xi’an710071 China
Inspired by quaternion algebra and the idea of fractional-order transformation, we propose a new set of quaternion fractional-order generalized Laguerre orthogonal moments (QFr-GLMs) based on fractional-order generali... 详细信息
来源: 评论
Cell-Free Massive MIMO with Multi-Antenna Users over Weichselberger Rician Channels
arXiv
收藏 引用
arXiv 2022年
作者: Li, Xin Zhang, Jiayi Wang, Zhe Ai, Bo Ng, Derrick Wing Kwan The School of Electronic and Information Engineering The Frontiers Science Center for Smart High-Speed Railway System Beijing Jiaotong University Beijing100044 China The State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China The Frontiers Science Center for Smart High-Speed Railway System Henan Joint International Research Laboratory of Intelligent Networking and Data Analysis Zhengzhou University Zhengzhou450001 China Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen China School of Electrical Engineering and Telecommunications University of New South Wales NSW2052 Australia
We consider a cell-free massive multiple-input multiple-output (MIMO) system with multi-antenna access points and user equipments (UEs) over Weichselberger Rician fading channels with random phase-shifts. More specifi... 详细信息
来源: 评论
OpenHI2 - Open source histopathological image platform
OpenHI2 - Open source histopathological image platform
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine
作者: Pargorn Puttapirat Haichuan Zhang Jingyi Deng Yuxin Dong Jiangbo Shi Hongyu He Zeyu Gao Chunbao Wang Xiangrong Zhang Chen Li National Engineering Lab for Big Data Analytics Xi'an Jiao tong University Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Tech. R&D Xi'an Jiaotong University Department of Power System and Automation School of Electrical Engineering Xi'an Jiaotong University Department of Pathology the First Affiliated Hospital of Xi'an Jiaotong University Institute of Intelligent Information Processing Xidian University
Transition from conventional to digital pathology requires a new category of biomedical informatic infrastructure which could facilitate delicate pathological routine. Pathological diagnoses are sensitive to many exte... 详细信息
来源: 评论
TEVA: Training-Efficient and Verifiable Aggregation for Federated Learning for Consumer Electronics in Industry 5.0
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xia, Yuanjun Liu, Yining Chen, Jingxue Liang, Yangfan Khan, Fazlullah Alturki, Ryan Wang, Xiaopei Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software School of Computer and Information Security Guilin541004 China Wenzhou University of Technology School of Data Science and Artificial Intelligence Wenzhou325027 China University of Technology School of Mathematical and Physical Sciences SydneyNSW2007 Australia Jiaxing University Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems The Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province The Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province Jiaxing314001 China University of Nottingham Ningbo China School of Computer Science Faculty of Science and Engineering Zhejiang Ningbo315104 China Umm AI-Qura University Makkah Department of Software Engineering College of Computing Saudi Arabia Riverside Department of Computer Science and Engineering University of California CA92521 United States
Federated learning (FL) has been widely used for privacy-preserving model updates in Industry 5.0, facilitated by 6G networks. Despite FL's privacy-preserving advantages, it remains vulnerable to attacks where adv... 详细信息
来源: 评论