咨询与建议

限定检索结果

文献类型

  • 207 篇 期刊文献
  • 88 篇 会议

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 203 篇 工学
    • 140 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 70 篇 电气工程
    • 49 篇 信息与通信工程
    • 28 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 17 篇 光学工程
    • 17 篇 生物医学工程(可授...
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
    • 8 篇 建筑学
    • 8 篇 交通运输工程
    • 7 篇 网络空间安全
    • 6 篇 土木工程
    • 5 篇 仪器科学与技术
    • 5 篇 环境科学与工程(可...
  • 96 篇 理学
    • 52 篇 数学
    • 29 篇 物理学
    • 21 篇 统计学(可授理学、...
    • 16 篇 生物学
    • 6 篇 系统科学
  • 55 篇 管理学
    • 30 篇 管理科学与工程(可...
    • 28 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 12 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 公共卫生与预防医...
  • 10 篇 法学
    • 7 篇 社会学
  • 3 篇 经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 speech processin...
  • 11 篇 federated learni...
  • 9 篇 deep learning
  • 9 篇 signal processin...
  • 7 篇 graph neural net...
  • 7 篇 feature extracti...
  • 6 篇 optimization
  • 6 篇 contrastive lear...
  • 6 篇 correlation
  • 6 篇 forecasting
  • 6 篇 privacy
  • 6 篇 training
  • 5 篇 data privacy
  • 5 篇 magnetic resonan...
  • 5 篇 topological insu...
  • 5 篇 computational mo...
  • 5 篇 topology
  • 5 篇 granular computi...
  • 5 篇 accuracy

机构

  • 14 篇 department of ph...
  • 13 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 10 篇 huazhong univers...
  • 10 篇 engineering rese...
  • 10 篇 key laboratory o...
  • 10 篇 school of comput...
  • 8 篇 college of compu...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 6 篇 northeastern uni...
  • 6 篇 state key labora...
  • 6 篇 school of comput...
  • 5 篇 college of cyber...
  • 5 篇 school of comput...
  • 5 篇 key laboratory o...

作者

  • 17 篇 yang yang
  • 13 篇 wang guoyin
  • 11 篇 fu chong
  • 9 篇 liu jun
  • 8 篇 xia shuyin
  • 7 篇 xiao bin
  • 7 篇 bin zhou
  • 7 篇 feng gao
  • 6 篇 zou juan
  • 6 篇 luo minnan
  • 6 篇 zhou bin
  • 6 篇 xiaohong guan
  • 6 篇 li weisheng
  • 6 篇 gaoyang liu
  • 6 篇 rui chen
  • 6 篇 wang chen
  • 5 篇 wang xingwei
  • 5 篇 qiao xiaoyu
  • 5 篇 zheng-rong liu
  • 5 篇 sham chiu-wing

语言

  • 262 篇 英文
  • 28 篇 其他
  • 3 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security Ministry of Education"
295 条 记 录,以下是1-10 订阅
排序:
HTOTP: Honey Time-Based One-Time Passwords
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4438-4453页
作者: Ding, Zixuan Wang, Ding Nankai University College of Cryptology and Cyber Science Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin300350 China Chinese Academy of Sciences Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Beijing100085 China
One-Time Passwords (OTPs) play a crucial role in Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA) by adding an additional layer of security. OTPs effectively reduce the risk of static passwords be... 详细信息
来源: 评论
Optimal Linear Codes With Few Weights From Simplicial Complexes
收藏 引用
IEEE Transactions on Information Theory 2025年 第5期71卷 3531-3543页
作者: Chen, Bing Xu, Yunge Hu, Zhao Li, Nian Zeng, Xiangyong Hubei University Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Wuhan430062 China Hubei University Key Laboratory of Intelligent Sensing System and Security Ministry of Education Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security School of Cyber Science and Technology Wuhan430062 China State Key Laboratory of Integrated Service Networks Xi’an710071 China Hubei University Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Key Laboratory of Intelligent Sensing System and Security Ministry of Education Wuhan430062 China
Recently, constructions of optimal linear codes from simplicial complexes have attracted much attention and some related nice works were presented. Let q be a prime power. In this paper, by using the simplicial comple... 详细信息
来源: 评论
RIGIDITY RESULTS OF SPACE-LIKE SUBMANIFOLDS WITH PARALLEL GAUSSIAN MEAN CURVATURE VECTOR
收藏 引用
Tohoku Mathematical Journal 2025年 第1期77卷 105-118页
作者: Wang, Huijuan FACULTY OF MATHEMATICS AND STATISTICS KEY LABORATORY OF APPLIED MATHEMATICS OF HUBEI PROVINCE KEY LABORATORY OF INTELLIGENT SENSING SYSTEM AND SECURITY MINISTRY OF EDUCATION HUBEI UNIVERSITY WUHAN China
In this paper, we study the space-like submanifolds with parallel Gaussian mean curvature vector in pseudo-Euclidean space. We establish a relevant Omori-Yau maximum principle for these space-like submanifolds which i... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Guoliang Zhang, Ruiqi Sun, Zhe Xing, Lingkai Zhang, Yu College of Cyber Science Nankai University Tianjin China College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 157-175页
作者: Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of EducationChongqing400065China Artificial Intelligence and Big Data College Chongqing Polytechnic University of Electronic TechnologyChongqing401331China
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i... 详细信息
来源: 评论
MPGStack: Membership Privacy Protection on Graph data via Model Stacking
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Chen, Chenyang Zhang, Xiaoyu Lin, Shen Chen, Xiaofeng Shaanxi Xi'an710071 China Key Laboratory of Data and Intelligent System Security Ministry of Education China
Graph neural networks (GNNs) can retain the structural information of graph data when processing graph data via message passing mechanism. Recently, GNNs have been widely used in recommendation systems, social network... 详细信息
来源: 评论
Secure Multi-way Join Query and Its Bench-Marking with Trusted Execution Environments  2nd
Secure Multi-way Join Query and Its Bench-Marking with Tru...
收藏 引用
2nd International Conference on data security and Privacy Protection, DSPP 2024
作者: Zhao, Yi Zhao, Sen Lv, Siyi School of Cyber Engineering Xidian University Xi’an China State Key Laboratory of Integrated Service Networks Xidian University Xi’an China Key Laboratory of Data and Intelligent System Security Ministry of Education Nankai University Tianjin China
Because of server-untrustable model in outsourcing encrypted database system, it’s fatal for data owners to keep their data confidential under complex query operations performed by database servers. Trusted... 详细信息
来源: 评论
Stacking U-Nets in U-shape: Redesigning the Information Flow in Model-based Networks for MRI Reconstruction
Stacking U-Nets in U-shape: Redesigning the Information Flow...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Model-based networks have shown convincing performance in MRI reconstruction. However, the unrolled cascades within the networks are constrained to solely obtain information from the preceding counterpart, resulting i... 详细信息
来源: 评论
Subsampling Decomposition based k-Space Refinement for Accelerated MRI Reconstruction
Subsampling Decomposition based k-Space Refinement for Accel...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
In accelerated MRI reconstruction problem, directly recovering all the missing k-space data from undersampled measurements is highly ill-posed and often leads to suboptimal performance. To address the problem, we prop... 详细信息
来源: 评论
Learning Preconditioners in Gates-controlled Deep Unfolding Networks based on Quasi-Newton Methods For Accelerated MRI Reconstruction
Learning Preconditioners in Gates-controlled Deep Unfolding ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Deep unfolding networks (DUNs) have made significant progress in MRI reconstruction, successfully tackling the problem of prolonged imaging time. However, the ill-conditioned nature of MRI reconstruction often causes ... 详细信息
来源: 评论