咨询与建议

限定检索结果

文献类型

  • 189 篇 期刊文献
  • 88 篇 会议

馆藏范围

  • 277 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 186 篇 工学
    • 130 篇 计算机科学与技术...
    • 113 篇 软件工程
    • 58 篇 电气工程
    • 43 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 16 篇 生物医学工程(可授...
    • 14 篇 光学工程
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
    • 7 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 交通运输工程
    • 5 篇 环境科学与工程(可...
    • 4 篇 仪器科学与技术
    • 4 篇 网络空间安全
  • 90 篇 理学
    • 49 篇 数学
    • 27 篇 物理学
    • 20 篇 统计学(可授理学、...
    • 16 篇 生物学
    • 6 篇 系统科学
  • 51 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 26 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 12 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 公共卫生与预防医...
  • 8 篇 法学
    • 6 篇 社会学
  • 3 篇 经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 speech processin...
  • 11 篇 federated learni...
  • 9 篇 signal processin...
  • 7 篇 deep learning
  • 7 篇 graph neural net...
  • 7 篇 feature extracti...
  • 6 篇 optimization
  • 6 篇 contrastive lear...
  • 6 篇 correlation
  • 6 篇 forecasting
  • 6 篇 privacy
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 accuracy
  • 5 篇 training
  • 4 篇 object detection
  • 4 篇 compressed sensi...
  • 4 篇 data privacy
  • 4 篇 magnetic resonan...

机构

  • 14 篇 department of ph...
  • 13 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 10 篇 huazhong univers...
  • 10 篇 engineering rese...
  • 10 篇 key laboratory o...
  • 10 篇 school of comput...
  • 8 篇 college of compu...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 8 篇 key laboratory o...
  • 6 篇 northeastern uni...
  • 6 篇 state key labora...
  • 6 篇 school of comput...
  • 5 篇 college of cyber...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 5 篇 school of comput...

作者

  • 17 篇 yang yang
  • 12 篇 wang guoyin
  • 11 篇 fu chong
  • 9 篇 liu jun
  • 8 篇 xia shuyin
  • 7 篇 xiao bin
  • 7 篇 feng gao
  • 6 篇 zou juan
  • 6 篇 zhou bin
  • 6 篇 xiaohong guan
  • 6 篇 li weisheng
  • 6 篇 gaoyang liu
  • 6 篇 wang chen
  • 5 篇 wang xingwei
  • 5 篇 qiao xiaoyu
  • 5 篇 luo minnan
  • 5 篇 sham chiu-wing
  • 5 篇 zhou pan
  • 5 篇 zeng cheng
  • 5 篇 ren xuebin

语言

  • 244 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security Ministry of Education"
277 条 记 录,以下是1-10 订阅
排序:
Spin-orbit torque effect in silicon-based sputtered Mn_(3)Sn film
收藏 引用
Chinese Physics B 2024年 第10期33卷 394-399页
作者: Sha Lu Dequan Meng Adnan Khan Ziao Wang Shiwei Chen Shiheng Liang School of Physics Hubei UniversityWuhan 430062China Key Laboratory for Intelligent Sensing System and Security of Ministry of Education Wuhan 430062China
Noncollinear antiferromagnet Mn_(3)Sn has shown remarkable efficiency in charge-spin conversion,a novel magnetic spin Hall effect,and a stable topological antiferromagnetic state,which has resulted in great interest f... 详细信息
来源: 评论
Tuning Second Chern Number in a Four-Dimensional Topological Insulator by High-Frequency Time-Periodic Driving
收藏 引用
Chinese Physics Letters 2024年 第4期41卷 77-89页
作者: 刘峥嵘 陈锐 周斌 Department of Physics Hubei UniversityWuhan 430062China Key Laboratory of Intelligent Sensing System and Security of Ministry of Education Hubei UniversityWuhan 430062China
Floquet engineering has attracted considerable attention as a promising approach for tuning topological phase *** investigate the effects of high-frequency time-periodic driving in a four-dimensional(4D)topological in... 详细信息
来源: 评论
Higher-order topological Anderson insulator on the Sierpiński lattice
收藏 引用
Chinese Physics B 2024年 第1期33卷 218-222页
作者: 陈焕 刘峥嵘 陈锐 周斌 Department of Physics Hubei UniversityWuhan 430062China Key Laboratory of Intelligent Sensing System and Security of Ministry of Education Hubei UniversityWuhan 430062China
Disorder effects on topological materials in integer dimensions have been extensively explored in recent years. However, its influence on topological systems in fractional dimensions remains unclear. Here, we investig... 详细信息
来源: 评论
Integrating Structural Semantic Knowledge for Enhanced Information Extraction Pre-training
Integrating Structural Semantic Knowledge for Enhanced Infor...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Yi, Xiaoyang Bao, Yuru Zhang, Jian Qin, Yifang Lin, Faxin College of Cyber Science Nankai University China College of Computer Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China
Information Extraction (IE), aiming to extract structured information from unstructured natural language texts, can significantly benefit from pre-trained language models. However, existing pre-training methods solely... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Guoliang Zhang, Ruiqi Sun, Zhe Xing, Lingkai Zhang, Yu College of Cyber Science Nankai University Tianjin China College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 157-175页
作者: Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of EducationChongqing400065China Artificial Intelligence and Big Data College Chongqing Polytechnic University of Electronic TechnologyChongqing401331China
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i... 详细信息
来源: 评论
OSE: On-Site State of Health Estimation for Li-ion Battery using Real-Time Field data
收藏 引用
IEEE Transactions on Transportation Electrification 2025年 第3期11卷 7452-7462页
作者: Chen, Yanwen Zhao, Cong Yang, Shusen Zhao, Peng Ren, Xuebin Han, Qing Yang, Yuqian Wu, Shuaijun Xi'an Jiaotong University National Engineering Laboratory for Big Data Analytics Shaanxi Xi'an710049 China Xi'an Jiaotong University National Engineering Laboratory for Big Data Analytics The Ministry of Education Key Lab for Intelligent Networks and Network Security Shaanxi Xi'an710049 China
On-site lithium-ion battery state of health (SoH) estimation is of crucial importance for reliable operations of electric vehicles (EVs). Yet, due to the low-quality of unlabeled real-time field data, diverse operatin... 详细信息
来源: 评论
MPGStack: Membership Privacy Protection on Graph data via Model Stacking
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Chen, Chenyang Zhang, Xiaoyu Lin, Shen Chen, Xiaofeng Shaanxi Xi'an710071 China Key Laboratory of Data and Intelligent System Security Ministry of Education China
Graph neural networks (GNNs) can retain the structural information of graph data when processing graph data via message passing mechanism. Recently, GNNs have been widely used in recommendation systems, social network... 详细信息
来源: 评论
Secure Multi-way Join Query and Its Bench-Marking with Trusted Execution Environments  2nd
Secure Multi-way Join Query and Its Bench-Marking with Tru...
收藏 引用
2nd International Conference on data security and Privacy Protection, DSPP 2024
作者: Zhao, Yi Zhao, Sen Lv, Siyi School of Cyber Engineering Xidian University Xi’an China State Key Laboratory of Integrated Service Networks Xidian University Xi’an China Key Laboratory of Data and Intelligent System Security Ministry of Education Nankai University Tianjin China
Because of server-untrustable model in outsourcing encrypted database system, it’s fatal for data owners to keep their data confidential under complex query operations performed by database servers. Trusted... 详细信息
来源: 评论
NCCMF:Non-Collaborative Continuous Monitoring Framework for Container-Based Cloud Runtime Status
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 1687-1701页
作者: Tao Zheng Wenyi Tang Xingshu Chen Changxiang Shen School of Cyber Science and Engineering Sichuan UniversityChengdu610065China Intelligent Policing and National Security Risk Management Laboratory Luzhou646000China Cyber Science Research Institute Sichuan UniversityChengdu610065China Key Laboratory of Data Protection and Intelligent Management(Sichuan University) Ministry of EducationChengdu610065China
The security performance of cloud services is a key factor influencing users’selection of Cloud Service Providers(CSPs).Continuous monitoring of the security status of cloud services is ***,existing research lacks a ... 详细信息
来源: 评论