咨询与建议

限定检索结果

文献类型

  • 189 篇 期刊文献
  • 88 篇 会议

馆藏范围

  • 277 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 186 篇 工学
    • 130 篇 计算机科学与技术...
    • 113 篇 软件工程
    • 58 篇 电气工程
    • 43 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 16 篇 生物医学工程(可授...
    • 14 篇 光学工程
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
    • 7 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 交通运输工程
    • 5 篇 环境科学与工程(可...
    • 4 篇 仪器科学与技术
    • 4 篇 网络空间安全
  • 90 篇 理学
    • 49 篇 数学
    • 27 篇 物理学
    • 20 篇 统计学(可授理学、...
    • 16 篇 生物学
    • 6 篇 系统科学
  • 51 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 26 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 12 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 公共卫生与预防医...
  • 8 篇 法学
    • 6 篇 社会学
  • 3 篇 经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 speech processin...
  • 11 篇 federated learni...
  • 9 篇 signal processin...
  • 7 篇 deep learning
  • 7 篇 graph neural net...
  • 7 篇 feature extracti...
  • 6 篇 optimization
  • 6 篇 contrastive lear...
  • 6 篇 correlation
  • 6 篇 forecasting
  • 6 篇 privacy
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 accuracy
  • 5 篇 training
  • 4 篇 object detection
  • 4 篇 compressed sensi...
  • 4 篇 data privacy
  • 4 篇 magnetic resonan...

机构

  • 14 篇 department of ph...
  • 13 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 10 篇 huazhong univers...
  • 10 篇 engineering rese...
  • 10 篇 key laboratory o...
  • 10 篇 school of comput...
  • 8 篇 college of compu...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 8 篇 key laboratory o...
  • 6 篇 northeastern uni...
  • 6 篇 state key labora...
  • 6 篇 school of comput...
  • 5 篇 college of cyber...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 5 篇 school of comput...

作者

  • 17 篇 yang yang
  • 12 篇 wang guoyin
  • 11 篇 fu chong
  • 9 篇 liu jun
  • 8 篇 xia shuyin
  • 7 篇 xiao bin
  • 7 篇 feng gao
  • 6 篇 zou juan
  • 6 篇 zhou bin
  • 6 篇 xiaohong guan
  • 6 篇 li weisheng
  • 6 篇 gaoyang liu
  • 6 篇 wang chen
  • 5 篇 wang xingwei
  • 5 篇 qiao xiaoyu
  • 5 篇 luo minnan
  • 5 篇 sham chiu-wing
  • 5 篇 zhou pan
  • 5 篇 zeng cheng
  • 5 篇 ren xuebin

语言

  • 244 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security Ministry of Education"
277 条 记 录,以下是101-110 订阅
排序:
GBSVM: Granular-ball Support Vector Machine
arXiv
收藏 引用
arXiv 2022年
作者: Xia, Shuyin Lian, Xiaoyu Wang, Guoyin Gao, Xinbo Chen, Jiancu Peng, Xiaoli The Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China
GBSVM (Granular-ball Support Vector Machine) is a significant attempt to construct a classifier using the coarse-to-fine granularity of a granular-ball as input, rather than a single data point. It is the first classi... 详细信息
来源: 评论
SFma-Unet: A Mamba-Based Spatial-Frequency Fusion Network for Medical Image Segmentation
SFma-Unet: A Mamba-Based Spatial-Frequency Fusion Network fo...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhanpeng Liu Yuqiang Zhang Bin Wang Yang Yang Lin Cai Institute of Artificial Intelligence Xiamen University Xiamen China Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China School of Life Sciences Hubei University Wuhan China
Recently, Mamba-based methods have gained popularity in medical image segmentation due to their ability to model long-range dependencies with linear computational complexity. However, current segmentation methods ofte... 详细信息
来源: 评论
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
收藏 引用
IEEE Transactions on intelligent Transportation systems 2024年 第9期25卷 12528-12537页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Tariq, Tayyaba Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
Vehicular network technology has made substantial advancements in recent years in the field of intelligent Transportation systems. Vehicular Cloud Computing (VCC) has emerged as a novel paradigm with a substantial inc... 详细信息
来源: 评论
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Yijun Hao Shusen Yang Fang Li Yifan Zhang Cong Zhao Xuebin Ren Peng Zhao Chenren Xu Shibo Wang National Engineering Laboratory for Big Data Analytics Xi’an Jiaotong University Xi’an China National Engineering Laboratory for Big Data Analytics and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Computer Science Peking University Beijing China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China National Engineering Laboratory for Big Data Analytics XiÃan Jiaotong University XiÃan China
Network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
Each Fake News is Fake in its Own Way: An Attribution Multi-Granularity Benchmark for Multimodal Fake News Detection
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Hao Ma, Zihan Zeng, Zhi Luo, Minnan Zeng, Weixin Tang, Jiuyang Zhao, Xiang Laboratory for Big Data and Decision Nation University of Defence Technology China School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University China
Social platforms, while facilitating access to information, have also become saturated with a plethora of fake news, resulting in negative consequences. Automatic multimodal fake news detection is a worthwhile pursuit... 详细信息
来源: 评论
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on Adaptive Perturbation on Federated Graph Learning  25
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on ...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Li, Ken Shi, Bin Wei, Jiazhe Dong, Bo School of Computer Science and Technology Xi’an Jiaotong University Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an China School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China School of Distance Education Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China
Federated Graph Learning (FedGL) is an emerging Federated Learning (FL) framework that learns the graph data from various clients to train better Graph Neural Networks(GNNs) model. Owing to concerns regarding the secu... 详细信息
来源: 评论
CustomFair: A Customized Fairness Method for Federated Recommender systems in Social Internet of Things
收藏 引用
IEEE Internet of Things Journal 2024年
作者: Chen, Guorong Li, Chao Du, Fei Yuan, Xiaohan Chi, Cheng Yin, Zihang Wang, Bin Li, Tao Bao, Xuhua Wang, Wei Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China China Academy of Information and Communications Technology Beijing China Network and Data Security Hangzhou310053 China Nankai University College of Computer Science Tianjin300350 China LTD Sangfor Technologies Co Beijing China Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China
In the Social Internet of Things (SIoT), edge computing integrates artificial intelligence to learn intricate relationships. The scale and complexity of SIoT cause a data explosion from diverse objects, hindering tail... 详细信息
来源: 评论
Robust Imagined Speech Production Using AI-Generated Content Network for Patients with Language Impairments
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xu, Xu Fu, Chong Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110004 China
Imagined speech production is critical for brain-computer interface systems. It is able to provide the communication ability for patients with language impairments. Nowadays, many studies have developed algorithms for... 详细信息
来源: 评论
A Provably Secure Certificateless Signature Scheme With Anonymity for Healthcare IIoT
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Qiao, Zirui Xu, Ran Zhou, Yanwei Yang, Bo Zhu, Tianqing Zhang, Mingwu Xi’an University of Posts and Telecommunications School of Cyberspace Security Xi’an China Ministry of Education Key Laboratory of Data Protection and Intelligent Management China Shaanxi Normal University School of Computer Science Xi’an China City University of Macau Faculty of Data Science Macau China Hubei University of Technology School of Computer Wuhan China
The industrial Internet of Things (IIoT) is changing our way of life and work. As the number of mobile devices connected to IIoT increases, users will face many security challenges such as insecure communication envir... 详细信息
来源: 评论
PP-LDG: A Medical Privacy-Preserving Labeled data Generation Framework
PP-LDG: A Medical Privacy-Preserving Labeled Data Generation...
收藏 引用
Medical Artificial Intelligence (MedAI), IEEE International Conference on
作者: Haoxiang Yuan Xiaochen Yuan Xiuli Bi Weisheng Li Guoyin Wang Bin Xiao Chongqing Key Laboratory of Image Cognition School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China Faculty of Applied Sciences Macao Polytechnic University Macao China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China
The rapid development of deep learning has led to an increasing demand for data. However, such data are scarce in many fields and often contain private and sensitive information, such as medical images. The fact that ... 详细信息
来源: 评论