咨询与建议

限定检索结果

文献类型

  • 189 篇 期刊文献
  • 88 篇 会议

馆藏范围

  • 277 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 186 篇 工学
    • 130 篇 计算机科学与技术...
    • 113 篇 软件工程
    • 58 篇 电气工程
    • 43 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 16 篇 生物医学工程(可授...
    • 14 篇 光学工程
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
    • 7 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 交通运输工程
    • 5 篇 环境科学与工程(可...
    • 4 篇 仪器科学与技术
    • 4 篇 网络空间安全
  • 90 篇 理学
    • 49 篇 数学
    • 27 篇 物理学
    • 20 篇 统计学(可授理学、...
    • 16 篇 生物学
    • 6 篇 系统科学
  • 51 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 26 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 12 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 公共卫生与预防医...
  • 8 篇 法学
    • 6 篇 社会学
  • 3 篇 经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 speech processin...
  • 11 篇 federated learni...
  • 9 篇 signal processin...
  • 7 篇 deep learning
  • 7 篇 graph neural net...
  • 7 篇 feature extracti...
  • 6 篇 optimization
  • 6 篇 contrastive lear...
  • 6 篇 correlation
  • 6 篇 forecasting
  • 6 篇 privacy
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 accuracy
  • 5 篇 training
  • 4 篇 object detection
  • 4 篇 compressed sensi...
  • 4 篇 data privacy
  • 4 篇 magnetic resonan...

机构

  • 14 篇 department of ph...
  • 13 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 10 篇 huazhong univers...
  • 10 篇 engineering rese...
  • 10 篇 key laboratory o...
  • 10 篇 school of comput...
  • 8 篇 college of compu...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 8 篇 key laboratory o...
  • 6 篇 northeastern uni...
  • 6 篇 state key labora...
  • 6 篇 school of comput...
  • 5 篇 college of cyber...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 5 篇 school of comput...

作者

  • 17 篇 yang yang
  • 12 篇 wang guoyin
  • 11 篇 fu chong
  • 9 篇 liu jun
  • 8 篇 xia shuyin
  • 7 篇 xiao bin
  • 7 篇 feng gao
  • 6 篇 zou juan
  • 6 篇 zhou bin
  • 6 篇 xiaohong guan
  • 6 篇 li weisheng
  • 6 篇 gaoyang liu
  • 6 篇 wang chen
  • 5 篇 wang xingwei
  • 5 篇 qiao xiaoyu
  • 5 篇 luo minnan
  • 5 篇 sham chiu-wing
  • 5 篇 zhou pan
  • 5 篇 zeng cheng
  • 5 篇 ren xuebin

语言

  • 244 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security Ministry of Education"
277 条 记 录,以下是111-120 订阅
排序:
Bidirectional Identity-Based Inner-Product Functional Re-Encryption in Vaccine data Sharing
收藏 引用
IEEE Transactions on Cloud Computing 2025年
作者: Wang, Jing Zhou, Yanwei Zhu, Yasi Liu, Zhiquan Yang, Bo Zhang, Mingwu Shaanxi Normal University School of Computer Science Xi'an710119 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education China Jinan University College of Cyber Security Guangzhou510632 China Hubei University of Technology School of Computer Wuhan430068 China
With the development of cloud computing, more and more data is stored in cloud servers, which leads to an increasing degree of privacy of data stored in cloud servers. For example, in the critical domain of medical va... 详细信息
来源: 评论
Probabilistic Electricity Price Forecasting and Uncertainty Estimation Using Deep Bayesian Model with Multi-Distribution Fusion
SSRN
收藏 引用
SSRN 2024年
作者: Shao, Zhen Han, Yating Fu, Chao Zha, Jianrui Yang, Shanlin School of Management Hefei University of Technology Hefei230009 China Key Laboratory of Process Optimization and Intelligent Decision-making Ministry of Education Anhui Hefei230009 China Philosophy and Social Sciences Laboratory of Data Science and Smart Society Governance Hefei University of Technology Ministry of Education Hefei230009 China Ministry of Education Engineering Research Center for Intelligent Decision-Making & Information System Technologies Hefei230009 China
Probabilistic electricity price forecasting (EPF) is paramount for stakeholder scheduling and trading in deregulated energy markets. However, during the process of establishing a probability prediction model, the cons... 详细信息
来源: 评论
CoGAP: A Personalized Federated Learning Method Using Collaborative Optimization for Medical Image Classification
CoGAP: A Personalized Federated Learning Method Using Collab...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Shenhai Zheng Congyu Li Sian Wen Xi Gao Lei Yu College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China Emergency Department The Second Affiliated Hospital of Chongqing Medical University Chongqing China
Federated learning (FL) has been widely used in medical image processing to protect data privacy, but it has issues with data heterogeneity. Personalized federated learning have emerged to tackle these issues but ofte... 详细信息
来源: 评论
Joint Secure and Covert Communications for Active STAR-RIS Assisted ISAC systems
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Guo, Liang Jia, Jie Mu, Xidong Liu, Yuanwei Chen, Jian Wang, Xingwei Northeastern University School of Computer Science and Engineering China Northeastern University Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China BelfastBT3 9DT United Kingdom Department of Electrical and Electronic Engineering China
This paper investigates the design of jointly supporting physical layer security (PLS) and covert communications (CCs) in an active simultaneously transmitting and reflecting reconfigurable intelligent surface (a-STAR... 详细信息
来源: 评论
MCU-Net: A Multi-prior Collaborative Deep Unfolding Network with Gates-controlled Spatial Attention for Accelerated MR Image Reconstruction
arXiv
收藏 引用
arXiv 2024年
作者: Qiao, Xiaoyu Li, Weisheng Wang, Guofen Huang, Yuping Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China College of Computer and Information Science Chongqing Normal University Chongqing China
Deep unfolding networks (DUNs) have demonstrated significant potential in accelerating magnetic resonance imaging (MRI). However, they often encounter high computational costs and slow convergence rates. Besides, they... 详细信息
来源: 评论
Learning Multimodal Attention Mixed with Frequency Domain Information as Detector for Fake News Detection
Learning Multimodal Attention Mixed with Frequency Domain In...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Zihan Ma Huan Liu Zhi Zeng Hao Guo Xiang Zhao Minnan Luo School of Computer Science and Technology Xi’an Jiaotong University Xi'an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi'an China Laboratory for Big Data and Decision Nation University of Defence Technology Changsha China
Detecting fake news on social media has become a crucial task in combating online misinformation and countering malicious propaganda. Existing methods rely on semantic consistency across modalities to fuse features an... 详细信息
来源: 评论
Learning Counterfactual Explanation of Graph Neural Networks Via Generative Flow Network
SSRN
收藏 引用
SSRN 2023年
作者: He, Kangjia Liu, Li Zhang, Youmin Wang, Ye Liu, Qun Wang, Guoyin School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China Chongqing Key Laboratory of Computational Intelligence Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China
Counterfactual subgraphs explain Graph Neural Networks (GNNs) by answering the question: "How would the prediction change if a certain subgraph were absent in the input instance?" The differentiable proxy ad... 详细信息
来源: 评论
SOT-MRAM-based true in-memory computing architecture for approximate multiplication
收藏 引用
Chip 2025年 第2期4卷
作者: Song, Min Tang, Qilong Ouyang, Xintong Duan, Wei Xu, Yan Zhang, Shuai You, Long Key Laboratory of Intelligent Sensing System and Security of the Ministry of Education Hubei Key Laboratory of Micro-Nanoelectronic Materials and Devices School of Microelectronics Hubei University Wuhan430062 China School of Integrated Circuits Huazhong University of Science and Technology Wuhan430074 China
The in-memory computing (IMC) paradigm emerges as an effective solution to break the bottlenecks of conventional von Neumann architecture. In the current work, an approximate multiplier in spin-orbit torque magnetores... 详细信息
来源: 评论
Improvement of the square-root low bounds on the minimum distances of BCH codes and Matrix-product codes
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Xiaoqiang Li, Liuyi Wu, Yansheng Zheng, Dabin Lu, Shuxian Hubei Key Laboratory of Applied Mathematics Key Laboratory of Intelligent Sensing System and Security Ministry of Education Faculty of Mathematics and Statistics Hubei University Wuhan430062 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China National Mobile Communications Research Laboratory Southeast University Nanjing211111 China
The task of constructing infinite families of self-dual codes with unbounded lengths and minimum distances exhibiting square-root lower bounds is extremely challenging, especially when it comes to cyclic codes. Recent...
来源: 评论
Few-Shot Camouflaged Object Segmentation
Few-Shot Camouflaged Object Segmentation
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Ziqiu Wang Yuying Li Yang Yang Yamin Li Gaoyang Liu Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China School of Computer Science and Information Engineering Hubei University Wuhan China Huazhong University of Science and Technology Wuhan China
In the domain of computer vision, Camouflaged Object Segmentation (COS) is a crucial task aimed at identifying objects that blend into their surroundings, with applications spanning diverse sectors such as military, m... 详细信息
来源: 评论