咨询与建议

限定检索结果

文献类型

  • 189 篇 期刊文献
  • 88 篇 会议

馆藏范围

  • 277 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 186 篇 工学
    • 130 篇 计算机科学与技术...
    • 113 篇 软件工程
    • 58 篇 电气工程
    • 43 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 16 篇 生物医学工程(可授...
    • 14 篇 光学工程
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
    • 7 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 交通运输工程
    • 5 篇 环境科学与工程(可...
    • 4 篇 仪器科学与技术
    • 4 篇 网络空间安全
  • 90 篇 理学
    • 49 篇 数学
    • 27 篇 物理学
    • 20 篇 统计学(可授理学、...
    • 16 篇 生物学
    • 6 篇 系统科学
  • 51 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 26 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 12 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 公共卫生与预防医...
  • 8 篇 法学
    • 6 篇 社会学
  • 3 篇 经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 speech processin...
  • 11 篇 federated learni...
  • 9 篇 signal processin...
  • 7 篇 deep learning
  • 7 篇 graph neural net...
  • 7 篇 feature extracti...
  • 6 篇 optimization
  • 6 篇 contrastive lear...
  • 6 篇 correlation
  • 6 篇 forecasting
  • 6 篇 privacy
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 accuracy
  • 5 篇 training
  • 4 篇 object detection
  • 4 篇 compressed sensi...
  • 4 篇 data privacy
  • 4 篇 magnetic resonan...

机构

  • 14 篇 department of ph...
  • 13 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 10 篇 huazhong univers...
  • 10 篇 engineering rese...
  • 10 篇 key laboratory o...
  • 10 篇 school of comput...
  • 8 篇 college of compu...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 8 篇 key laboratory o...
  • 6 篇 northeastern uni...
  • 6 篇 state key labora...
  • 6 篇 school of comput...
  • 5 篇 college of cyber...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 5 篇 school of comput...

作者

  • 17 篇 yang yang
  • 12 篇 wang guoyin
  • 11 篇 fu chong
  • 9 篇 liu jun
  • 8 篇 xia shuyin
  • 7 篇 xiao bin
  • 7 篇 feng gao
  • 6 篇 zou juan
  • 6 篇 zhou bin
  • 6 篇 xiaohong guan
  • 6 篇 li weisheng
  • 6 篇 gaoyang liu
  • 6 篇 wang chen
  • 5 篇 wang xingwei
  • 5 篇 qiao xiaoyu
  • 5 篇 luo minnan
  • 5 篇 sham chiu-wing
  • 5 篇 zhou pan
  • 5 篇 zeng cheng
  • 5 篇 ren xuebin

语言

  • 244 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security Ministry of Education"
277 条 记 录,以下是151-160 订阅
排序:
Disorder-enhanced layer Hall effect in a magnetic sandwich heterostructure
收藏 引用
Physical Review B 2024年 第11期109卷 115301-115301页
作者: Xiao-Xia Yi Chun-Bo Hua Rui Chen Bin Zhou Department of Physics Hubei University Wuhan 430062 China School of Electronic and Information Engineering Hubei University of Science and Technology Xianning 437100 China Key Laboratory of Intelligent Sensing System and Security of Ministry of Education Hubei University Wuhan 430062 China
The layer Hall effect is a type of Hall effect where electrons on the top and bottom layers deflect in opposite directions. In this paper, we investigate the disorder effects on the layer Hall effect in a magnetic san... 详细信息
来源: 评论
V3H: View Variation and View Heredity for Incomplete Multiview Clustering
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2020年 第3期1卷 233-247页
作者: Fang, Xiang Hu, Yuchong Zhou, Pan Wu, Dapeng Oliver The School of Computer Science and Technology Key Laboratory of Information Storage System Ministry of Education of China Huazhong University of Science and Technology Wuhan 430074 China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan 430074 China The Department of Electrical and Computer Engineering University of Florida Gainesville 32611 FL United States
Real data often appear in the form of multiple incomplete views. Incomplete multiview clustering is an effective method to integrate these incomplete views. Previous methods only learn the consistent information betwe... 详细信息
来源: 评论
Self-power generation scheduling model under uncertainty in Energy Intensive Enterprises
Self-power generation scheduling model under uncertainty in ...
收藏 引用
Chinese Control Conference (CCC)
作者: Liu Kun Feng Gao Zhaojie Wang Haifeng Zhang Xiaohong Guan Qiaozhu Zhai Jiang Wu State Key Laboratory for Manufacturing System Engineering Xi'an Jiaotong University Xian China State Key Laboratory for Manufacturing System Engineering Xi'an Jiaotong University 710049 China Ministry of Education Key Lab For Intelligent Networks and Networks Security Xi'an 710049 China
Scheduling of the self-generation plants is very helpful to both the energy saving and emission reduction for Energy Intensive Enterprises. Uncertainty exists, so how to reduce the cost considering the uncertainty is ... 详细信息
来源: 评论
Load identification based on Factorial Hidden Markov Model and online performance analysis
Load identification based on Factorial Hidden Markov Model a...
收藏 引用
IEEE International Conference on Automation Science and Engineering (CASE)
作者: Siyun Chen Feng Gao Ting Liu State Key Laboratory for Manufacturing System Engineering Xi'an Jiaotong University Xi'an China Ting Liu is with Ministry of Education Key Lab for Intelligent Networks and Networks Security Xi'an Jiaotong University China
Load identification is important for the tasks such as load forecasting, demand response and energy management in smart buildings. The accuracy of the traditional methods depends on the dimension of load signatures, t... 详细信息
来源: 评论
RKSeg+: make full use of Runge–Kutta methods in medical image segmentation
收藏 引用
Multimedia systems 2024年 第2期30卷 65-65页
作者: Zhu, Mai Fu, Chong Wang, Xingwei School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang110819 China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China
The dynamical system perspective has been used to build efficient image classification networks and semantic segmentation networks. Furthermore, the Runge–Kutta (RK) methods are powerful tools for building networks f... 详细信息
来源: 评论
Deep Feature Surgery: Towards Accurate and Efficient Multi-Exit Networks
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Cheng Chen, Yao Luo, Qiuyang Lu, Ye Li, Tao Zhang, Yuzhi Sun, Yufei Zhang, Le College of Software Nankai University China College of Computer Science Nankai University China National University of Singapore Singapore School of Information and Communication Engineering University of Electronic Science and Technology of China China HAIHE Lab of ITAI China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education
Multi-exit network is a promising architecture for efficient model inference by sharing backbone networks and weights among multiple exits. However, the gradient conflict of the shared weights results in sub-optimal a... 详细信息
来源: 评论
Distributed optimization strategy for multi-region power scheduling based on alternating direction method of multipliers
Distributed optimization strategy for multi-region power sch...
收藏 引用
World Congress on intelligent Control and Automation (WCICA)
作者: Chenlin Sun Jiang Wu Feng Gao Xiaohong Guan State Key Laboratory for Manufacturing System Engineering of Xi'an Jiaotong University Xi'an China Ministry of Education Key Lab for Intelligent Networks and Networks Security of Xi'an Jiaotong University Xi'an China Key Laboratory for Manufacturing System Engineering of Xi'an Jiaotong University Xi'an China
The large-scale and frequent cross-regional electricity allocations bring about the critical need to coordinate multi-region power scheduling. It is recognized that each sub-systems' taking charge of own schedulin... 详细信息
来源: 评论
LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection
arXiv
收藏 引用
arXiv 2024年
作者: Cai, Xiangrui Wang, Yang Xu, Sihan Li, Hao Zhang, Ying Liu, Zheli Yuan, Xiaojie the Key Laboratory of Data and Intelligent System Security Ministry of Education China the College of Cyber Science Nankai University Tianjin300350 China College of Computer Science Nankai University Tianjin300350 China Science and Technology on Communication Networks Laboratory Shijiazhuang050081 China
Enterprises and organizations are faced with potential threats from insider employees that may lead to serious consequences. Previous studies on insider threat detection (ITD) mainly focus on detecting abnormal users ... 详细信息
来源: 评论
A rich ranking model based on the matthew effect optimization  7th
A rich ranking model based on the matthew effect optimizatio...
收藏 引用
7th International Conference on Computational data and Social Networks, CSoNet 2018
作者: Li, Jinzhong Liu, Guanjun Department of Computer Science and Technology College of Electronic and Information Engineering Jinggangshan University Ji’an343009 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu610054 China Department of Computer Science and Technology College of Electronic and Information Engineering Tongji University Shanghai201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China
Most existing approaches of learning to rank treat the effectiveness of each query equally which results in a relatively lower ratio of queries with high effectiveness (i.e. rich queries) in the produced ranking model... 详细信息
来源: 评论
Learning Counterfactual Explanation of Graph Neural Networks Via Generative Flow Network
SSRN
收藏 引用
SSRN 2023年
作者: He, Kangjia Liu, Li Zhang, Youmin Wang, Ye Liu, Qun Wang, Guoyin School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China Chongqing Key Laboratory of Computational Intelligence Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China
Counterfactual subgraphs explain Graph Neural Networks (GNNs) by answering the question: "How would the prediction change if a certain subgraph were absent in the input instance?" The differentiable proxy ad... 详细信息
来源: 评论