咨询与建议

限定检索结果

文献类型

  • 193 篇 期刊文献
  • 88 篇 会议

馆藏范围

  • 281 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 188 篇 工学
    • 132 篇 计算机科学与技术...
    • 113 篇 软件工程
    • 58 篇 电气工程
    • 43 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 16 篇 生物医学工程(可授...
    • 14 篇 光学工程
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
    • 7 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 交通运输工程
    • 5 篇 环境科学与工程(可...
    • 4 篇 仪器科学与技术
    • 4 篇 网络空间安全
  • 91 篇 理学
    • 49 篇 数学
    • 28 篇 物理学
    • 20 篇 统计学(可授理学、...
    • 16 篇 生物学
    • 6 篇 系统科学
  • 51 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 26 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 12 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 公共卫生与预防医...
  • 8 篇 法学
    • 6 篇 社会学
  • 3 篇 经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 speech processin...
  • 11 篇 federated learni...
  • 9 篇 signal processin...
  • 7 篇 deep learning
  • 7 篇 graph neural net...
  • 7 篇 feature extracti...
  • 6 篇 optimization
  • 6 篇 contrastive lear...
  • 6 篇 correlation
  • 6 篇 forecasting
  • 6 篇 privacy
  • 5 篇 data privacy
  • 5 篇 topological insu...
  • 5 篇 topology
  • 5 篇 accuracy
  • 5 篇 training
  • 4 篇 object detection
  • 4 篇 compressed sensi...
  • 4 篇 magnetic resonan...

机构

  • 14 篇 department of ph...
  • 14 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 10 篇 huazhong univers...
  • 10 篇 engineering rese...
  • 10 篇 key laboratory o...
  • 10 篇 school of comput...
  • 8 篇 college of compu...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 8 篇 key laboratory o...
  • 6 篇 northeastern uni...
  • 6 篇 state key labora...
  • 6 篇 school of comput...
  • 5 篇 college of cyber...
  • 5 篇 school of comput...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...

作者

  • 17 篇 yang yang
  • 12 篇 wang guoyin
  • 11 篇 fu chong
  • 9 篇 liu jun
  • 8 篇 xia shuyin
  • 7 篇 xiao bin
  • 7 篇 feng gao
  • 6 篇 zou juan
  • 6 篇 zhou bin
  • 6 篇 xiaohong guan
  • 6 篇 li weisheng
  • 6 篇 gaoyang liu
  • 6 篇 wang chen
  • 5 篇 wang xingwei
  • 5 篇 qiao xiaoyu
  • 5 篇 luo minnan
  • 5 篇 sham chiu-wing
  • 5 篇 zhou pan
  • 5 篇 zeng cheng
  • 5 篇 ren xuebin

语言

  • 248 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security Ministry of Education"
281 条 记 录,以下是181-190 订阅
排序:
Provably Secure Efficient key-Exchange Protocol for intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Efficient Adaptive Label Refinement for Label Noise Learning
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Wenzhen Cheng, Debo Lu, Guangquan Zhou, Bo Li, Jiaye Zhang, Shichao School of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guangxi Guilin541004 China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Guilin541004 China UniSA STEM University of South Australia AdelaideSA5095 Australia Guangxi Collaborative Innovation Center of Modern Sericulture and Silk Hechi University Guangxi Hechi546300 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou310027 China
Deep neural networks are highly susceptible to overfitting noisy labels, which leads to degraded performance. Existing methods address this issue by employing manually defined criteria, aiming to achieve optimal parti... 详细信息
来源: 评论
A Virtual Network Mapping Method Based on Compound Particle Swarm Optimization
A Virtual Network Mapping Method Based on Compound Particle ...
收藏 引用
Cyber security and Information Engineering (ICCSIE), International Conference on
作者: Jianhua Huang Yunlong Tang Yongjun Wei Huan Wang Haifeng Zhang Bing Zhang Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Guangxi Education System Network Security Monitoring Center School of Computer Science and Technology (School of Software) Guangxi University of Science and Technology Liuzhou China Liuzhou Railway Vocational Technical College Liuzhou China
Aiming at problems of low credibility of results and low accuracy of the scheme in the mapping process of virtual networks. It is suggested to use a composite particle swarm optimization approach for virtual network m... 详细信息
来源: 评论
Distributed privacy-preserving keyword querying for integrated data in IoT networks via function secret sharing
收藏 引用
Information Fusion 2025年 123卷
作者: Shao, Wei Wang, Lianhai Jia, Chunfu Wang, Qizheng Wang, Jinpeng Xu, Shujiang Zhang, Shuhui Li, Mingyue Shandong Jinan250014 China Key Laboratory of Data and Intelligent System Security Ministry of Education Nankai University Tianjin300350 China School of Cyber Sciences Hebei University Hebei Baoding China
The growing adoption of IoT applications underscores the need for advanced data fusion and information acquisition techniques, driving demand for secure, privacy-preserving querying of integrated IoT data. Existing sc... 详细信息
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qing Liu Qian Gao Jun Fan Zhiqiang Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China China Telecom Digital Intelligence Techonology Co Ltd Jinan China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
Disentangled Noisy Correspondence Learning
arXiv
收藏 引用
arXiv 2024年
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong The School of Computer Science and Technology The Ministry of Education Key Laboratory of Intelligent Networks and Network Security The Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Shaanxi Xi'An710049 China SGIT AI Lab State Grid Shaanxi Electric Power Company Limited State Grid Corporation of China Shaanxi China The School of Information Science and Technology University of Science and Technology China United Arab Emirates The Baidu Inc China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
MMAGL: Multiobjective Multiview Attributed Graph Learning for Joint Clustering of Hyperspectral and LiDAR data
收藏 引用
IEEE Transactions on Geoscience and Remote Sensing 2025年 63卷
作者: Zhang, Zijia Cai, Yaoming Gong, Wenyin Liu, Xiaobo Zeng, Cheng Yu, Gan Hubei University School of Artificial Intelligence Wuhan430078 China Hubei University Key Laboratory of Intelligent Sensing System and Security Ministry of Education Wuhan430078 China Zhongnan University of Economics and Law School of Information Engineering Wuhan430073 China China University of Geosciences School of Computer Science Wuhan430074 China China University of Geosciences School of Automation Wuhan430074 China Fuyang Normal University College of Information Engineering Fuyang236037 China
The joint clustering of multimodal remote sensing (RS) data represents a multiobjective optimization challenge involving conflicting modality-specific objectives and diverse regularization objectives. Current approach... 详细信息
来源: 评论
Prototype Implementation and Experimental Evaluation for LoRa-Backscatter Communication systems with RF Energy Harvesting and Low Power Management
收藏 引用
IEEE Transactions on Communications 2024年
作者: Tang, Xiaoqing Liu, Xin Xie, Guihui Cui, Yongqiang Li, Dong Hubei University School of Artificial Intelligence Wuhan China Ministry of Education Key Laboratory of Intelligent Sensing System and Security Hubei University Wuhan China Wuhan Qingchuan University Institute of Electronic Information Wuhan China School of Automation Wuhan China South-Central Minzu University College of Electronics and Information Engineering Wuhan China Macau University of Science and Technology School of Computer Science and Engineering Avenida Wai Long Taipa Macau China
Battery free Internet of Things (BF IoT), which is realized by harvesting ambient energy to power the IoT devices, has many advantages such as low power, low cost, free-maintenance, easy deployment, and environmental ... 详细信息
来源: 评论
Generating Action-conditioned Prompts for Open-vocabulary Video Action Recognition  24
Generating Action-conditioned Prompts for Open-vocabulary Vi...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Jia, Chengyou Luo, Minnan Chang, Xiaojun Dang, Zhuohang Han, Mingfei Wang, Mengmeng Dai, Guang Dang, Sizhe Wang, Jingdong School of Computer Science and Technology MOEKLINNS Lab Xi'an Jiaotong University Shaanxi Xi'an China University of Science and Technology of China Anhui Hefei China School of Computer Science and Technology Xi'an Jiaotong University Shaanxi Xi'an China ReLER Lab AAII University of Technology Sydney SydneyNSW Australia Zhejiang University of Technology College of Computer Science and Technology China SGIT AI Lab State Grid Corporation of China Beijing China Baidu Inc Beijing China United Arab Emirates Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi'an710049 China SGIT AI Lab State Grid Corporation of China China School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China
Exploring open-vocabulary video action recognition is a promising venture, which aims to recognize previously unseen actions within any arbitrary set of categories. Existing methods typically adapt pretrained image-te... 详细信息
来源: 评论
Generative AI-driven Cross-layer Covert Communication: Fundamentals, Framework and Case Study
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Tianhao Liu, Jiqiang Zhang, Tao Wang, Jian Wang, Jiacheng Kang, Jiawen Niyato, Dusit Mao, Shiwen School of Cyberspace Science and Technology Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing100045 China School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore School of Automation Guangdong University of Technology Key Laboratory of Intelligent Information Processing and System Integration of IoT Ministry of Education Guangzhou510006 China Guangdong-HongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangzhou510006 China Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States
Ensuring end-to-end cross-layer communication security in military networks by selecting covert schemes between nodes is a key solution for military communication security. With the development of communication techno... 详细信息
来源: 评论