咨询与建议

限定检索结果

文献类型

  • 207 篇 期刊文献
  • 88 篇 会议

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 203 篇 工学
    • 140 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 70 篇 电气工程
    • 49 篇 信息与通信工程
    • 28 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 17 篇 光学工程
    • 17 篇 生物医学工程(可授...
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
    • 8 篇 建筑学
    • 8 篇 交通运输工程
    • 7 篇 网络空间安全
    • 6 篇 土木工程
    • 5 篇 仪器科学与技术
    • 5 篇 环境科学与工程(可...
  • 96 篇 理学
    • 52 篇 数学
    • 29 篇 物理学
    • 21 篇 统计学(可授理学、...
    • 16 篇 生物学
    • 6 篇 系统科学
  • 55 篇 管理学
    • 30 篇 管理科学与工程(可...
    • 28 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 12 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 公共卫生与预防医...
  • 10 篇 法学
    • 7 篇 社会学
  • 3 篇 经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 speech processin...
  • 11 篇 federated learni...
  • 9 篇 deep learning
  • 9 篇 signal processin...
  • 7 篇 graph neural net...
  • 7 篇 feature extracti...
  • 6 篇 optimization
  • 6 篇 contrastive lear...
  • 6 篇 correlation
  • 6 篇 forecasting
  • 6 篇 privacy
  • 6 篇 training
  • 5 篇 data privacy
  • 5 篇 magnetic resonan...
  • 5 篇 topological insu...
  • 5 篇 computational mo...
  • 5 篇 topology
  • 5 篇 granular computi...
  • 5 篇 accuracy

机构

  • 14 篇 department of ph...
  • 13 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 10 篇 huazhong univers...
  • 10 篇 engineering rese...
  • 10 篇 key laboratory o...
  • 10 篇 school of comput...
  • 8 篇 college of compu...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 6 篇 northeastern uni...
  • 6 篇 state key labora...
  • 6 篇 school of comput...
  • 5 篇 college of cyber...
  • 5 篇 school of comput...
  • 5 篇 key laboratory o...

作者

  • 17 篇 yang yang
  • 13 篇 wang guoyin
  • 11 篇 fu chong
  • 9 篇 liu jun
  • 8 篇 xia shuyin
  • 7 篇 xiao bin
  • 7 篇 bin zhou
  • 7 篇 feng gao
  • 6 篇 zou juan
  • 6 篇 luo minnan
  • 6 篇 zhou bin
  • 6 篇 xiaohong guan
  • 6 篇 li weisheng
  • 6 篇 gaoyang liu
  • 6 篇 rui chen
  • 6 篇 wang chen
  • 5 篇 wang xingwei
  • 5 篇 qiao xiaoyu
  • 5 篇 zheng-rong liu
  • 5 篇 sham chiu-wing

语言

  • 262 篇 英文
  • 28 篇 其他
  • 3 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security Ministry of Education"
295 条 记 录,以下是11-20 订阅
排序:
Generating Is Believing: Membership Inference Attacks against Retrieval-Augmented Generation
Generating Is Believing: Membership Inference Attacks agains...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Yuying Liu, Gaoyang Wang, Chen Yang, Yang Key Laboratory of Intelligent Sensing System and Security Ministry of Education School of Artificial Intelligence Hubei University Wuhan China Hubei Key Laboratory of Smart Internet Technology Huazhong University of Science and Technology Wuhan China
Retrieval-Augmented Generation (RAG) is a state-of-the-art technique that mitigates issues such as hallucinations and knowledge staleness in Large Language Models (LLMs) by retrieving relevant knowledge from an extern... 详细信息
来源: 评论
Enhancing graph representation learning via type-aware decoupling and node influence allocation
收藏 引用
Applied Intelligence 2025年 第6期55卷 1-14页
作者: Zhu, Guochang Hu, Jun Liu, Li Zhang, Qinghua Wang, Guoyin School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongwen Road Chongqing Chongqing400065 China Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongwen Road Chongqing Chongqing400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing400065 China
The traditional graph representation methods can fit the information of graph with low-dimensional vectors, but they cannot interpret their composition, resulting in insufficient security. Graph decoupling, as a metho... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge Computing
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Ming Northeastern University School of Computer Science and Engineering Engineering Research Center of Security Technology of Complex Network System Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University School of Computer Science and Engineering Shenyang110819 China
Mobile edge computing (MEC) integrated with Network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual Network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
Differential-Linear Attacks on Ballet Block Cipher
收藏 引用
密码学报(中英文) 2025年 第2期12卷 469-488页
作者: ZHOU Yu CHEN Si-Wei XU Sheng-Yuan XIANG Ze-Jun ZENG Xiang-Yong Key Laboratory of Intelligent Sensing System and Security Ministry of EducationSchool of Cyber Security and TechnologyHubei UniversityWuhan 430062China Department of Fundamental Courses Shandong University of Science and TechnologyTaian 271000China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and StatisticsHubei UniversityWuhan 430062China
Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design *** study aims to conduct a comprehensive security evaluation of Ballet from the perspective of differenti... 详细信息
来源: 评论
Improved quantum image weighted average filtering algorithm
收藏 引用
Quantum Information Processing 2025年 第5期24卷 1-24页
作者: Yuan, Suzhen Li, Xianli Yinxia, Shu Qing, Xianrong Deng, Jermiah D. College of Opto Electronic Engineering Chongqing University of Posts and Telecommunications Chongqing Chongqing400065 China School of Computing University of Otago Dunedin Dunedin9054 New Zealand School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing Chongqing400065 China Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing Chongqing400065 China
Average filtering plays a vital role in image smoothing tasks. However, existing quantum image weighted average filtering methods suffer from high circuit complexity. Therefore, this paper proposes an improved quantum... 详细信息
来源: 评论
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Hao, Yijun Yang, Shusen Li, Fang Zhang, Yifan Zhao, Cong Ren, Xuebin Zhao, Peng Xu, Chenren Wang, Shibo Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Xi’an710049 China Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an710049 China Peking University School of Computer Science Beijing100871 China The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University Xi'an710049 China
Network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
Federated Hybrid-Supervised Learning for Universal Medical Image Segmentation
Federated Hybrid-Supervised Learning for Universal Medical I...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zheng, Shenhai Wen, Sian Li, Congyu Chen, Qing Li, Laquan College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China School of Science Chongqing University of Posts and Telecommunications Chongqing China
Federated Learning (FL) is an advanced technology that tackles the challenge of blocked data arising from privacy concerns, enabling the training of deep learning models without the need for data sharing. However, FL ... 详细信息
来源: 评论
Five-dimensional Floquet topological semimetals with emergent Yang monopoles and linked Weyl surfaces
收藏 引用
Physical Review B 2025年 第4期111卷 045302-045302页
作者: Zheng-Rong Liu Rui Chen Bin Zhou Department of Physics Hubei University Wuhan 430062 China Key Laboratory of Intelligent Sensing System and Security of Ministry of Education Hubei University Wuhan 430062 China
Recently, Floquet topological matter has attracted significant attention for its potential to reveal novel topological phases inaccessible in static systems. In this paper, we investigate the effect of a time-periodic... 详细信息
来源: 评论
POINTERGUESS: targeted password guessing model using pointer mechanism  24
POINTERGUESS: targeted password guessing model using pointer...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Kedong Xiu Ding Wang College of Cyber Science Nankai University Tianjin China and Key Laboratory of Data and Intelligent System Security (NKU) Ministry of Education Tianjin China and Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
Most existing targeted password guessing models view users' reuse behaviors as sequences of edit operations (e.g., insert and delete) performed on old passwords. These atomic edit operations are limited to modifyi...
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guoliang Li Ruiqi Zhang Zhe Sun Lingkai Xing Yu Zhang College of Cyber Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China College of Computer Science Nankai University China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论