咨询与建议

限定检索结果

文献类型

  • 207 篇 期刊文献
  • 88 篇 会议

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 203 篇 工学
    • 140 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 70 篇 电气工程
    • 49 篇 信息与通信工程
    • 28 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 17 篇 光学工程
    • 17 篇 生物医学工程(可授...
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
    • 8 篇 建筑学
    • 8 篇 交通运输工程
    • 7 篇 网络空间安全
    • 6 篇 土木工程
    • 5 篇 仪器科学与技术
    • 5 篇 环境科学与工程(可...
  • 96 篇 理学
    • 52 篇 数学
    • 29 篇 物理学
    • 21 篇 统计学(可授理学、...
    • 16 篇 生物学
    • 6 篇 系统科学
  • 55 篇 管理学
    • 30 篇 管理科学与工程(可...
    • 28 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 12 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 公共卫生与预防医...
  • 10 篇 法学
    • 7 篇 社会学
  • 3 篇 经济学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 speech processin...
  • 11 篇 federated learni...
  • 9 篇 deep learning
  • 9 篇 signal processin...
  • 7 篇 graph neural net...
  • 7 篇 feature extracti...
  • 6 篇 optimization
  • 6 篇 contrastive lear...
  • 6 篇 correlation
  • 6 篇 forecasting
  • 6 篇 privacy
  • 6 篇 training
  • 5 篇 data privacy
  • 5 篇 magnetic resonan...
  • 5 篇 topological insu...
  • 5 篇 computational mo...
  • 5 篇 topology
  • 5 篇 granular computi...
  • 5 篇 accuracy

机构

  • 14 篇 department of ph...
  • 13 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 10 篇 huazhong univers...
  • 10 篇 engineering rese...
  • 10 篇 key laboratory o...
  • 10 篇 school of comput...
  • 8 篇 college of compu...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 6 篇 northeastern uni...
  • 6 篇 state key labora...
  • 6 篇 school of comput...
  • 5 篇 college of cyber...
  • 5 篇 school of comput...
  • 5 篇 key laboratory o...

作者

  • 17 篇 yang yang
  • 13 篇 wang guoyin
  • 11 篇 fu chong
  • 9 篇 liu jun
  • 8 篇 xia shuyin
  • 7 篇 xiao bin
  • 7 篇 bin zhou
  • 7 篇 feng gao
  • 6 篇 zou juan
  • 6 篇 luo minnan
  • 6 篇 zhou bin
  • 6 篇 xiaohong guan
  • 6 篇 li weisheng
  • 6 篇 gaoyang liu
  • 6 篇 rui chen
  • 6 篇 wang chen
  • 5 篇 wang xingwei
  • 5 篇 qiao xiaoyu
  • 5 篇 zheng-rong liu
  • 5 篇 sham chiu-wing

语言

  • 262 篇 英文
  • 28 篇 其他
  • 3 篇 中文
检索条件"机构=Key Laboratory of Data and Intelligent System Security Ministry of Education"
295 条 记 录,以下是51-60 订阅
排序:
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on Adaptive Perturbation on Federated Graph Learning  34
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on ...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Li, Ken Shi, Bin Wei, Jiazhe Dong, Bo School of Computer Science and Technology Xi’an Jiaotong University Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an China School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China School of Distance Education Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China
Federated Graph Learning (FedGL) is an emerging Federated Learning (FL) framework that learns the graph data from various clients to train better Graph Neural Networks(GNNs) model. Owing to concerns regarding the secu... 详细信息
来源: 评论
A Provably Secure Certificateless Signature Scheme With Anonymity for Healthcare IIoT
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Qiao, Zirui Xu, Ran Zhou, Yanwei Yang, Bo Zhu, Tianqing Zhang, Mingwu Xi’an University of Posts and Telecommunications School of Cyberspace Security Xi’an China Ministry of Education Key Laboratory of Data Protection and Intelligent Management China Shaanxi Normal University School of Computer Science Xi’an China City University of Macau Faculty of Data Science Macau China Hubei University of Technology School of Computer Wuhan China
The industrial Internet of Things (IIoT) is changing our way of life and work. As the number of mobile devices connected to IIoT increases, users will face many security challenges such as insecure communication envir... 详细信息
来源: 评论
Bidirectional Identity-Based Inner-Product Functional Re-Encryption in Vaccine data Sharing
收藏 引用
IEEE Transactions on Cloud Computing 2025年
作者: Wang, Jing Zhou, Yanwei Zhu, Yasi Liu, Zhiquan Yang, Bo Zhang, Mingwu Shaanxi Normal University School of Computer Science Xi'an710119 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education China Jinan University College of Cyber Security Guangzhou510632 China Hubei University of Technology School of Computer Wuhan430068 China
With the development of cloud computing, more and more data is stored in cloud servers, which leads to an increasing degree of privacy of data stored in cloud servers. For example, in the critical domain of medical va... 详细信息
来源: 评论
CoGAP: A Personalized Federated Learning Method Using Collaborative Optimization for Medical Image Classification
CoGAP: A Personalized Federated Learning Method Using Collab...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Shenhai Zheng Congyu Li Sian Wen Xi Gao Lei Yu College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China Emergency Department The Second Affiliated Hospital of Chongqing Medical University Chongqing China
Federated learning (FL) has been widely used in medical image processing to protect data privacy, but it has issues with data heterogeneity. Personalized federated learning have emerged to tackle these issues but ofte... 详细信息
来源: 评论
Joint Secure and Covert Communications for Active STAR-RIS Assisted ISAC systems
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Guo, Liang Jia, Jie Mu, Xidong Liu, Yuanwei Chen, Jian Wang, Xingwei Northeastern University School of Computer Science and Engineering China Northeastern University Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China BelfastBT3 9DT United Kingdom Department of Electrical and Electronic Engineering China
This paper investigates the design of jointly supporting physical layer security (PLS) and covert communications (CCs) in an active simultaneously transmitting and reflecting reconfigurable intelligent surface (a-STAR... 详细信息
来源: 评论
SOT-MRAM-based true in-memory computing architecture for approximate multiplication
收藏 引用
Chip 2025年 第2期4卷
作者: Song, Min Tang, Qilong Ouyang, Xintong Duan, Wei Xu, Yan Zhang, Shuai You, Long Key Laboratory of Intelligent Sensing System and Security of the Ministry of Education Hubei Key Laboratory of Micro-Nanoelectronic Materials and Devices School of Microelectronics Hubei University Wuhan 430062 China School of Integrated Circuits Huazhong University of Science and Technology Wuhan 430074 China
The in-memory computing (IMC) paradigm emerges as an effective solution to break the bottlenecks of conventional von Neumann architecture. In the current work, an approximate multiplier in spin-orbit torque magnetores... 详细信息
来源: 评论
Improvement of the square-root low bounds on the minimum distances of BCH codes and Matrix-product codes
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Xiaoqiang Li, Liuyi Wu, Yansheng Zheng, Dabin Lu, Shuxian Hubei Key Laboratory of Applied Mathematics Key Laboratory of Intelligent Sensing System and Security Ministry of Education Faculty of Mathematics and Statistics Hubei University Wuhan430062 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China National Mobile Communications Research Laboratory Southeast University Nanjing211111 China
The task of constructing infinite families of self-dual codes with unbounded lengths and minimum distances exhibiting square-root lower bounds is extremely challenging, especially when it comes to cyclic codes. Recent...
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
Modulation of Asymmetric Magnetic Domain-Wall Motion via Noncolinear Interlayer Exchange Coupling
收藏 引用
IEEE Transactions on Magnetics 2025年 第5期61卷
作者: Zhou, Xiangqing Chen, Shiwei Wu, Chuangwen Li, Peizhi Meng, Dequan Tomasello, Riccardo Finocchio, Giovanni Liang, Shiheng Hubei University Key Laboratory for Intelligent Sensing System and Security of Ministry of Education School of Physics Wuhan430062 China Politecnico di Bari Department of Electrical and Information Engineering Bari70125 Italy University of Messina Department of Mathematical and Computer Sciences Physical Sciences and Earth Sciences Messina98166 Italy
The search of scalable approach to design field-free deterministic switching is currently a key challenge. Here, we investigate current and magnetic driven magnetization switching in a T-type magnetic heterojunction w... 详细信息
来源: 评论
Cramér-Rao Bound Minimization for a Passive Sensing Multi-ISAC system
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Chen, Jian Chen, Qikai Deng, Yansha Jia, Jie Yin, Baoxin Wang, Xingwei Northeastern University School of Computer Science and Engineering Shenyang110819 China Northeastern University Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China King's College London LondonWC2R 2LS United Kingdom
The integrated sensing and communication (ISAC) system can simultaneously provide communication and radar sensing, effectively improving spectrum utilization. However, existing research mainly focuses on the mono-stat... 详细信息
来源: 评论