咨询与建议

限定检索结果

文献类型

  • 644 篇 会议
  • 575 篇 期刊文献

馆藏范围

  • 1,219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 776 篇 工学
    • 588 篇 计算机科学与技术...
    • 461 篇 软件工程
    • 171 篇 信息与通信工程
    • 111 篇 电气工程
    • 94 篇 控制科学与工程
    • 91 篇 生物工程
    • 55 篇 电子科学与技术(可...
    • 49 篇 光学工程
    • 45 篇 网络空间安全
    • 38 篇 生物医学工程(可授...
    • 37 篇 化学工程与技术
    • 35 篇 机械工程
    • 35 篇 安全科学与工程
    • 26 篇 建筑学
    • 26 篇 交通运输工程
    • 23 篇 动力工程及工程热...
    • 22 篇 仪器科学与技术
    • 22 篇 土木工程
  • 364 篇 理学
    • 179 篇 数学
    • 109 篇 生物学
    • 86 篇 物理学
    • 61 篇 统计学(可授理学、...
    • 39 篇 化学
    • 22 篇 系统科学
  • 174 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 75 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 60 篇 法学
    • 45 篇 社会学
  • 47 篇 医学
    • 42 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 20 篇 经济学
  • 20 篇 农学
  • 4 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 47 篇 feature extracti...
  • 44 篇 semantics
  • 32 篇 deep learning
  • 32 篇 computational mo...
  • 30 篇 accuracy
  • 29 篇 machine learning
  • 29 篇 training
  • 26 篇 privacy
  • 25 篇 federated learni...
  • 24 篇 blockchain
  • 23 篇 security
  • 22 篇 neural networks
  • 21 篇 data privacy
  • 20 篇 internet of thin...
  • 19 篇 cloud computing
  • 19 篇 data models
  • 17 篇 graph neural net...
  • 16 篇 object detection
  • 16 篇 convolution
  • 16 篇 contrastive lear...

机构

  • 128 篇 state key labora...
  • 95 篇 state key labora...
  • 60 篇 hubei key labora...
  • 56 篇 shandong provinc...
  • 53 篇 school of cyber ...
  • 52 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 40 篇 school of comput...
  • 38 篇 college of compu...
  • 32 篇 guizhou provinci...
  • 30 篇 national enginee...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 20 篇 guizhou universi...
  • 19 篇 school of cyber ...
  • 19 篇 college of compu...

作者

  • 38 篇 tian youliang
  • 37 篇 chen yuling
  • 31 篇 yuling chen
  • 31 篇 youliang tian
  • 28 篇 jin hai
  • 22 篇 hu shengshan
  • 21 篇 zhou pan
  • 19 篇 hai jin
  • 18 篇 peng changgen
  • 17 篇 zhang leo yu
  • 17 篇 li shaobo
  • 16 篇 qin yongbin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 15 篇 xiong jinbo
  • 14 篇 shaobo li
  • 13 篇 tan weijie
  • 13 篇 tao li

语言

  • 1,090 篇 英文
  • 114 篇 其他
  • 16 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Public Big Data Security Technology"
1219 条 记 录,以下是1-10 订阅
排序:
An Improved Northern Goshawk Optimization Algorithm for Feature Selection
收藏 引用
Journal of Bionic Engineering 2024年 第4期21卷 2034-2072页
作者: Rongxiang Xie Shaobo Li Fengbin Wu State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China State Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China
Feature Selection(FS)is an important data management technique that aims to minimize redundant information in a *** work proposes DENGO,an improved version of the Northern Goshawk Optimization(NGO),to address the FS *... 详细信息
来源: 评论
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 157-175页
作者: Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of EducationChongqing400065China Artificial Intelligence and Big Data College Chongqing Polytechnic University of Electronic TechnologyChongqing401331China
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou 350117China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye... 详细信息
来源: 评论
CSNet:A Count-Supervised Network via Multiscale MLP-Mixer for Wheat Ear Counting
收藏 引用
植物表型组学(英文) 2024年 第4期6卷 995-1009页
作者: Yaoxi Li Xingcai Wu Qi Wang Zhixun Pei Kejun Zhao Panfeng Chen Gefei Hao State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China National Key Laboratory of Green Pesticide Key Laboratory of Green Pesticide and Agricultural BioengineeringMinistry of EducationGuiyang 550025China
Wheat is the most widely grown crop in the world,and its yield is closely related to global food *** number of ears is important for wheat breeding and yield ***,automated wheat ear counting techniques are essential f... 详细信息
来源: 评论
Physics-Constrained Robustness Enhancement for Tree Ensembles Applied in Smart Grid
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3001-3019页
作者: Zhibo Yang Xiaohan Huang Bingdong Wang Bin Hu Zhenyong Zhang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China
With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and ***... 详细信息
来源: 评论
Einocchio: Efficiently Outsourcing Polynomial Computation with Verifiable Computation and Optimized Newton Interpolation
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 1981-1992页
作者: Pei, Xintao Chen, Yuling Long, Yangyang Sang, Haiwei Luo, Yun Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China
Cloud computing, as a promising service platform, has gained significant popularity in addressing emerging data privacy issues in applications such as machine learning and data mining. Researchers have proposed the ve... 详细信息
来源: 评论
Blockchain-Based key Management Scheme Using Rational Secret Sharing
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 307-328页
作者: Xingfan Zhao Changgen Peng Weijie Tan Kun Niu State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Guizhou Big Data Academy Guizhou UniversityGuiyang550025China
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of ***,decentralized threshold key management schemes have become a... 详细信息
来源: 评论
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 380-388页
作者: Renwan Bi Mingfeng Zhao Zuobin Ying Youliang Tian Jinbo Xiong Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou350117China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin541004China Faculty of Data Science City University of Macao999078MacaoChina State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in ***,sensing users as data uploaders lack a ... 详细信息
来源: 评论
Towards Adapting CLIP for Gaze Object Prediction
收藏 引用
Proceedings of the ACM on Human-Computer Interaction 2024年 第ISS期8卷 155-164页
作者: Chen, Dazhi Gou, Gang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China
This paper aims to investigate the problem of gaze object prediction in single images. We propose an application-friendly network based on CLIP for gaze object prediction. To avoid domain bias, we utilize a shallow fe... 详细信息
来源: 评论
Production of higher excited quarkonium pair at the super Z factory
收藏 引用
Chinese Physics C 2024年 第7期48卷 45-54页
作者: 廖其力 蒋军 Chongqing College of Mobile Telecommunications Chongqing 401520China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing 401520China School of Physics Shandong UniversityJinan 250100China
The heavy constituent quark pair of the heavy quarkonium is produced perturbatively and subsequently undergoes hadronization into the bound state *** production of the heavy quarkonium is essential to testing our unde... 详细信息
来源: 评论