咨询与建议

限定检索结果

文献类型

  • 640 篇 会议
  • 570 篇 期刊文献

馆藏范围

  • 1,210 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 767 篇 工学
    • 582 篇 计算机科学与技术...
    • 469 篇 软件工程
    • 167 篇 信息与通信工程
    • 106 篇 电气工程
    • 91 篇 生物工程
    • 84 篇 控制科学与工程
    • 53 篇 电子科学与技术(可...
    • 50 篇 光学工程
    • 45 篇 网络空间安全
    • 38 篇 化学工程与技术
    • 37 篇 生物医学工程(可授...
    • 34 篇 机械工程
    • 33 篇 安全科学与工程
    • 26 篇 建筑学
    • 24 篇 交通运输工程
    • 23 篇 仪器科学与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 土木工程
  • 361 篇 理学
    • 176 篇 数学
    • 110 篇 生物学
    • 84 篇 物理学
    • 59 篇 统计学(可授理学、...
    • 38 篇 化学
    • 23 篇 系统科学
  • 173 篇 管理学
    • 102 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 60 篇 法学
    • 45 篇 社会学
  • 45 篇 医学
    • 40 篇 临床医学
    • 23 篇 基础医学(可授医学...
  • 21 篇 农学
  • 20 篇 经济学
  • 4 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 47 篇 feature extracti...
  • 44 篇 semantics
  • 32 篇 deep learning
  • 32 篇 computational mo...
  • 30 篇 accuracy
  • 29 篇 machine learning
  • 29 篇 training
  • 26 篇 privacy
  • 25 篇 federated learni...
  • 24 篇 blockchain
  • 23 篇 security
  • 22 篇 neural networks
  • 21 篇 data privacy
  • 20 篇 internet of thin...
  • 19 篇 cloud computing
  • 19 篇 data models
  • 16 篇 object detection
  • 16 篇 convolution
  • 16 篇 graph neural net...
  • 15 篇 protocols

机构

  • 129 篇 state key labora...
  • 94 篇 state key labora...
  • 60 篇 hubei key labora...
  • 56 篇 shandong provinc...
  • 52 篇 school of cyber ...
  • 52 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 40 篇 school of comput...
  • 37 篇 college of compu...
  • 32 篇 guizhou provinci...
  • 30 篇 national enginee...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 20 篇 guizhou universi...
  • 19 篇 school of cyber ...
  • 19 篇 college of compu...

作者

  • 38 篇 tian youliang
  • 36 篇 chen yuling
  • 32 篇 yuling chen
  • 31 篇 youliang tian
  • 28 篇 jin hai
  • 22 篇 hu shengshan
  • 21 篇 zhou pan
  • 19 篇 hai jin
  • 18 篇 peng changgen
  • 17 篇 zhang leo yu
  • 17 篇 li shaobo
  • 16 篇 qin yongbin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 15 篇 xiong jinbo
  • 14 篇 shaobo li
  • 13 篇 tan weijie
  • 13 篇 tao li

语言

  • 1,105 篇 英文
  • 91 篇 其他
  • 15 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Public Big Data Security Technology"
1210 条 记 录,以下是111-120 订阅
排序:
Secrecy Performance Analysis of Artificial Noise Assisted Secure Transmission for MISO systems with Multiple Eavesdroppers
Secrecy Performance Analysis of Artificial Noise Assisted Se...
收藏 引用
2023 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2023
作者: Xu, Panpan Tan, Weijie Niu, Kun Li, Zhen Peng, Changgen School of Mathematics and Statistics Guizhou University Guiyang China Key Laboratory of Advanced Manufacturing Technology of Ministry of Education Guizhou China Guizhou Big Data Academy Guizhou University Guiyang China College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China College of Big Data and Information Engineering Guizhou University Guiyang China
In the paper, we investigate the secure communication of multiple-input single-output (MISO) systems with multiple eavesdroppers. We jointly design the beamforming (BF) and the artificial noise (AN) in MISO systems wi... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2838-2852页
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ... 详细信息
来源: 评论
A Low-Rank Matching Attention Based Cross-Modal Feature Fusion Method for Conversational Emotion Recognition
收藏 引用
IEEE Transactions on Affective Computing 2024年 第2期16卷 1177-1189页
作者: Shou, Yuntao Liu, Huan Cao, Xiangyong Meng, Deyu Dong, Bo Xi'An Jiaotong School of Computer Science and Technology Ministry of Education Key Laboratory for Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi'an710049 China Xi'An Jiaotong School of Computer Science and Technology Shaanxi Xi'an710049 China BigKEJoint Innovation Center SHMEEA Shanghai China Xi'An Jiaotong University School of Mathematics and Statistics Xi'an China
Conversational emotion recognition (CER) is an important research topic in human-computer interactions. Although recent advancements in transformer-based cross-modal fusion methods have shown promise in CER tasks, the... 详细信息
来源: 评论
A Differential Privacy Protection Protocol Based on Location Entropy
收藏 引用
Tsinghua Science and technology 2023年 第3期28卷 452-463页
作者: Ping Guo Baopeng Ye Yuling Chen Tao Li Yixian Yang Xiaobin Qian Xiaomei Yu State Key Laboratory of Public Big Data School of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Information Technology Innovation Service Center of Guizhou Province Guiyang 550025China School of Cyberspace Security Beijing University of Posts and TelecommnuicationsBeijing 100000China Guizhou CoVision Science&Technology Co. Ltd.Guiyang 550025China School of Information Science and Engineering Shandong Normal UniversityJinan 250000China
A Location-Based Service(LBS)refers to geolocation-based services that bring both convenience and *** an increase in the scale and value of data,most existing location privacy protection protocols cannot balance priva... 详细信息
来源: 评论
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on Adaptive Perturbation on Federated Graph Learning  25
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on ...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Li, Ken Shi, Bin Wei, Jiazhe Dong, Bo School of Computer Science and Technology Xi’an Jiaotong University Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an China School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China School of Distance Education Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China
Federated Graph Learning (FedGL) is an emerging Federated Learning (FL) framework that learns the graph data from various clients to train better Graph Neural Networks(GNNs) model. Owing to concerns regarding the secu... 详细信息
来源: 评论
Future Healthcare Recommender Systems: Applications, Open Issues, and Challenges
Future Healthcare Recommender Systems: Applications, Open Is...
收藏 引用
2024 IEEE International Conference on E-Health Networking, Application and Services, HealthCom 2024
作者: Ju, Hongzheng Jin, Kebing Tang, Jianhang Zhang, Yang Wang, Bo Xiong, Zehui State Key Laboratory of Public Big Data Guizhou University China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics China Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore
With the enhancement of health awareness and the development of artificial intelligent technology, healthcare recommender systems (HRS) play an increasingly important role in individual health management. Meanwhile, t... 详细信息
来源: 评论
An Efficient Blockchain-Based Certificateless Anonymous Authentication Scheme for VANETs
An Efficient Blockchain-Based Certificateless Anonymous Auth...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Bi, Changbing Tian, Youliang Li, Ta Wu, Shihong Zhou, Hua Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China College of Computer Science and Technology Guizhou University Guiyang550025 China Guizhou University Guizhou Province Key Laboratory of Cryptography and Block Chain Technology Guiyang550025 China Institute of Cryptography & Data Security Guizhou University Guiyang550025 China College of Big Data and Information Engineering Guizhou University Guiyang550025 China
Vehicle ad-hoc networks (VANETs) play a critical role in providing security and privacy protection for intelligent transportation systems. However, the limited network bandwidth and computing capacity within VANETs ha... 详细信息
来源: 评论
Hash Function Based on Quantum Walks with Two-Step Memory
Hash Function Based on Quantum Walks with Two-Step Memory
收藏 引用
2024 International Conference on Computing, Machine Learning and data Science, CMLDS 2024
作者: Zhou, Qing Lu, Songfeng Yang, Hao Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan China Shenzhen Huazhong University of Science and Technology Research Institute Guangdong Shenzhen China
We propose a new quantum-walk-based hash function QHF2M by combining two types of quantum walks with two-step memory and numerically test its statistical performance. The test result shows that QHF2M is on a par with ... 详细信息
来源: 评论
Efficient Position Determination Using Low-Rank Matrix Completion  2
Efficient Position Determination Using Low-Rank Matrix Compl...
收藏 引用
2nd IEEE International Conference on Signal, Information and data Processing, ICSIDP 2024
作者: Zhang, Zehui Pu, Wenqiang Zhou, Rui You, Mingyi Wang, Wei Yan, Junkun Shenzhen Research Institute of Big Data Shenzhen China National Key Laboratory of Electromagnetic Space Security Jiaxing China National Key Laboratory of Radar Signal Processing Hangzhou Institute of Technology Xidian University Xi'an China National Key Laboratory of Radar Signal Processing Hangzhou Institute of Technology Xidian University Hangzhou China
In increasingly complex electromagnetic environments, distributed systems are crucial for passive target localization. These systems, consisting of spatially dispersed sensing nodes, collaboratively enhance the locali... 详细信息
来源: 评论
Research on Metaverse security and Forensics
收藏 引用
Computers, Materials & Continua 2023年 第10期77卷 799-825页
作者: Guangjun Liang Jianfang Xin Qun Wang Xueli Ni Xiangmin Guo Pu Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina School of Intelligent Engineering Nanjing Institute of Railway TechnologyNanjingChina
As a subversive concept,the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic,industrial,and investment ***,while the metaverse brings unprecedente... 详细信息
来源: 评论