咨询与建议

限定检索结果

文献类型

  • 644 篇 会议
  • 575 篇 期刊文献

馆藏范围

  • 1,219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 776 篇 工学
    • 588 篇 计算机科学与技术...
    • 461 篇 软件工程
    • 171 篇 信息与通信工程
    • 111 篇 电气工程
    • 94 篇 控制科学与工程
    • 91 篇 生物工程
    • 55 篇 电子科学与技术(可...
    • 49 篇 光学工程
    • 45 篇 网络空间安全
    • 38 篇 生物医学工程(可授...
    • 37 篇 化学工程与技术
    • 35 篇 机械工程
    • 35 篇 安全科学与工程
    • 26 篇 建筑学
    • 26 篇 交通运输工程
    • 23 篇 动力工程及工程热...
    • 22 篇 仪器科学与技术
    • 22 篇 土木工程
  • 364 篇 理学
    • 179 篇 数学
    • 109 篇 生物学
    • 86 篇 物理学
    • 61 篇 统计学(可授理学、...
    • 39 篇 化学
    • 22 篇 系统科学
  • 174 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 75 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 60 篇 法学
    • 45 篇 社会学
  • 47 篇 医学
    • 42 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 20 篇 经济学
  • 20 篇 农学
  • 4 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 47 篇 feature extracti...
  • 44 篇 semantics
  • 32 篇 deep learning
  • 32 篇 computational mo...
  • 30 篇 accuracy
  • 29 篇 machine learning
  • 29 篇 training
  • 26 篇 privacy
  • 25 篇 federated learni...
  • 24 篇 blockchain
  • 23 篇 security
  • 22 篇 neural networks
  • 21 篇 data privacy
  • 20 篇 internet of thin...
  • 19 篇 cloud computing
  • 19 篇 data models
  • 17 篇 graph neural net...
  • 16 篇 object detection
  • 16 篇 convolution
  • 16 篇 contrastive lear...

机构

  • 128 篇 state key labora...
  • 95 篇 state key labora...
  • 60 篇 hubei key labora...
  • 56 篇 shandong provinc...
  • 53 篇 school of cyber ...
  • 52 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 40 篇 school of comput...
  • 38 篇 college of compu...
  • 32 篇 guizhou provinci...
  • 30 篇 national enginee...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 20 篇 guizhou universi...
  • 19 篇 school of cyber ...
  • 19 篇 college of compu...

作者

  • 38 篇 tian youliang
  • 37 篇 chen yuling
  • 31 篇 yuling chen
  • 31 篇 youliang tian
  • 28 篇 jin hai
  • 22 篇 hu shengshan
  • 21 篇 zhou pan
  • 19 篇 hai jin
  • 18 篇 peng changgen
  • 17 篇 zhang leo yu
  • 17 篇 li shaobo
  • 16 篇 qin yongbin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 15 篇 xiong jinbo
  • 14 篇 shaobo li
  • 13 篇 tan weijie
  • 13 篇 tao li

语言

  • 1,090 篇 英文
  • 114 篇 其他
  • 16 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Public Big Data Security Technology"
1219 条 记 录,以下是31-40 订阅
排序:
Image inpainting via Smooth Tucker decomposition and Low-rank Hankel constraint
收藏 引用
International Journal of Computers and Applications 2023年 第6期45卷 421-432页
作者: Cai, Jing Jiang, Jiawei Wang, Yibing Zheng, Jianwei Xu, Honghui Department of Forensic Science Zhejiang Police College Hangzhou China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Hangzhou China College of Computer Science and Technology Zhejiang University of Technology Hangzhou China
Image inpainting, aiming at exactly recovering missing pixels from partially observed entries, is typically an ill-posed problem. As a powerful constraint, low-rank priors have been widely applied in image inpainting ... 详细信息
来源: 评论
Source Camera Identification Algorithm Based on Multi-Scale Feature Fusion
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3047-3065页
作者: Jianfeng Lu Caijin Li Xiangye Huang Chen Cui Mahmoud Emam School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China Shangyu Institute of Science and Engineering Hangzhou Dianzi UniversityShaoxing312300China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityZhejiang Police CollegeHangzhou310000China Faculty of Artificial Intelligence Menoufia UniversityShebin El-Koom32511Egypt
The widespread availability of digital multimedia data has led to a new challenge in digital *** source camera identification algorithms usually rely on various traces in the capturing ***,these traces have become inc... 详细信息
来源: 评论
Unsigned Road Incidents Detection Using Improved RESNET From Driver-View Images
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第5期6卷 1203-1216页
作者: Li, Changping Wang, Bingshu Zheng, Jiangbin Zhang, Yongjun Chen, C.L. Philip Northwestern Polytechnical University School of Software Xi’an710129 China Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen518060 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
Frequent road incidents cause significant physical harm and economic losses globally. The key to ensuring road safety lies in accurately perceiving surrounding road incidents. However, the highly dynamic nature o... 详细信息
来源: 评论
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第1期138卷 917-938页
作者: Jinqiu Hou Changgen Peng Weijie Tan Hongfa Ding State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Advanced Manufacturing Technology Ministry of EducationGuizhou UniversityGuiyang550025China College of Information Guizhou University of Finance and EconomicsGuiyang550025China
Cloud-based services have powerful storage functions and can provide accurate ***,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research *** t... 详细信息
来源: 评论
Robust Deep One-Class Classification Time Series Anomaly Detection
收藏 引用
Computers, Materials and Continua 2025年 第3期83卷 5181-5197页
作者: Yang, Zhengdao Wang, Xuewei Chen, Yuling Dou, Hui Sang, Haiwei State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550000 China College of Computer Science and Technology Weifang University of Science and Technology Weifang261000 China School of Mathematics and Big Data Guizhou Education University Guiyang550018 China
Anomaly detection (AD) in time series data is widely applied across various industries for monitoring and security applications, emerging as a key research focus within the field of deep learning. While many methods b... 详细信息
来源: 评论
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT
收藏 引用
Digital Communications and Networks 2022年 第5期8卷 644-653页
作者: Linjie Wang Youliang Tian Jinbo Xiong School of Data Science Tongren UniversityTongren554300China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou UniversityGuiyang550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou350117China
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things(IoT)cloud to improve transmission efficiency,which has created a novel paradigm for improving t... 详细信息
来源: 评论
Vehicle data security based on Underground Garage Location - Dead Reckoning Method  3
Vehicle Data Security based on Underground Garage Location -...
收藏 引用
3rd IEEE International Conference on Information technology, big data and Artificial Intelligence, ICIBA 2023
作者: Zhang, Xi Li, Fangwei Guo, Shuang Pei, Yadong Zhang, Yanlin Chongqing College of Mobile Communication 401520 China Chongqing Key Laboratory of Public Big Data Security Technology 401420 Chongqing401520 China
With the widespread popularity of the Internet of Things and the rapid development of vehicle communication technology, it has gradually become normal to realize vehicle evaluation, selection, and large-scale data dis... 详细信息
来源: 评论
Cross-Chain Asset Trading Scheme Without Trusted Third-Party  2nd
Cross-Chain Asset Trading Scheme Without Trusted Third-Party
收藏 引用
2nd International Conference on data security and Privacy Protection, DSPP 2024
作者: Li, Bo Chen, Yuling Huang, Siyuan Yang, Yuxiang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang550025 China
The development of blockchain technology is influenced by user diversity and application scenarios, resulting in limitations on the applicability of assets. Although cloud computing is renowned for faci... 详细信息
来源: 评论
RUP2S- YOLO: An Improved YOLOv8-Based Algorithm for Dense Pedestrian Detection  5
RUP2S- YOLO: An Improved YOLOv8-Based Algorithm for Dense Pe...
收藏 引用
5th International Seminar on Artificial Intelligence, Networking and Information technology, AINIT 2024
作者: Wang, Juanmin Huang, Kun Pi, Jianyong College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guizhou Guiyang China
Dense pedestrian detection is a key research direction in the field of computer vision, which plays a significant role in large-scale crowded public spaces. It provides strong technical support for security assurance,... 详细信息
来源: 评论
Indoor Location and data security of Traffic Flow based on Fingerprint database Filtering  3
Indoor Location and Data Security of Traffic Flow based on F...
收藏 引用
3rd IEEE International Conference on Information technology, big data and Artificial Intelligence, ICIBA 2023
作者: Zhang, Xi Li, Fangwei Guo, Shuang Pei, Yadong Zhang, Yanlin Chongqing College of Mobile Communication 401520 China Chongqing Key Laboratory of Public Big Data Security Technology 401420 Chongqing401520 China
With the development of urbanization, the number of vehicles is gradually increasing, and the vehicle is gradually developing toward the direction of intelligence. Internet of vehicles technology is gradually entering... 详细信息
来源: 评论