咨询与建议

限定检索结果

文献类型

  • 644 篇 会议
  • 575 篇 期刊文献

馆藏范围

  • 1,219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 776 篇 工学
    • 588 篇 计算机科学与技术...
    • 461 篇 软件工程
    • 171 篇 信息与通信工程
    • 111 篇 电气工程
    • 94 篇 控制科学与工程
    • 91 篇 生物工程
    • 55 篇 电子科学与技术(可...
    • 49 篇 光学工程
    • 45 篇 网络空间安全
    • 38 篇 生物医学工程(可授...
    • 37 篇 化学工程与技术
    • 35 篇 机械工程
    • 35 篇 安全科学与工程
    • 26 篇 建筑学
    • 26 篇 交通运输工程
    • 23 篇 动力工程及工程热...
    • 22 篇 仪器科学与技术
    • 22 篇 土木工程
  • 364 篇 理学
    • 179 篇 数学
    • 109 篇 生物学
    • 86 篇 物理学
    • 61 篇 统计学(可授理学、...
    • 39 篇 化学
    • 22 篇 系统科学
  • 174 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 75 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 60 篇 法学
    • 45 篇 社会学
  • 47 篇 医学
    • 42 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 20 篇 经济学
  • 20 篇 农学
  • 4 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 47 篇 feature extracti...
  • 44 篇 semantics
  • 32 篇 deep learning
  • 32 篇 computational mo...
  • 30 篇 accuracy
  • 29 篇 machine learning
  • 29 篇 training
  • 26 篇 privacy
  • 25 篇 federated learni...
  • 24 篇 blockchain
  • 23 篇 security
  • 22 篇 neural networks
  • 21 篇 data privacy
  • 20 篇 internet of thin...
  • 19 篇 cloud computing
  • 19 篇 data models
  • 17 篇 graph neural net...
  • 16 篇 object detection
  • 16 篇 convolution
  • 16 篇 contrastive lear...

机构

  • 128 篇 state key labora...
  • 95 篇 state key labora...
  • 60 篇 hubei key labora...
  • 56 篇 shandong provinc...
  • 53 篇 school of cyber ...
  • 52 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 40 篇 school of comput...
  • 38 篇 college of compu...
  • 32 篇 guizhou provinci...
  • 30 篇 national enginee...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 20 篇 guizhou universi...
  • 19 篇 school of cyber ...
  • 19 篇 college of compu...

作者

  • 38 篇 tian youliang
  • 37 篇 chen yuling
  • 31 篇 yuling chen
  • 31 篇 youliang tian
  • 28 篇 jin hai
  • 22 篇 hu shengshan
  • 21 篇 zhou pan
  • 19 篇 hai jin
  • 18 篇 peng changgen
  • 17 篇 zhang leo yu
  • 17 篇 li shaobo
  • 16 篇 qin yongbin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 15 篇 xiong jinbo
  • 14 篇 shaobo li
  • 13 篇 tan weijie
  • 13 篇 tao li

语言

  • 1,090 篇 英文
  • 114 篇 其他
  • 16 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Public Big Data Security Technology"
1219 条 记 录,以下是41-50 订阅
排序:
A DL Intrusion Detection Method for Low-Rate Denial of Service Attacks
A DL Intrusion Detection Method for Low-Rate Denial of Servi...
收藏 引用
2023 Asia-Pacific Conference on Image Processing, Electronics and Computers, IPEC 2023
作者: Wu, Yuhong Lv, Yunshan Hu, Xiangdong School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Key Laboratory of Public Big Data Security Technology Chongqing Chongqing China School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Automation Chongqing University of Posts and Telecommunications Chongqing China
Denial of service (DoS) attacks is among the most harmful network threats. Low-rate DoS (LDoS) attacks feature good concealment and are likely to evade detection by conventional signal analysis-based methods. A LDoS a... 详细信息
来源: 评论
A Transformer-Based Video Colorization Method Fusing Local Self-attention and Bidirectional Optical Flow  10th
A Transformer-Based Video Colorization Method Fusing Local S...
收藏 引用
10th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2024
作者: Yuan, Lin Duan, Xun Xiang, Lingjie Kong, Guangqian Wu, Yun State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
Video colorization encounters two principal challenges: colorization quality and temporal flicker. Balancing colorization quality and temporal consistency is a significant challenge. To address the aforementioned issu... 详细信息
来源: 评论
Robust and Verifiable Privacy Federated Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1895-1908页
作者: Lu, Zhi Lu, Songfeng Tang, Xueming Wu, Junjun Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518063 China
Federated learning (FL) safeguards user privacy by uploading gradients instead of raw data. However, inference attacks can reconstruct raw data using gradients uploaded by users in FL. To mitigate this issue, research... 详细信息
来源: 评论
Face Recognition Based on SRCS Algorithm and Score of Exponential Weighting
Face Recognition Based on SRCS Algorithm and Score of Expone...
收藏 引用
International Conference on Image, Vision and Intelligent Systems, ICIVIS 2023
作者: Zhang, Xuexue Zhang, Yongjun Gao, Weihao Long, Wei Yao, He Sate Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang550025 China
Face recognition is a prominent research area within computer vision, offering significant value across various fields of life, including certificate verification, security systems, and human-computer interactions. No... 详细信息
来源: 评论
Efficient Enhanced Feature Learning for Remote Sensor Image Object Detection
Efficient Enhanced Feature Learning for Remote Sensor Image ...
收藏 引用
International Conference on Image, Vision and Intelligent Systems, ICIVIS 2023
作者: Chen, Dazhi Gou, Gang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang550025 China
The realm of computer vision has witnessed a profound interest from the scholarly community in the task of remote sensing object detection. Within this article, we present a pioneering and refined approach to feature ... 详细信息
来源: 评论
Multifactor prediction of carbon price based on principal component analysis and long short-term memory  3
Multifactor prediction of carbon price based on principal co...
收藏 引用
3rd International Conference on Electronic Information Engineering, big data, and Computer technology, EIBDCT 2024
作者: Wang, Yuanling Wen, Hao Deng, Shuyun Xia, Xin Chongqing Key Laboratory of Public Big Data Security Technology Chongqing College of Mobile Communication Chongqing401527 China School of Management Science and Engineering Chongqing Technology and Business University Chongqing400067 China
In recent years, the development of the carbon trading market has become an important policy for China to achieve its "dual carbon"goals at an early date and to take on the role of a major international play... 详细信息
来源: 评论
PDDD-PreTrain:A Series of Commonly Used Pre-Trained Models Support Image-Based Plant Disease Diagnosis
收藏 引用
Plant Phenomics 2023年 第2期5卷 313-332页
作者: Xinyu Dong Qi Wang Qianding Huang Qinglong Ge Kejun Zhao Xingcai Wu Xue Wu Liang Lei Gefei Hao State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China The School of Physics and Optoelectronic Engineering Guangdong University of TechnologyGuangzhou 510006China National Key Laboratory of Green Pesticide Key Laboratory of Green Pesticide and Agricultural BioengineeringMinistry of EducationGuizhou UniversityGuiyang 550025China
Plant diseases threaten global food security by reducing crop yield;thus,diagnosing plant diseases is critical to agricultural *** intelligence technologies gradually replace traditional plant disease diagnosis method... 详细信息
来源: 评论
Optimization of cloud computing task scheduling based on whale optimization algorithm with quasi-opposition-based and nonlinear factor  6
Optimization of cloud computing task scheduling based on wha...
收藏 引用
6th International Conference on Internet of Things, Automation and Artificial Intelligence, IoTAAI 2024
作者: Xuan, Xiong Li, Shaobo Yu, Liya Wu, Fengbin Zhang, Xingxing An, Xue College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China Guizhou University College of Mechanical Engineering Guiyang550025 China
Task scheduling has a significant impact on the resource availability and operation cost of the system in cloud computing. In order to improve the efficiency of task execution in the cloud for a given computational re...
来源: 评论
A robust tensor watermarking algorithm for diffusion-tensor images
收藏 引用
Frontiers of Information technology & Electronic Engineering 2024年 第3期25卷 384-397页
作者: Chengmeng LIU Zhi LI Guomei WANG Long ZHENG State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China
Watermarking algorithms that use convolution neural networks have exhibited good robustness in studies of deep learning ***,after embedding watermark signals by convolution,the feature fusion eficiency of convolution ... 详细信息
来源: 评论
Research on a technology of Mail Anti-virus Gateway for Industrial Internet
Research on a Technology of Mail Anti-virus Gateway for Indu...
收藏 引用
2023 IEEE International Conference on Image Processing and Computer Applications, ICIPCA 2023
作者: Wu, Yuhong Lv, Yunshan Zhang, Ling School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China
With the rapid rise of the Industrial Internet, emails that convey a large amount of information require a strong network security environment. Aiming at the increasingly complex mail virus prevention and control work... 详细信息
来源: 评论