咨询与建议

限定检索结果

文献类型

  • 644 篇 会议
  • 575 篇 期刊文献

馆藏范围

  • 1,219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 776 篇 工学
    • 588 篇 计算机科学与技术...
    • 461 篇 软件工程
    • 171 篇 信息与通信工程
    • 111 篇 电气工程
    • 94 篇 控制科学与工程
    • 91 篇 生物工程
    • 55 篇 电子科学与技术(可...
    • 49 篇 光学工程
    • 45 篇 网络空间安全
    • 38 篇 生物医学工程(可授...
    • 37 篇 化学工程与技术
    • 35 篇 机械工程
    • 35 篇 安全科学与工程
    • 26 篇 建筑学
    • 26 篇 交通运输工程
    • 23 篇 动力工程及工程热...
    • 22 篇 仪器科学与技术
    • 22 篇 土木工程
  • 364 篇 理学
    • 179 篇 数学
    • 109 篇 生物学
    • 86 篇 物理学
    • 61 篇 统计学(可授理学、...
    • 39 篇 化学
    • 22 篇 系统科学
  • 174 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 75 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 60 篇 法学
    • 45 篇 社会学
  • 47 篇 医学
    • 42 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 20 篇 经济学
  • 20 篇 农学
  • 4 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 47 篇 feature extracti...
  • 44 篇 semantics
  • 32 篇 deep learning
  • 32 篇 computational mo...
  • 30 篇 accuracy
  • 29 篇 machine learning
  • 29 篇 training
  • 26 篇 privacy
  • 25 篇 federated learni...
  • 24 篇 blockchain
  • 23 篇 security
  • 22 篇 neural networks
  • 21 篇 data privacy
  • 20 篇 internet of thin...
  • 19 篇 cloud computing
  • 19 篇 data models
  • 17 篇 graph neural net...
  • 16 篇 object detection
  • 16 篇 convolution
  • 16 篇 contrastive lear...

机构

  • 128 篇 state key labora...
  • 95 篇 state key labora...
  • 60 篇 hubei key labora...
  • 56 篇 shandong provinc...
  • 53 篇 school of cyber ...
  • 52 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 40 篇 school of comput...
  • 38 篇 college of compu...
  • 32 篇 guizhou provinci...
  • 30 篇 national enginee...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 20 篇 guizhou universi...
  • 19 篇 school of cyber ...
  • 19 篇 college of compu...

作者

  • 38 篇 tian youliang
  • 37 篇 chen yuling
  • 31 篇 yuling chen
  • 31 篇 youliang tian
  • 28 篇 jin hai
  • 22 篇 hu shengshan
  • 21 篇 zhou pan
  • 19 篇 hai jin
  • 18 篇 peng changgen
  • 17 篇 zhang leo yu
  • 17 篇 li shaobo
  • 16 篇 qin yongbin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 15 篇 xiong jinbo
  • 14 篇 shaobo li
  • 13 篇 tan weijie
  • 13 篇 tao li

语言

  • 1,090 篇 英文
  • 114 篇 其他
  • 16 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Public Big Data Security Technology"
1219 条 记 录,以下是51-60 订阅
排序:
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and Data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber Security Fujian Normal UniversityFuzhouChina Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhouChina Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhouChina Department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 评论
Research on the mechanical fault diagnosis method based on sound signal and IEMD-DDCNN
收藏 引用
International Journal of Intelligent Computing and Cybernetics 2023年 第3期16卷 629-646页
作者: Haoning Pu Zhan Wen Xiulan Sun Lemei Han Yanhe Na Hantao Liu Wenzao Li Chengdu University of Information Technology ChengduChina Education Department of Sichuan Province Education Informatization and Big Data CenterChengduChina Network and Data Security Key Laboratory of Sichuan Province UESTCChengduChina
Purpose–The purpose of this paper is to provide a shorter time cost,high-accuracy fault diagnosis method for water *** pumps are widely used in industrial equipment and their fault diagnosis is gaining increasing ***... 详细信息
来源: 评论
UARC:Unsupervised Anomalous Traffic Detection with Improved U-Shaped Autoencoder and RetNet Based Multi-clustering  26th
UARC:Unsupervised Anomalous Traffic Detection with Improved ...
收藏 引用
26th International Conference on Information and Communications security, ICICS 2024
作者: Xie, Yunyang Chen, Kai Li, Shenghui Li, Bingqian Zhang, Ning Hubei Key Laboratory of Distributed System Security Hubei Engin eering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University Technology Wuhan430074 China
With the ongoing advancement of deep learning, modern network intrusion detection systems increasingly favor utilizing deep learning networks to improve their ability to learn traffic characteristics. To address the c... 详细信息
来源: 评论
ECOA: An Enhanced Crayfish Optimization Algorithm for Real-World Engineering Problems  6
ECOA: An Enhanced Crayfish Optimization Algorithm for Real-W...
收藏 引用
6th International Conference on Communications, Information System and Computer Engineering, CISCE 2024
作者: Yuan, Panliang Li, Shaobo Liao, Zihao Guizhou Institute of Technology Guiyang550008 China Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China
The Crayfish Optimization Algorithm (COA) is a new metaheuristic algorithm that has been proposed in recent years. While it has a strong local search ability, its global search ability is weak. this paper presents an ... 详细信息
来源: 评论
An Effective security Comparison Protocol in Cloud Computing
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 5141-5158页
作者: Yuling Chen Junhong Tao Tao Li Jiangyuan Cai Xiaojun Ren State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550000China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin550000China POWERCHINA Guizhou Electric Power Engineering Co. Ltd.Guiyang550000China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and TechnologyWeifang261000China
With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and *** this can save customers’operating costs,it also poses privacy and se... 详细信息
来源: 评论
Sparse representation scheme with enhanced medium pixel intensity for face recognition
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第1期9卷 116-127页
作者: Xuexue Zhang Yongjun Zhang Zewei Wang Wei Long Weihao Gao Bob Zhang State Key Laboratory of Public Big Data Institute for Artificial IntelligenceCollege of Computer Science and TechnologyGuizhou UniversityGuiyangGuizhouChina Department of Computer and Information Science University of MacaoAvenida da UniversidadeTaipaMacaoChina
Sparse representation is an effective data classification algorithm that depends on the known training samples to categorise the test *** has been widely used in various image classification *** in sparse representati... 详细信息
来源: 评论
VFLF: A verifiable federated learning framework against malicious aggregators in Industrial Internet of Things
VFLF: A verifiable federated learning framework against mali...
收藏 引用
作者: Zhou, Zhou Tian, Youliang Peng, Changgen Yang, Nan Long, Shigong State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang China Institute of Cryptography and Data Security Guizhou University Guizhou Guiyang China
As an important approach to overcome data silos and privacy concerns in deep learning, federated learning, which can jointly train the global model and keep data local, has shown remarkable performance in a range of i... 详细信息
来源: 评论
CoRE:Constrained Robustness Evaluation of Machine Learning-Based Stability Assessment for Power Systems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 557-559页
作者: Zhenyong Zhang David K.Y.Yau the State Key Laboratory of Public Big Data and the College of Computer Science and Technology Guizhou UniversityGuiyang 550025China IEEE the Pillar of Information Systems Technology and Design Singapore University of Technology and DesignSingapore 487372Singapore
Dear Editor,Machine learning(ML) approaches have been widely employed to enable real-time ML-based stability assessment(MLSA) of largescale automated electricity grids. However, the vulnerability of MLSA to malicious ... 详细信息
来源: 评论
A Write-Optimized PM-oriented B+-tree with Aligned Flush and Selective Migration  21
A Write-Optimized PM-oriented B+-tree with Aligned Flush and...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: He, Xianyu Zhang, Runyu Tian, Pengpeng Zhou, Lening Lian, Min Yang, Chaoshu Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China
Emerging Persistent Memories (PMs) usually have the severe drawback of expensive writes. Therefore, existing PM-oriented B+-trees mainly concentrate on alleviating the write overhead (i.e., reducing the writes to PM a... 详细信息
来源: 评论
Adversarial Attack Method Based on Dual- frequency Domain Transformation
Adversarial Attack Method Based on Dual- frequency Domain Tr...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and big data Computing, 2023 International Conference on Cyber Science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Xiong, Maolin Chen, Yuling Dou, Hui Luo, Yun Tan, Chaoyue Zhang, Yangwen College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
Deep neural network is vulnerable to adversarial samples, which means altering the image subtly to introduce errors into the neural network model. Adversarial samples can categorize into black-box and white-box attack... 详细信息
来源: 评论