咨询与建议

限定检索结果

文献类型

  • 644 篇 会议
  • 575 篇 期刊文献

馆藏范围

  • 1,219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 776 篇 工学
    • 588 篇 计算机科学与技术...
    • 461 篇 软件工程
    • 171 篇 信息与通信工程
    • 111 篇 电气工程
    • 94 篇 控制科学与工程
    • 91 篇 生物工程
    • 55 篇 电子科学与技术(可...
    • 49 篇 光学工程
    • 45 篇 网络空间安全
    • 38 篇 生物医学工程(可授...
    • 37 篇 化学工程与技术
    • 35 篇 机械工程
    • 35 篇 安全科学与工程
    • 26 篇 建筑学
    • 26 篇 交通运输工程
    • 23 篇 动力工程及工程热...
    • 22 篇 仪器科学与技术
    • 22 篇 土木工程
  • 364 篇 理学
    • 179 篇 数学
    • 109 篇 生物学
    • 86 篇 物理学
    • 61 篇 统计学(可授理学、...
    • 39 篇 化学
    • 22 篇 系统科学
  • 174 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 75 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 60 篇 法学
    • 45 篇 社会学
  • 47 篇 医学
    • 42 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 20 篇 经济学
  • 20 篇 农学
  • 4 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 47 篇 feature extracti...
  • 44 篇 semantics
  • 32 篇 deep learning
  • 32 篇 computational mo...
  • 30 篇 accuracy
  • 29 篇 machine learning
  • 29 篇 training
  • 26 篇 privacy
  • 25 篇 federated learni...
  • 24 篇 blockchain
  • 23 篇 security
  • 22 篇 neural networks
  • 21 篇 data privacy
  • 20 篇 internet of thin...
  • 19 篇 cloud computing
  • 19 篇 data models
  • 17 篇 graph neural net...
  • 16 篇 object detection
  • 16 篇 convolution
  • 16 篇 contrastive lear...

机构

  • 128 篇 state key labora...
  • 95 篇 state key labora...
  • 60 篇 hubei key labora...
  • 56 篇 shandong provinc...
  • 53 篇 school of cyber ...
  • 52 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 40 篇 school of comput...
  • 38 篇 college of compu...
  • 32 篇 guizhou provinci...
  • 30 篇 national enginee...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 20 篇 guizhou universi...
  • 19 篇 school of cyber ...
  • 19 篇 college of compu...

作者

  • 38 篇 tian youliang
  • 37 篇 chen yuling
  • 31 篇 yuling chen
  • 31 篇 youliang tian
  • 28 篇 jin hai
  • 22 篇 hu shengshan
  • 21 篇 zhou pan
  • 19 篇 hai jin
  • 18 篇 peng changgen
  • 17 篇 zhang leo yu
  • 17 篇 li shaobo
  • 16 篇 qin yongbin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 15 篇 xiong jinbo
  • 14 篇 shaobo li
  • 13 篇 tan weijie
  • 13 篇 tao li

语言

  • 1,090 篇 英文
  • 114 篇 其他
  • 16 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Public Big Data Security Technology"
1219 条 记 录,以下是71-80 订阅
排序:
Enhancing graph representation learning via type-aware decoupling and node influence allocation
收藏 引用
Applied Intelligence 2025年 第6期55卷 1-14页
作者: Zhu, Guochang Hu, Jun Liu, Li Zhang, Qinghua Wang, Guoyin School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongwen Road Chongqing Chongqing400065 China Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongwen Road Chongqing Chongqing400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing400065 China
The traditional graph representation methods can fit the information of graph with low-dimensional vectors, but they cannot interpret their composition, resulting in insufficient security. Graph decoupling, as a metho... 详细信息
来源: 评论
Multi-FDMF: An Agile Management Framework of Multi-domain data in Decentralized Heterogeneous Environments  9
Multi-FDMF: An Agile Management Framework of Multi-domain Da...
收藏 引用
9th International Conference on big data and Information Analytics, bigDIA 2023
作者: Ge, Ningchao Chen, Haiwen Wu, Jibing Hu, Ying National University of Defense Technology Laboratory for Big Data and Decision Changsha China Criminal Investigation Section Public Security Department Changsha China
With the in-depth development of big data and artificial intelligence technology, traditional financial, transportation, manufacturing, military and other industries are gradually developing in the direction of digita... 详细信息
来源: 评论
Study on IGBT Based on Multi-physical Field Model
Study on IGBT Based on Multi-physical Field Model
收藏 引用
2024 International Conference on New Power System and Power Electronics, NPSPE 2024
作者: Li, Jie Du, Liping Chongqing College of Mobile Communication Chongqing China Chongqing Key Laboratory of Public Big Date Security Technology Chongqing China Chongqing Vocational College of Public Transportation Chongqing China
With the proposal and implementation of "carbon peak"and "carbon neutral"policies, the vigorous development of new energy vehicles, wind energy, photovoltaic, energy storage, the core components IG... 详细信息
来源: 评论
A Learnable Graph Convolutional Neural Network Model for Relation Extraction  1
收藏 引用
28th China Conference on Information Retrieval, CCIR 2022
作者: Xu, Jinling Chen, Yanping Qin, Yongbin Huang, Ruizhang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
Relation extraction is the task of extracting the semantic relationships between two named entities in a sentence. The task relies on semantic dependencies relevant to named entities. Recently, graph convolutional neu... 详细信息
来源: 评论
Fine-Grained Access Control Proxy Re-encryption with HRA security from Lattice  18th
Fine-Grained Access Control Proxy Re-encryption with HRA Se...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Hou, Jinqiu Peng, Changgen Tan, Weijie Zhong, Chongyi Niu, Kun Li, Hu State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Key Laboratory of Advanced Manufacturing Technology Ministry of Education Guizhou University Guiyang550025 China School of Mathematics and Big data Guizhou Education University Guiyang550025 China
With the gradual formation of the cloud computing ecosystem, the value of cloud computing is becoming increasingly evident, and the accompanying information security issues have become core elements. The challenge lie... 详细信息
来源: 评论
Dense Pedestrian Detection Algorithm Based on Multiscale Feature Fusion in YOLOv8  5
Dense Pedestrian Detection Algorithm Based on Multiscale Fea...
收藏 引用
5th International Conference on Computer Vision, Image and Deep Learning, CVIDL 2024
作者: Hu, Weichao Hu, Qian Pi, Jianyong Huang, Kun Li, Wenhua Wang, Juanmin Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China Guizhou Mobile Information Technology Company Guiyang China
The pedestrian target in large-scale crowded places has the characteristics of complex environment, diverse scales and dense arrangement, which makes the current target detection methods appear the phenomenon of false... 详细信息
来源: 评论
Flame Detection Algorithm Based on Improved YOLOv8  5
Flame Detection Algorithm Based on Improved YOLOv8
收藏 引用
5th International Conference on Computer Vision, Image and Deep Learning, CVIDL 2024
作者: Huang, Kun Hu, Qian Pi, Jianyong Hu, Weichao Li, Wenhua Wang, Juanmin Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China Guizhou Mobile Information Technology Company Guiyang China
Flame detection is a key technology in intelligent firefighting, using object detection methods to locate and count flames in videos, thereby enabling intelligent monitoring of fire incidents. This has significant res... 详细信息
来源: 评论
An insider user authentication method based on improved temporal convolutional network
收藏 引用
High-Confidence Computing 2023年 第4期3卷 87-95页
作者: Xiaoling Tao Yuelin Yu Lianyou Fu Jianxiang Liu Yunhao Zhang Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic TechnologyGuilin 541004China
With the rapid development of information technology,information system security and insider threat detection have become important topics for organizational *** the current network environment,user behavioral bio-dat... 详细信息
来源: 评论
YOLOv5 Algorithm Optimization: Precise Target Detection Amidst Background Interference  4
YOLOv5 Algorithm Optimization: Precise Target Detection Amid...
收藏 引用
4th International Conference on Consumer Electronics and Computer Engineering, ICCECE 2024
作者: Xiong, Bingbing Shi, Wenxi Fu, Yanyun Zhu, Zhansheng Wang, Deyong Jia, Bin School of Computer Science and Technology Xinjiang University Urumqi China Xinjiang Lianhaichuangzhi Information Technology Co. Ltd. Key Laboratory of Big Data of Xinjiang Social Security Risk Beijing China Beijing Academy of Science and Technology Beijing China Xinjiang Lianhaichuangzhi Information Technology Co. Ltd. Key Laboratory of Big Data of Xinjiang Social Security Risk Urumqi China
This paper solves the challenge that the target is submerged in the background in the border security scenario, and proposes the enhancement of YOLOv5 algorithm. EfficientViT replaces the DarkNet backbone, leveraging ... 详细信息
来源: 评论
Detecting the One-Shot Dummy Attack on the Power Industrial Control Processes With an Unsupervised data-Driven Approach
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 550-553页
作者: Zhenyong Zhang Yan Qin Jingpei Wang Hui Li Ruilong Deng the State Key Laboratory of Public Big Data and the College of Computer Science and Technology Guizhou UniversityGuiyang 550025China the School of Chemical and Biomedical Engineering Nanyang Technological UniversitySingapore 639798Singapore the State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering Zhejiang UniversityHangzhou 310027China IEEE
Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this lett... 详细信息
来源: 评论