咨询与建议

限定检索结果

文献类型

  • 39 篇 会议
  • 32 篇 期刊文献

馆藏范围

  • 71 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 31 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 9 篇 信息与通信工程
    • 5 篇 生物工程
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
    • 3 篇 控制科学与工程
    • 3 篇 土木工程
    • 3 篇 交通运输工程
    • 2 篇 机械工程
    • 2 篇 电气工程
    • 2 篇 建筑学
    • 2 篇 安全科学与工程
  • 23 篇 理学
    • 18 篇 数学
    • 6 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 4 篇 物理学
    • 4 篇 化学
  • 14 篇 管理学
    • 9 篇 图书情报与档案管...
    • 6 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 2 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 6 篇 feature selectio...
  • 5 篇 feature extracti...
  • 4 篇 education
  • 4 篇 information tech...
  • 4 篇 classification a...
  • 3 篇 machine learning
  • 3 篇 training
  • 2 篇 reliability
  • 2 篇 deep neural netw...
  • 2 篇 time factors
  • 2 篇 redundancy
  • 2 篇 data mining
  • 2 篇 adversarial mach...
  • 2 篇 molecules
  • 2 篇 correlation
  • 2 篇 kernel
  • 2 篇 uncertainty
  • 2 篇 image resolution
  • 2 篇 principal compon...
  • 2 篇 heuristic algori...

机构

  • 9 篇 state key labora...
  • 8 篇 school of comput...
  • 7 篇 anhui province k...
  • 7 篇 minnan normal un...
  • 6 篇 anhui province k...
  • 5 篇 hong kong univer...
  • 4 篇 school of comput...
  • 4 篇 baidu talent int...
  • 3 篇 national enginee...
  • 3 篇 business intelli...
  • 3 篇 school of transp...
  • 3 篇 college of compu...
  • 3 篇 national and loc...
  • 2 篇 university of sc...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 2 篇 minnan science a...
  • 2 篇 guanghua school ...
  • 2 篇 dept. of comp. s...
  • 2 篇 key lab of data ...

作者

  • 9 篇 liu qi
  • 8 篇 lin yaojin
  • 8 篇 yaojin lin
  • 7 篇 zhang zaixi
  • 7 篇 chen enhong
  • 6 篇 yu xiehua
  • 6 篇 li shaozi
  • 6 篇 shaozi li
  • 6 篇 xiehua yu
  • 4 篇 qi liu
  • 4 篇 yu mao
  • 4 篇 mao yu
  • 3 篇 zheng yifeng
  • 3 篇 wang chenxi
  • 3 篇 hu qingyong
  • 3 篇 zhang wenjie
  • 3 篇 hui xiong
  • 3 篇 hengshu zhu
  • 3 篇 xu tong
  • 3 篇 xiong hui

语言

  • 50 篇 英文
  • 21 篇 其他
检索条件"机构=Lab of Data Science and Intelligence Application"
71 条 记 录,以下是31-40 订阅
排序:
Backdoor Defense via Deconfounded Representation Learning
Backdoor Defense via Deconfounded Representation Learning
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Zaixi Zhang Qi Liu Zhicai Wang Zepu Lu Qingyong Hu Anhui Province Key Lab of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China State Key Laboratory of Cognitive Intelligence Hefei Anhui China University of Science and Technology of China Hong Kong University of Science and Technology
Deep neural networks (DNNs) are recently shown to be vulnerable to backdoor attacks, where attackers embed hidden backdoors in the DNN model by injecting a few poisoned examples into the training dataset. While extens...
来源: 评论
Network configuration approach based on the reliability service
Network configuration approach based on the reliability serv...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Kuang Fengfei Lin Yaojm Yu Xiehua Chen Meilong Key Laboratory of Big Data and Artificial Intelligence in University of Fujian Province MinNan Science and Technology University Fujian Quanzhou China School of Computer Science Lab of Data Science and Intelligence Application Minnan Normal University Zhangzhou China Key Laboratory of Big Data and Artificial Intelligence University of Fujian Province MinNan Science and Technology University Quanzhou China
Wireless communication network plays an important role in various industries. One of the key concern in wireless communication is network security. This paper proposes an optimal transmission lines assignment with max... 详细信息
来源: 评论
Blockchain-based data Sharing Framework for Malaysia Government Aid Management System
Blockchain-based Data Sharing Framework for Malaysia Governm...
收藏 引用
2023 International Conference on Digital applications, Transformation and Economy, ICDATE 2023
作者: Azmi, Azman Yahya, Farashazillah Moung, Ervin Gubin Sallehudin, Hasimi Utomo, Rio Guntur Azman, Nur Afrina Universiti Malaysia Sabah Advanced Machine Intelligence Research Lab Faculty of Computing and Informatics Sabah Kota Kinabalu Malaysia Universiti Malaysia Sabah Data Technologies and Application Research Lab Faculty of Computing and Informatics Sabah Kota Kinabalu Malaysia Universiti Kebangsaan Malaysia Centre for Software Technology and Management Faculty of Information Science and Technology Malaysia Telkom University School of Computing Bandung Indonesia Foundation Study and Language Institute University of Reading Malaysia Johor Iskandar Puteri Malaysia
The Covid-19 pandemic has impacted the world economy, and Malaysia is no exception. Due to the closure of businesses, the rate of unemployment has been recorded at an all-time high. The Malaysian Government through it... 详细信息
来源: 评论
Reversible data Hiding Using Convolutional Neural Network and Digital Signal Processing Techniques
Reversible Data Hiding Using Convolutional Neural Network an...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Peng Qingmei Li Shaozi Lin Yaojin Yu Xiehua Key Laboratory of Big Data and Artificial Intelligence University of Fujian Province MinNan Science and Technology University Quanzhou China School of Informatics Xiamen University Xiamen China School of Computer Science Lab of Data Science and Intelligence Application Minnan Normal University Zhangzhou China
Reversible data hiding is a data hiding process in which data is encrypted into an image as a means of authentication, and hidden data is used to hide the original image, and RDH is often used in areas where data auth... 详细信息
来源: 评论
Sustainable Self-evolution Adversarial Training
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Wenxuan Wang, Chenglei Qi, Huihui Ye, Menghao Qian, Xuelin Wang, Peng Zhang, Yanning School of Computer Science Northwestern Polytechnical University National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Shaanxi Xi’an China School of Automation Northwestern Polytechnical University The BRain and Artificial INtelligence Lab Shaanxi Xi’an China
With the wide application of deep neural network models in various computer vision tasks, there has been a proliferation of adversarial example generation strategies aimed at deeply exploring model security. However, ... 详细信息
来源: 评论
Medical Image Fusion Solid Works Supporting Multiple Techniques with Feature-Level Transforms  2
Medical Image Fusion Solid Works Supporting Multiple Techniq...
收藏 引用
2nd International Conference on Sustainable Computing and data Communication Systems, ICSCDS 2023
作者: Mutha, Rakhi Pathak, Devendra Nath Ahuja, Vandana Bhandari, Prabhakar Ramesh Rahi, Pankaj Mamodiya, Udit Lovely Professional University Department of Computer Application Punjab India Poornima College of Engineering Department of Computer Science and Engineering Rajasthan Jaipur India Swami Vivekanand Institute of Engineering and Technology Department of Computer Science and Engineering Punjab India Sevadal Mahila Mahavidyalaya Department of Microbiology Umred Road Maharashtra Nagpur India Poornima Institute of Engineering and Technology Department of Artificial Intelligence & Data Science Rajasthan Jaipur India Piet Aicte Idea Lab Poornima Institute of Engineering and Technology Department of Electrical Engineering Rajasthan Jaipur India
The use of group classifiers on similar features has resulted in computationally expensive and tedious, making them unsuitable for online applications. The clustering techniques are evaluated for both inter-subject an... 详细信息
来源: 评论
Full-atom protein pocket design via iterative refinement  23
Full-atom protein pocket design via iterative refinement
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Zaixi Zhang Zepu Lu Zhongkai Hao Marinka Zitnik Qi Liu Anhui Province Key Lab of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China and State Key Laboratory of Cognitive Intelligence Hefei Anhui China and Harvard University Anhui Province Key Lab of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China and State Key Laboratory of Cognitive Intelligence Hefei Anhui China Dept. of Comp. Sci. and Tech. Institute for AI THBI Lab BNRist Center Tsinghua-Bosch Joint ML Center Tsinghua Harvard University
The design and optimization of functional proteins that bind specific ligand molecules is paramount in therapeutics and bio-engineering. A critical yet formidable task in this endeavor is the design of the protein poc...
来源: 评论
Backdoor Defense via Deconfounded Representation Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Zaixi Liu, Qi Wang, Zhicai Lu, Zepu Hu, Qingyong Anhui Province Key Lab of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China China State Key Laboratory of Cognitive Intelligence Anhui Hefei China Hong Kong University of Science and Technology Hong Kong University of Science and Technology of China China
Deep neural networks (DNNs) are recently shown to be vulnerable to backdoor attacks, where attackers embed hidden backdoors in the DNN model by injecting a few poisoned examples into the training dataset. While extens... 详细信息
来源: 评论
A review of distributed statistical inference
收藏 引用
Statistical Theory and Related Fields 2022年 第2期6卷 89-99页
作者: Yuan Gao Weidong Liu Hansheng Wang Xiaozhou Wang Yibo Yan Riquan Zhang School of Statistics and Key Laboratory of Advanced Theory and Application in Statistics and Data Science–MOE East China Normal UniversityShanghaiPeople’s Republic of China School of Mathematical Sciences and Key Lab of Articial Intelligence–MOE Shanghai Jiao Tong UniversityShanghaiPeople’s Republic of China Guanghua School of Management Peking UniversityBeijingPeople’s Republic of China
The rapid emergence of massive datasets in various fields poses a serious challenge to tra-ditional statistical ***,it provides opportunities for researchers to develop novel *** by the idea of divide-and-conquer,vari... 详细信息
来源: 评论
Teaching resource recommendation for OBE based on kernel canonical correlation analysis
Teaching resource recommendation for OBE based on kernel can...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Wu Changqian Li Shaozi Lin Yaojin Yu Xiehua Key Laboratory of Big Data and Artificial Intelligence in University of Fujian Province MinNan Science and Technology University José Rizal University Quanzhou China School of Informatics Xiamen University Xiamen China School of Computer Science Lab of Data Science and Intelligence Application Minnan Normal University Zhangzhou China Key Laboratory of Big Data and Artificial Intelligence in University of Fujian Province MinNan Science and Technology University Quanzhou China
data mining is used to extract information from OBE teaching resources, then the teaching resources and user personality database are established to improve the effectiveness of resources recommendation on the online ... 详细信息
来源: 评论