咨询与建议

限定检索结果

文献类型

  • 33 篇 期刊文献
  • 28 篇 会议

馆藏范围

  • 61 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 34 篇 计算机科学与技术...
    • 31 篇 软件工程
    • 10 篇 信息与通信工程
    • 6 篇 电气工程
    • 5 篇 生物工程
    • 3 篇 机械工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 控制科学与工程
    • 2 篇 化学工程与技术
    • 2 篇 安全科学与工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 22 篇 理学
    • 15 篇 数学
    • 7 篇 生物学
    • 4 篇 系统科学
    • 3 篇 化学
    • 3 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 大气科学
  • 10 篇 管理学
    • 7 篇 图书情报与档案管...
    • 4 篇 管理科学与工程(可...
  • 4 篇 农学
    • 2 篇 作物学
  • 3 篇 法学
    • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 1 篇 军事学

主题

  • 3 篇 forecasting
  • 2 篇 covid-19
  • 2 篇 object detection
  • 2 篇 data privacy
  • 2 篇 failure analysis
  • 2 篇 network topology
  • 2 篇 face recognition
  • 2 篇 graph neural net...
  • 2 篇 neural network m...
  • 2 篇 machine learning
  • 2 篇 federated learni...
  • 2 篇 data models
  • 2 篇 convolutional ne...
  • 1 篇 internet of thin...
  • 1 篇 complex networks
  • 1 篇 conferences
  • 1 篇 mountainous regi...
  • 1 篇 control measures
  • 1 篇 fault diagnosis
  • 1 篇 routing

机构

  • 15 篇 college of compu...
  • 8 篇 hebei provincial...
  • 4 篇 secunet security...
  • 4 篇 biometrics and d...
  • 4 篇 hebei provincial...
  • 4 篇 hebei provincial...
  • 4 篇 hochschule darms...
  • 3 篇 hebei normal uni...
  • 3 篇 hebei provincial...
  • 3 篇 laboratory of da...
  • 3 篇 laboratory for d...
  • 3 篇 national enginee...
  • 3 篇 hebei provincial...
  • 3 篇 hebei key labora...
  • 2 篇 college of compu...
  • 2 篇 visual analytics...
  • 2 篇 hebei provincial...
  • 2 篇 xi’an jiaotong u...
  • 2 篇 school of mathem...
  • 2 篇 xi’an jiaotong u...

作者

  • 5 篇 volkova svitlana
  • 5 篇 ren xuebin
  • 5 篇 yang shusen
  • 4 篇 han weili
  • 3 篇 wang xiuqing
  • 3 篇 li qiuting
  • 3 篇 weili han
  • 2 篇 yang yunpeng
  • 2 篇 azhar muhammad t...
  • 2 篇 haoqi wu
  • 2 篇 christian rathge...
  • 2 篇 xie bin
  • 2 篇 lawatsch dominik
  • 2 篇 azmat muhammad a...
  • 2 篇 wang jinghong
  • 2 篇 florian domin
  • 2 篇 shaban muhammad
  • 2 篇 glenski maria
  • 2 篇 ayton ellyn
  • 2 篇 rana iqrar ahmad

语言

  • 57 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"机构=Laboratory of Data Analytics and Security"
61 条 记 录,以下是31-40 订阅
排序:
Leveraging High-Order Similar Nodes and Structural Correlation for Attention-Based Graph Embedding
Leveraging High-Order Similar Nodes and Structural Correlati...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Jing-Hong Wang Chang-Xin Li Jia-Teng Yang College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Hebei Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Shijiazhuang China Hebei Polytechnic Institute Shijiazhuang China
Graph Attention Network (GAT) is a popular method for graph embedding as they effectively leverage attention mechanisms to aggregate first-order neighborhood node information. However, they have limitations in their a...
来源: 评论
Deep Learning for Automated Quantification of Irradiation Defects in TEM data: Relating Pixel-level Errors to Defect Properties
收藏 引用
Microscopy and microanalysis : the official journal of Microscopy Society of America, Microbeam Analysis Society, Microscopical Society of Canada 2023年 第1期29卷 1559-1560页
作者: Sainju, Rajat Roberts, Graham Chen, Wei-Ying Hutchinson, Brian Yang, Qian Ding, Caiwen Edwards, Danny J. Li, Meimei Zhu, Yuanyuan Department of Materials Science and Engineering University of Connecticut Storrs CT United States Department of Computer Science and Engineering University of Connecticut Storrs CT United States Nuclear Science and Engineering Division Argonne National Laboratory Lemont IL United States Computer Science Department Western Washington University Bellingham WA United States National Security Directorate AI and Data Analytics Division Pacific Northwest National Laboratory Richland WA United States Energy and Environment Directorate Nuclear Sciences Division Pacific Northwest National Laboratory Richland WA United States
来源: 评论
Federated Learning-Based Intelligent Indoor Smoke and Fire Detection System for Smart Buildings
Federated Learning-Based Intelligent Indoor Smoke and Fire D...
收藏 引用
2024 International Conference on Telecommunications and Intelligent Systems, ICTIS 2024
作者: Aymene Berkani, Mohamed Rafik Chouchane, Ammar Himeur, Yassine Abdennebi, Anes Sagiroglu, Seref Amira, Abbes Medea Algeria University Biskra University Center of Barika Laboratory of LI3C Amdoukal Road Barika05001 Algeria University of Dubai College of Engineering and Information Technology Dubai United Arab Emirates École de Technologie Supérieure Software and Information Technology Engineering Montréal Canada Analytics Security R&D Center Gazi University Artificial Intelligence and Big Data Ankara Turkey University of Sharjah Department of Computer Science Sharjah United Arab Emirates
Ensuring safety in smart buildings is crucial due to the increasing prevalence of smoke and fire hazards in modern environments. This paper introduces a novel privacy-preserving FL approach based on a CNN1D for smoke ... 详细信息
来源: 评论
Unsupervised Community Discovery Algorithm via Reconstructed Graph Neural NEtwork
Unsupervised Community Discovery Algorithm via Reconstructed...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Jinghong Wang Hui Wang Jiateng Yang Xizhao Wang College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Hebei Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security (Hebei Normal University) Shijiazhuang China College of Artificial Intelligence and Big Data Hebei Polytechnic Institute Shijiazhuang China College of Computer Science and Software Engineering ShenZhen University Shenzhen China
Community discovery can help discover potential community structures in the network, which is a fundamental and important issue in network science. Graph neural network-based algorithms are receiving increasing attent...
来源: 评论
SoK: Training Machine Learning Models over Multiple Sources with Privacy Preservation
arXiv
收藏 引用
arXiv 2020年
作者: Song, Lushan Lin, Guopeng Wang, Jiaxuan Wu, Haoqi Ruan, Wenqiang Han, Weili Laboratory for Data Analytics and Security Fudan University China
Nowadays, gathering high-quality training data from multiple data sources with privacy preservation is a crucial challenge to training high-performance machine learning models. The potential solutions could break the ... 详细信息
来源: 评论
Estimating Smart Grid Stability with Hybrid RNN+LSTM Deep Learning Approach
Estimating Smart Grid Stability with Hybrid RNN+LSTM Deep Le...
收藏 引用
International Smart Grid Workshop and Certificate Program (ISGWCP)
作者: Saadin Oyucu Şeref Sağıroğlu Ahmet Aksöz Emre Biçer Department of Computer Engineering Faculty of Engineering Adıyaman Türkiye Gazi University Artificial Intelligence and Big Data Analytics Security R&D Center Ankara Türkiye Mobilers Team Sivas Cumhuriyet University Sivas Türkiye Faculty of Engineering and Natural Sciences Battery Research Laboratory Sivas University of Science and Technology Sivas Türkiye
Smart grids are faced with a range of challenges, such as the development of communication infrastructure, cybersecurity threats, data privacy, and the protection of user information, due to their complex structure. A... 详细信息
来源: 评论
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
收藏 引用
Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS), CAA Symposium on
作者: Qiuting Li Xiuqing Wang Yunpeng Yang Ruiyi Wang Feng Lv College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Hebei Provincial Key Laboratory of Network & Information Security Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang China
In the era of big data, it is of great significance to study data-driven fault diagnostic methods for equipment in complex industrial environments. In this paper, a data-driven fault diagnostic method for rolling bear... 详细信息
来源: 评论
SS-GNN: A Simple-Structured Graph Neural Network for Affinity Prediction
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Shuke Jin, Yanzhao Liu, Tianmeng Wang, Qi Zhang, Zhaohui Zhao, Shuliang Shan, Bo Software College Hebei Normal University Shijiazhuang050024 China Shijiazhuang Xianyu Digital Biotechnology Co. Ltd Shijiazhuang050024 China College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network and Information Security Shijiazhuang050024 China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang050024 China
Efficient and effective drug-target binding affinity (DTBA) prediction is a challenging task due to the limited computational resources in practical applications and is a crucial basis for drug screening. Inspired by ... 详细信息
来源: 评论
A high-frequency mobility big-data reveals how COVID-19 spread across professions, locations and age groups
arXiv
收藏 引用
arXiv 2022年
作者: Zhao, Chen Zhang, Jialu Hou, Xiaoyue Yeung, Chi Ho Zeng, An College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Key Laboratory of Network and Information Security Shijiazhuang050024 China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Shijiazhuang050024 China Department of Science and Environmental Studies The Education University of Hong Kong Hong Kong School of Systems Science Beijing Normal University Beijing100875 China
As infected and vaccinated population increases, some countries decided not to impose non-pharmaceutical intervention measures anymore and to coexist with COVID-19. However, we do not have a comprehensive understandin... 详细信息
来源: 评论
Automated Enforcement of the Principle of Least Privilege over data Source Access
Automated Enforcement of the Principle of Least Privilege ov...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Haoqi Wu Zhengxuan Yu Dapeng Huang Haodong Zhang Weili Han Laboratory for Data Analytics and Security Fudan University Shanghai China
The state-of-the-art database-backed web applications usually assign full privileges to connections between applications and data sources. This phenomenon, which would enable a malicious attacker to easily compromise ... 详细信息
来源: 评论