咨询与建议

限定检索结果

文献类型

  • 142 篇 会议
  • 59 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 202 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 155 篇 工学
    • 110 篇 计算机科学与技术...
    • 90 篇 软件工程
    • 37 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 18 篇 化学工程与技术
    • 17 篇 生物工程
    • 16 篇 电子科学与技术(可...
    • 14 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 电气工程
    • 10 篇 农业工程
    • 9 篇 生物医学工程(可授...
    • 7 篇 动力工程及工程热...
    • 7 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 5 篇 交通运输工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
  • 86 篇 理学
    • 55 篇 数学
    • 19 篇 生物学
    • 18 篇 物理学
    • 16 篇 化学
    • 13 篇 统计学(可授理学、...
    • 8 篇 系统科学
  • 48 篇 管理学
    • 25 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 12 篇 农学
    • 10 篇 作物学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 法学
    • 4 篇 社会学
  • 4 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学

主题

  • 10 篇 semantics
  • 7 篇 support vector m...
  • 6 篇 training
  • 5 篇 image segmentati...
  • 5 篇 accuracy
  • 5 篇 privacy
  • 3 篇 trees (mathemati...
  • 3 篇 educational inst...
  • 3 篇 convolution
  • 3 篇 vectors
  • 3 篇 data mining
  • 3 篇 computational mo...
  • 3 篇 syntactics
  • 3 篇 feature extracti...
  • 3 篇 natural language...
  • 3 篇 malware
  • 3 篇 labeling
  • 3 篇 forecasting
  • 3 篇 image reconstruc...
  • 3 篇 adaptation model...

机构

  • 15 篇 school of comput...
  • 11 篇 key lab. of inte...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 8 篇 key laboratory o...
  • 6 篇 provincial key l...
  • 6 篇 school of cyber ...
  • 6 篇 shanghai key lab...
  • 5 篇 jiangsu provinci...
  • 5 篇 school of inform...
  • 4 篇 jiangsu provinci...
  • 4 篇 institute of inf...
  • 4 篇 first-imaging te...
  • 4 篇 key lab. of inte...
  • 4 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 school of comput...

作者

  • 14 篇 kong fang
  • 13 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 8 篇 huang qingming
  • 8 篇 xu qianqian
  • 7 篇 chunhe xia
  • 7 篇 tianbo wang
  • 7 篇 cao xiaochun
  • 6 篇 yang zhiyong
  • 6 篇 huang chongwen
  • 5 篇 chen chen
  • 5 篇 li peifeng
  • 4 篇 li yang
  • 4 篇 qian longhua
  • 4 篇 yang bo
  • 4 篇 yuen chau
  • 4 篇 zhang chao
  • 4 篇 xizhao luo
  • 4 篇 yanqin zhu
  • 4 篇 chen yang

语言

  • 196 篇 英文
  • 5 篇 中文
  • 2 篇 其他
检索条件"机构=Provincial Key Lab. for Computer Information Processing Technology"
202 条 记 录,以下是161-170 订阅
排序:
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive information Leakage in Federated Learning-based Android Malware Classifier
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensiti...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Changnan Jiang Chunhe Xia Chen Chen Huacheng Li Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In the traditional centralized Android malware classification framework, privacy concerns arise as it requires collecting users’ app samples containing sensitive information directly. To address this problem, new cla... 详细信息
来源: 评论
A simulator for swarm AUVs acoustic communication networking  11
A simulator for swarm AUVs acoustic communication networking
收藏 引用
11th ACM International Conference on Underwater Networks and Systems, WUWNet 2016
作者: Li, Guannan Liu, Jun Wang, Xue Xu, Hongli Cui, Jun-Hong Shenyang Institute of Automation CAS University of Chinese Academy of Sciences No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University State Key Laboratory of Robotics Key Laboratory of System Control and Information Processing Ministry of Education of China Changchun China Shenyang Institute of Automation CAS Northeast University No. 114 Nanta Street Shenhe District Shenyang China Shenyang Institute of Automation CAS No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University Changchun China Underwater Sensor Network Lab. University of Connecticut StorrsCT06269 United States
This paper presents a simulator for swarm operations designed to verify algorithms for a swarm of autonomous underwater robots (AUVs), specifically for constructing an underwater communication network with AUVs carryi... 详细信息
来源: 评论
Overlapping Community Extraction: A Link Hypergraph Partitioning Based Method
Overlapping Community Extraction: A Link Hypergraph Partitio...
收藏 引用
IEEE International Conference on Services Computing (SCC)
作者: Haicheng Tao Zhiang Wu Jin Shi Jie Cao Xiaofeng Yu College of Computer Sci. and Eng. Nanjing University of Science and Technology China Jiangsu Provincial Key Lab. of E-Business Nanjing University of Finance and Economics China School of Information Management Nanjing University China School of Business Nanjing University China
Real-world networks often contain communities with pervasive overlaps such that nodes simultaneously belong to several groups. Community extraction, emerging in recent years, is considered to be a promising solution f... 详细信息
来源: 评论
REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis
REDA: Malicious Traffic Detection Based on Record Length and...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Wanshuang Lin Chunhe Xia Tianbo Wang Chen Chen Yuan Zhao Weidong Zhou School of Cyber Science and Technology Beihang University Beijing China Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
The TLS encryption protocol plays a vital role in securing data transmission, but it also presents challenges for payload-based Network Intrusion Detection Systems (NIDS). Existing methods utilize statistical characte... 详细信息
来源: 评论
EFwork: An Efficient Framework for Constructing a Malware Knowledge Graph
EFwork: An Efficient Framework for Constructing a Malware Kn...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Chen Chen Chunhe Xia Tianbo Wang Wanshuang Lin Yuan Zhao Yang Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Malware Knowledge Graph (MKG) serves as an essential auxiliary tool for malware detection and analysis. However, the construction of MKG faces several challenges, such as inadequate dataset quality, incomplete entity ... 详细信息
来源: 评论
iSplit LBI: Individualized partial ranking with ties via split LBI
arXiv
收藏 引用
arXiv 2019年
作者: Xu, Qianqian Sun, Xinwei Yang, Zhiyong Cao, Xiaochun Huang, Qingming Yao, Yuan Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Microsoft Research Asia State Key Laboratory of Information Security Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Tech. University of Chinese Academy of Sciences Key Laboratory of Big Data Mining and Knowledge Management CAS Peng Cheng Laboratory Department of Mathematics Hong Kong University of Science and Technology Hong Kong
Due to the inherent uncertainty of data, the problem of predicting partial ranking from pairwise comparison data with ties has attracted increasing interest in recent years. However, in real-world scenarios, different... 详细信息
来源: 评论
WISERNet: Wider Separate-then-reunion Network for Steganalysis of Color Images
arXiv
收藏 引用
arXiv 2018年
作者: Zeng, Jishen Tan, Shunquan Liu, Guangqing Li, Bin Huang, Jiwu Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Guangdong Key Lab. of Intelligent Info. Processing and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen518060 China Peng Cheng Laboratory Shenzhen518052 China
Until recently, deep steganalyzers in spatial domain have been all designed for gray-scale images. In this paper, we propose WISERNet (the wider separate-then-reunion network) for steganalysis of color images. We prov... 详细信息
来源: 评论
A Quality-Centric Framework for Generic Deepfake Detection
arXiv
收藏 引用
arXiv 2024年
作者: Song, Wentang Yan, Zhiyuan Lin, Yuzhen Yao, Taiping Chen, Changsheng Chen, Shen Zhao, Yandan Ding, Shouhong Li, Bin Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security The SZU-AFS Joint Innovation Center for AI Technology Shenzhen University Shenzhen518060 China The School of Electronic and Computer Engineering Peking University Shenzhen Graduate School Shenzhen518055 China Youtu Lab Tencent Shanghai200233 China
This paper addresses the generalization issue in deepfake detection by harnessing forgery quality in training data. Generally, the forgery quality of different deepfakes varies: some have easily recognizable forgery c... 详细信息
来源: 评论
Disentangled Generation Network for Enlarged License Plate Recognition and A Unified Dataset
arXiv
收藏 引用
arXiv 2022年
作者: Li, Chenglong Yang, Xiaobin Wang, Guohao Zheng, Aihua Tan, Chang Jia, Ruoran Tang, Jin Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Artificial Intelligence Anhui University Hefei230601 China Information Materials and Intelligent Sensing Laboratory of Anhui Province Key Lab of Intelligent Computing and Signal Processing Ministry of Education Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China iFLYTEK Co. Ltd. Hefei230088 China
License plate recognition plays a critical role in many practical applications, but license plates of large vehicles are difficult to be recognized due to the factors of low resolution, contamination, low illumination... 详细信息
来源: 评论
Matching Biomedical Ontologies with Long Short-Term Memory Networks
Matching Biomedical Ontologies with Long Short-Term Memory N...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Chao Jiang Xingsi Xue Intelligent Information Processing Research Center Fujian University of Technology Fuzhou Fujian China School of Computer Science and Mathematics Fujian University of Technology Fuzhou Fujian China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou Fujian China Guangxi Key Laboratory of Automatic Detecting Technology and Instruments Guilin University of Electronic Technology Guilin Guangxi China Fujian Key Lab for Automotive Electronics and Electric Drive Fujian University of Technology Fuzhou Fujian China
Semantic Web (SW) has attracted the increasing attention of researchers, which facilitates people to link and handle various data. Ontology is the kernel technique of SW, and biomedical ontology is a state-of-art biom... 详细信息
来源: 评论