咨询与建议

限定检索结果

文献类型

  • 3,456 篇 会议
  • 2,542 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 5,999 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,047 篇 工学
    • 2,766 篇 计算机科学与技术...
    • 2,290 篇 软件工程
    • 1,047 篇 信息与通信工程
    • 527 篇 电气工程
    • 470 篇 生物工程
    • 456 篇 电子科学与技术(可...
    • 426 篇 控制科学与工程
    • 384 篇 光学工程
    • 298 篇 生物医学工程(可授...
    • 289 篇 机械工程
    • 261 篇 化学工程与技术
    • 205 篇 仪器科学与技术
    • 139 篇 网络空间安全
    • 138 篇 动力工程及工程热...
    • 136 篇 材料科学与工程(可...
    • 111 篇 建筑学
    • 110 篇 交通运输工程
  • 2,216 篇 理学
    • 1,198 篇 数学
    • 664 篇 物理学
    • 527 篇 生物学
    • 368 篇 统计学(可授理学、...
    • 274 篇 化学
    • 167 篇 系统科学
  • 1,071 篇 管理学
    • 571 篇 图书情报与档案管...
    • 543 篇 管理科学与工程(可...
    • 193 篇 工商管理
  • 254 篇 医学
    • 213 篇 临床医学
    • 189 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 151 篇 法学
    • 117 篇 社会学
  • 82 篇 教育学
  • 77 篇 农学
  • 52 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 258 篇 feature extracti...
  • 235 篇 semantics
  • 166 篇 training
  • 131 篇 accuracy
  • 123 篇 computational mo...
  • 110 篇 deep learning
  • 105 篇 convolution
  • 88 篇 data mining
  • 84 篇 image segmentati...
  • 77 篇 object detection
  • 77 篇 data models
  • 75 篇 visualization
  • 74 篇 convolutional ne...
  • 71 篇 robustness
  • 69 篇 optimization
  • 65 篇 predictive model...
  • 63 篇 neural networks
  • 60 篇 contrastive lear...
  • 59 篇 face recognition
  • 57 篇 federated learni...

机构

  • 208 篇 shandong provinc...
  • 187 篇 key laboratory o...
  • 185 篇 hubei province k...
  • 142 篇 key laboratory o...
  • 142 篇 school of inform...
  • 134 篇 school of comput...
  • 116 篇 college of compu...
  • 104 篇 provincial key l...
  • 101 篇 fujian provincia...
  • 86 篇 shandong provinc...
  • 74 篇 national key lab...
  • 72 篇 university of ch...
  • 72 篇 shandong provinc...
  • 71 篇 peng cheng labor...
  • 64 篇 school of comput...
  • 61 篇 shanghai key lab...
  • 59 篇 shanghai key lab...
  • 56 篇 hubei province k...
  • 53 篇 college of compu...
  • 52 篇 fujian provincia...

作者

  • 65 篇 li zuoyong
  • 54 篇 huang qingming
  • 54 篇 li zhaohui
  • 52 篇 zhaohui li
  • 44 篇 li chenglong
  • 43 篇 zhang fuquan
  • 34 篇 tang jin
  • 33 篇 li wei
  • 31 篇 guo di
  • 31 篇 fan li
  • 30 篇 wang wei
  • 30 篇 shen linlin
  • 29 篇 zuoyong li
  • 28 篇 boxin shi
  • 27 篇 liu yang
  • 27 篇 feng rui
  • 26 篇 wang xiao
  • 26 篇 li fan
  • 26 篇 yang zhiyong
  • 25 篇 he liang

语言

  • 5,608 篇 英文
  • 256 篇 其他
  • 142 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory of Computer Information Processing Technology"
5999 条 记 录,以下是4921-4930 订阅
排序:
Active Power Control for Off-Shore Wind Turbines Against FDI Attack
Active Power Control for Off-Shore Wind Turbines Against FDI...
收藏 引用
IEEE International Conference on Communications in China Workshops (ICCC)
作者: Xuguo Jiao Hao Luo Liuyang Jiang Lin Wang Xin Wang Zuqiang Huang State Key Laboratory of Industrial Control Technology College of Control Science and Engineering Zhejiang University Hangzhou China School of Information and Control Engineering Qingdao University of Technology Qingdao China Zhejiang Windey Co. Ltd. Hangzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Academy of Sciences Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Civil Engineering Zhengzhou University Zhengzhou China
Recently, offshore wind power has rapidly developed due to its low environmental interference and abundant wind resources. However, due to its remote geographical location and high demand for communication infrastruct... 详细信息
来源: 评论
RIPPB: A Robust and Improved PBFT Protocol for Blockchain
RIPPB: A Robust and Improved PBFT Protocol for Blockchain
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Meng Ding Heng He Rui Qiao Xiaohu Zhou School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China School of Computing Engineering and Built Environment Birmingham City University Birmingham UK
In this paper, we propose RIPPB, a robust and improved PBFT protocol for Blockchain, to improve the quality of service for blockchain applications. At RIPPB, we introduce reputation for nodes and use reputation as the... 详细信息
来源: 评论
Submodularity-based False Data Injection Attack Scheme in Multi-agent Dynamical Systems
arXiv
收藏 引用
arXiv 2022年
作者: Luo, Xiaoyu Zhao, Chengcheng Fang, Chongrong He, Jianping The Department of Automation Shanghai Jiao Tong University Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China The State Key Laboratory of Industrial Control Technology Institute of Cyberspace Research Zhejiang University China The Department of Electrical and Computer Engineering University of Victoria BC Canada
Consensus in multi-agent dynamical systems is prone to be sabotaged by the adversary, which has attracted much attention due to its key role in broad applications. In this paper, we study a new false data injection (F... 详细信息
来源: 评论
Feature selection method for 3d terrain model based on profile recognition and polygon-breaking algorithm
收藏 引用
ICIC Express Letters 2013年 第3 A期7卷 741-746页
作者: Zhang, Huijie Ma, Zhiqiang Ren, Guangxu Wu, Di Yang, Fengqin School of Computer Science and Information Technology Jilin Universities Northeast Normal University No. 2555 Jingyue Street Changchun 130117 China Key Laboratory of Intelligent Information Processing Jilin Universities Northeast Normal University No. 2555 Jingyue Street Changchun 130117 China Aviation University of Air Force Changchun 130022 China
This paper presents a framework to support feature visualization in 3D terrain roaming. In this framework, feature points are redefined based on the target points of profile recognition and polygon-breaking algorithm,... 详细信息
来源: 评论
Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method
收藏 引用
Journal of information Hiding and Multimedia Signal processing 2015年 第3期6卷 523-533页
作者: Lyu, Wan-Li Chang, Chin-Chen Wang, Feng Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and TechnologyAnhui University Hefei230039 China Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Rd Seatwen Taichung40724 Taiwan Department of Mathematics and Physics Fujian University of Technology Fuzhou Fujian350108 China
An authentication scheme that uses rehashing and secret sharing methods to verify the reality of a color image’s content is proposed in this paper. First, the proposed scheme uses Shamir’s secret sharing method to s... 详细信息
来源: 评论
Distributed resource scheduling for large-scale MEC systems: A multi-agent ensemble deep reinforcement learning with imitation acceleration
arXiv
收藏 引用
arXiv 2020年
作者: Jiang, Feibo Dong, Li Wang, Kezhi Yang, Kun Pan, Cunhua Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China Key Laboratory of Hunan Province for New Retail Virtual Reality Technology Hunan University of Commerce Changsha China Department of Computer and Information Sciences Northumbria University United Kingdom School of Computer Sciences and Electrical Engineering University of Essex ColchesterCO4 3SQ United Kingdom School of Electronic Engineering and Computer Science Queen Mary University of London LondonE1 4NS United Kingdom
We consider the optimization of distributed resource scheduling to minimize the sum of task latency and energy consumption for all the Internet of things devices (IoTDs) in a large-scale mobile edge computing (MEC) sy... 详细信息
来源: 评论
A Defense Framework for Backdoor Attacks in Federated Learning Based on Client-Server Detection
A Defense Framework for Backdoor Attacks in Federated Learni...
收藏 引用
Industrial Automation, Robotics and Control Engineering (IARCE), International Conference on
作者: Ding Chen Tianrui Li Cai Yu Rasha Al-Huthaifi Wei Huang School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu China Sichuan Provincial Key Laboratory of Cyberspace Security School of Cybersecurity Chengdu University of Information Technology Chengdu China School of Cybersecurity Chengdu University of Information Technology Chengdu China College of Computer and Data Science Fuzhou University Fuzhou China
Addressing the challenge of backdoor attacks in federated learning (FL), various defense schemes are examined, resulting in the proposal of a comprehensive strategy that incorporates both client-side and server-side m... 详细信息
来源: 评论
Hyperspectral light field stereo matching
arXiv
收藏 引用
arXiv 2017年
作者: Zhu, Kang Xue, Yujia Fu, Qiang Kang, Sing Bing Chen, Xilin Yu, Jingyi School of Information Science and Technology ShanghaiTech University Shanghai China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China Plex-VR Inc. Shanghai Microsoft Research RedmondWA United States Department of Computer and Information Sciences University of Delaware NewarkDE United States
In this paper, we describe how scene depth can be extracted using a hyperspectral light field capture (H-LF) system. Our H-LF system consists of a 5 × 6 array of cameras, with each camera sampling a different nar... 详细信息
来源: 评论
HF-Mid: A Hybrid Framework of Network Intrusion Detection for Multi-type and Imbalanced Data
HF-Mid: A Hybrid Framework of Network Intrusion Detection fo...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Zhou Tianbo Wang Guotao Huang Xiaopeng Liang Chunhe Xia Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University Guilin China College of Computer Science and Information Technology Guangxi Normal University Guilin China
The data-driven deep learning methods have brought significant progress and potential to intrusion detection. However, there are two thorny problems caused by the characteristics of intrusion data: "multi-type fe... 详细信息
来源: 评论
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive information Leakage in Federated Learning-based Android Malware Classifier
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensiti...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Changnan Jiang Chunhe Xia Chen Chen Huacheng Li Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In the traditional centralized Android malware classification framework, privacy concerns arise as it requires collecting users’ app samples containing sensitive information directly. To address this problem, new cla... 详细信息
来源: 评论