咨询与建议

限定检索结果

文献类型

  • 636 篇 期刊文献
  • 596 篇 会议

馆藏范围

  • 1,232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 844 篇 工学
    • 638 篇 计算机科学与技术...
    • 502 篇 软件工程
    • 191 篇 信息与通信工程
    • 123 篇 电气工程
    • 117 篇 控制科学与工程
    • 100 篇 生物工程
    • 69 篇 生物医学工程(可授...
    • 53 篇 光学工程
    • 51 篇 电子科学与技术(可...
    • 45 篇 化学工程与技术
    • 40 篇 机械工程
    • 40 篇 网络空间安全
    • 31 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
    • 23 篇 建筑学
  • 401 篇 理学
    • 211 篇 数学
    • 124 篇 生物学
    • 76 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 47 篇 化学
    • 31 篇 系统科学
  • 224 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 50 篇 工商管理
  • 79 篇 医学
    • 68 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 29 篇 公共卫生与预防医...
    • 29 篇 药学(可授医学、理...
  • 53 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 22 篇 农学
  • 6 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 48 篇 feature extracti...
  • 47 篇 deep learning
  • 37 篇 semantics
  • 33 篇 computational mo...
  • 32 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 21 篇 machine learning
  • 21 篇 cloud computing
  • 20 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 convolution
  • 19 篇 privacy
  • 17 篇 big data
  • 17 篇 neural networks
  • 17 篇 contrastive lear...
  • 17 篇 accuracy
  • 16 篇 image segmentati...
  • 16 篇 optimization
  • 16 篇 predictive model...

机构

  • 125 篇 state key labora...
  • 77 篇 state key labora...
  • 37 篇 college of compu...
  • 34 篇 key laboratory o...
  • 33 篇 college of compu...
  • 32 篇 fujian provincia...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 25 篇 college of compu...
  • 24 篇 college of compu...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 20 篇 guizhou universi...
  • 19 篇 college of compu...
  • 19 篇 guizhou provinci...
  • 18 篇 state key labora...
  • 18 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 14 篇 guizhou provinci...
  • 14 篇 college of compu...

作者

  • 36 篇 tian youliang
  • 33 篇 chen yuling
  • 28 篇 yuling chen
  • 28 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 peng changgen
  • 16 篇 qin yongbin
  • 16 篇 li shaobo
  • 14 篇 shen linlin
  • 13 篇 shaobo li
  • 13 篇 chen yanping
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 changgen peng
  • 12 篇 wang lihui
  • 12 篇 chu shu-chuan
  • 12 篇 xiong jinbo
  • 11 篇 tan weijie
  • 11 篇 huang ruizhang
  • 11 篇 tao li

语言

  • 1,084 篇 英文
  • 134 篇 其他
  • 17 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1232 条 记 录,以下是121-130 订阅
排序:
A Blind Batch Encryption and public Ledger-Based Protocol for Sharing Sensitive data
收藏 引用
China Communications 2024年 第1期21卷 310-322页
作者: Zhiwei Wang Nianhua Yang Qingqing Chen Wei Shen Zhiying Zhang School of Computer Sciences Nanjing University of Posts and TelecommunicationsNanjing 210023China Dept.of Intelligent Science and Information Law East China University of Political Science and LawShanghai 201620China Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal UniversityHaikou 571158China State Key Laboratory of Public Big Data Guizhou UniversityGuizhou 550025China Yunnan Key Laboratory of Blockchain Application Technology Yunnan Innovation Research Institute of Beijing University of Aeronautics and AstronauticsKunming 650233
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... 详细信息
来源: 评论
Resisting Membership Inference Attacks by Dynamically Adjusting Loss Targets
Resisting Membership Inference Attacks by Dynamically Adjust...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Ma, Xihua Tian, Youliang Ding, Zehua Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China College of Computer Science and Technology Guizhou University Guiyang550025 China Institute of Cryptography and Data Security Guizhou University Guiyang550025 China
Machine learning (ML) models are susceptible to membership inference attacks (MIAs), which aim to infer whether a particular sample was involved in model training. Previous research suggests that the difference in los... 详细信息
来源: 评论
Prescribed Performance-Based Finite-Time Neural Adaptive Backstepping Control for the Chaotic PMSM
Prescribed Performance-Based Finite-Time Neural Adaptive Bac...
收藏 引用
2022 International Conference on Mechanical and Electronics Engineering, ICMEE 2022
作者: Wu, Fengbin Zhang, Junxing Li, Shaobo Li, Shaoyang Wu, Xiao Wang, Shuai College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China School of Mechanical Engineering Guizhou University State Key Laboratory of Public Big Data Guiyang China School of Mechanical Engineering Guizhou University Guiyang China Guizhou University State Key Laboratory of Public Big Data Guiyang China
This paper presents a prescribed performance-based finite-time neural adaptive backstepping control scheme for the chaotic permanent magnet synchronous motor (PMSM). Specifically, an error transformation coupled with ... 详细信息
来源: 评论
Phasmatodea Population Evolution Algorithm Based on Spiral Mechanism and Its Application to data Clustering
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 475-496页
作者: Jeng-Shyang Pan Mengfei Zhang Shu-Chuan Chu Xingsi Xue Václav Snášel College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing210044China Department of Information Management Chaoyang University of TechnologyTaichung41349TaiwanChina Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of TechnologyFuzhou350118China Faculty of Electrical Engineering and Computer Science VŠB-Technical University of OstravaOstrava70833Czech Republic
data clustering is an essential technique for analyzing complex datasets and continues to be a central research topic in data *** clustering algorithms,such as K-means,are widely used due to their simplicity and *** p... 详细信息
来源: 评论
Core Loss Prediction Using a PC-GBT Model Based on Permutation Feature Importance and Grid Search Optimization
Core Loss Prediction Using a PC-GBT Model Based on Permutati...
收藏 引用
Algorithms, Computing and Machine Learning (CACML), Asia Conference on
作者: Yunhua Ran Shaobo Li College of Computer Science and Technology Guizhou University Guiyang State Key Laboratory of Public Big Data Guizhou University Guiyang
This study aims to predict core loss in magnetic materials using a PC-GBT model based on Permutation Feature Importance and Grid Search Optimization. The research analyzes the impact of three key factors—temperature,... 详细信息
来源: 评论
Variational Neural Inference Enhanced Text Semantic Communication System
收藏 引用
China Communications 2024年 第7期21卷 50-64页
作者: Zhang Xi Zhang Yiqian Li Congduan Ma Xiao School of Electronics and Communication Engineering Sun Yat-Sen UniversityShenzhen 518107China Guizhou University State Key Laboratory of Public Big Data Guiyang 550025China Shenzhen Key Laboratory of Navigation and Communication Integration Shenzhen 518107China School of Computer Science and Engineering Sun Yat-Sen UniversityGuangzhou 510006China
Recently,deep learning-based semantic communication has garnered widespread attention,with numerous systems designed for transmitting diverse data sources,including text,image,and speech,*** efforts have been directed... 详细信息
来源: 评论
RUP2S- YOLO: An Improved YOLOv8-Based Algorithm for Dense Pedestrian Detection
RUP2S- YOLO: An Improved YOLOv8-Based Algorithm for Dense Pe...
收藏 引用
Artificial Intelligence, Networking and Information technology (AINIT), International Seminar on
作者: Juanmin Wang Kun Huang Jianyong Pi State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang Guizhou China
Dense pedestrian detection is a key research direction in the field of computer vision, which plays a significant role in large-scale crowded public spaces. It provides strong technical support for security assurance,... 详细信息
来源: 评论
Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency  17th
Fuzzy Deduplication Scheme Supporting Pre-verification of L...
收藏 引用
17th International Conference on Provable and Practical Security, ProvSec 2023
作者: Tang, Zehui Zeng, Shengke Li, Tao Cheng, Shuai Zheng, Haoyu School of Computer and Software Engineering Xihua University Chengdu610039 China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China School of Computer Science Qufu Normal University Rizhao276825 China
Efficiently and securely removing encrypted redundant data with cross-user in the cloud is challenging. Convergent Encryption (CE) is difficult to resist dictionary attacks for its deterministic tag. Server-aided mech... 详细信息
来源: 评论
Assisted diagnosis of breast cancer based on federated learning and improved DenseNet  5
Assisted diagnosis of breast cancer based on federated learn...
收藏 引用
5th International Conference on computer Vision and data Mining, ICCVDM 2024
作者: Huang, Shan Xiang, Hexia Li, Jingjie Sun, Yongkai Duan, Xiaodong College of Computer Science and Engineering Dalian Minzu University Dalian116600 China State Ethnic Affairs Commission Key Laboratory of Big Data Applied Technology Dalian Minzu University Dalian116600 China
Breast cancer is one of the common cancers worldwide, and how to identify breast cancer as early as possible plays an important role in its later diagnosis and treatment. However, relying only on data from a single or... 详细信息
来源: 评论
Two-Stage Guided Constraint Differential Evolution Algorithm
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2023年 第4期8卷 1109-1133页
作者: Sung, Tien-Wen Liang, Qiaoxin Hong, Chuanbo Huang, Zeming Li, Wei Nguyen, Trinh-Dong College of Computer Science and Mathematics Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fujian Fuzhou350118 China School of Electronic Electrical Engineering and Physics Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fujian Fuzhou350118 China Department of Software Engineering University of Information Technology Ho Chi Minh City Viet Nam
The development of population intelligence has shown a great trend of a linear surge in recent years, and a large number of intelligent algorithms inspired by biology have been studied. Among them, differential evolut... 详细信息
来源: 评论