咨询与建议

限定检索结果

文献类型

  • 636 篇 期刊文献
  • 596 篇 会议

馆藏范围

  • 1,232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 844 篇 工学
    • 638 篇 计算机科学与技术...
    • 502 篇 软件工程
    • 191 篇 信息与通信工程
    • 123 篇 电气工程
    • 117 篇 控制科学与工程
    • 100 篇 生物工程
    • 69 篇 生物医学工程(可授...
    • 53 篇 光学工程
    • 51 篇 电子科学与技术(可...
    • 45 篇 化学工程与技术
    • 40 篇 机械工程
    • 40 篇 网络空间安全
    • 31 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
    • 23 篇 建筑学
  • 401 篇 理学
    • 211 篇 数学
    • 124 篇 生物学
    • 76 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 47 篇 化学
    • 31 篇 系统科学
  • 224 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 50 篇 工商管理
  • 79 篇 医学
    • 68 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 29 篇 公共卫生与预防医...
    • 29 篇 药学(可授医学、理...
  • 53 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 22 篇 农学
  • 6 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 48 篇 feature extracti...
  • 47 篇 deep learning
  • 37 篇 semantics
  • 33 篇 computational mo...
  • 32 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 21 篇 machine learning
  • 21 篇 cloud computing
  • 20 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 convolution
  • 19 篇 privacy
  • 17 篇 big data
  • 17 篇 neural networks
  • 17 篇 contrastive lear...
  • 17 篇 accuracy
  • 16 篇 image segmentati...
  • 16 篇 optimization
  • 16 篇 predictive model...

机构

  • 125 篇 state key labora...
  • 77 篇 state key labora...
  • 37 篇 college of compu...
  • 34 篇 key laboratory o...
  • 33 篇 college of compu...
  • 32 篇 fujian provincia...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 25 篇 college of compu...
  • 24 篇 college of compu...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 20 篇 guizhou universi...
  • 19 篇 college of compu...
  • 19 篇 guizhou provinci...
  • 18 篇 state key labora...
  • 18 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 14 篇 guizhou provinci...
  • 14 篇 college of compu...

作者

  • 36 篇 tian youliang
  • 33 篇 chen yuling
  • 28 篇 yuling chen
  • 28 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 peng changgen
  • 16 篇 qin yongbin
  • 16 篇 li shaobo
  • 14 篇 shen linlin
  • 13 篇 shaobo li
  • 13 篇 chen yanping
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 changgen peng
  • 12 篇 wang lihui
  • 12 篇 chu shu-chuan
  • 12 篇 xiong jinbo
  • 11 篇 tan weijie
  • 11 篇 huang ruizhang
  • 11 篇 tao li

语言

  • 1,084 篇 英文
  • 134 篇 其他
  • 17 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1232 条 记 录,以下是161-170 订阅
排序:
A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism
A Multiple Indicator Credit Ranking Scheme Based on Notary M...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Lang Chen Yuling Chen Chaoyue Tan Hui Dou Yun Luo Pengyu Chen State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China
Blockchain has penetrated multiple fields such as finance, healthcare, supply chain, and intelligent transportation. However, the value exchange between different independent blockchain systems limits the expansion of...
来源: 评论
Adversarial Attack Method Based on Dual- frequency Domain Transformation
Adversarial Attack Method Based on Dual- frequency Domain Tr...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Maolin Xiong Yuling Chen Hui Dou Yun Luo Chaoyue Tan Yangwen Zhang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China
Deep neural network is vulnerable to adversarial samples, which means altering the image subtly to introduce errors into the neural network model. Adversarial samples can categorize into black-box and white-box attack...
来源: 评论
Robust Object Detection Based on a Comparative Learning Perspective
Robust Object Detection Based on a Comparative Learning Pers...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Hao Yang Yuling Chen Hui Dou Yun Luo Chaoyue Tan Yangwen Zhang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China
With the advent of adversarial samples, the safety of Artificial Intelligence is of particular concern, as only a small amount of perturbation can be added to mislead a model's judgment. Therefore there is an urge...
来源: 评论
SeeMe: An intelligent edge server selection method for location-aware business task computing over IIoT
SeeMe: An intelligent edge server selection method for locat...
收藏 引用
作者: Dou, Wanchun Liu, Bowen Duan, Jirun Dai, Fei Qi, Lianyong Xu, Xiaolong State Key Laboratory for Novel Software Technology Nanjing University Nanjing China College of Big Data and Intelligent Engineering Southwest Forestry University Kunming China School of Computer Science Qufu Normal University Qufu China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
In the past few years, latency-sensitive task computing over the industrial internet of things (IIoT) has played a key role in an increasing number of intelligent applications, such as intelligent self-driving vehicle... 详细信息
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
Uncertain graph generating approach based on differential privacy for preserving link relationship of social networks
收藏 引用
International Journal of Security and Networks 2022年 第1期17卷 28-38页
作者: Yan, Jun Tian, YuPan Liu, Hai Wu, ZhenQiang School of Computer Science Shaanxi Normal University Xi’an710119 China School of Mathematics and Computer Applications Shangluo College Shangluo726000 China Guizhou Provincial Key Laboratory of Public Big Data Guiyang550025 China
With the widespread use of social networks in our daily life, the personal privacy in social networks has become a growing concern. To prevent the link relationship of social networks from disclosing users’ sensitive... 详细信息
来源: 评论
Research on Instance Segmentation of High-Resolution Remote Sensing Images  7
Research on Instance Segmentation of High-Resolution Remote ...
收藏 引用
7th Asian Conference on Artificial Intelligence technology, ACAIT 2023
作者: Zhang, Xiaoying Yang, Houqun Li, Xuanyu Yang, Dangui Shen, Jie Xu, Gaodi Hainan University College of Computer Science And Technology Hainan Haikou China Hainan University Haikou Key Laboratory of Deep Learning And Big Data Application Technology Hainan Haikou China
Increasingly, high-resolution remote sensing images are being used in real life as a result of the continuous advancement of high-definition remote sensing imaging technology in recent years. They play a crucial role ... 详细信息
来源: 评论
A Blockchain-Based Dynamic Incentive Model in Mobile Edge Computing
A Blockchain-Based Dynamic Incentive Model in Mobile Edge Co...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Zhiyin Chen Feng Zhou Youliang Tian Shuai Wang State Key Laboratory of Public Big Data Guizhou University Guiyang China College of Computer Science and Technology Guizhou University Guiyang China
With the rapid development of the Internet of Things (IoT), mobile edge computing (MEC) is becoming increasingly important as a key technology to increase data processing speed and reduce delay. However, due to the im... 详细信息
来源: 评论
Dual-view Label and Feature Supervision Network for Semi-supervised Medical Image Segmentation  24
Dual-view Label and Feature Supervision Network for Semi-sup...
收藏 引用
7th International Conference on Signal Processing and Machine Learning, SPML 2024
作者: Zhou, Zhen Li, Zuoyong Wang, Zhengyuan Teng, Shenghua Wang, Tao College of Electronic and Information Engineering Shandong University of Science and Technology Qingdao China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control School of Computer and Big Data Minjiang University Fuzhou China
Semi-supervised learning has garnered significant attention, particularly in medical image segmentation, owing to its capacity to leverage a large number of unlabeled data and a limited amount of labeled data to impro... 详细信息
来源: 评论
A Novel Global-Local Representations Network for Speech Steganalysis  5
A Novel Global-Local Representations Network for Speech Steg...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Xu, Shulong Tian, Hui Quan, Hanyu Lu, Jing College of Computer Science and Technology Xiamen Key Laboratory of Data Security and Blockchain Technology Fujian Key Laboratory of Big Data Intelligence and Security National Huaqiao University China
With the popularity of the internet and the development of network services, Steganography based on speech stream has become a research hotspot in information hiding. To improve the detection performance of steganalys... 详细信息
来源: 评论