咨询与建议

限定检索结果

文献类型

  • 636 篇 期刊文献
  • 596 篇 会议

馆藏范围

  • 1,232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 844 篇 工学
    • 638 篇 计算机科学与技术...
    • 502 篇 软件工程
    • 191 篇 信息与通信工程
    • 123 篇 电气工程
    • 117 篇 控制科学与工程
    • 100 篇 生物工程
    • 69 篇 生物医学工程(可授...
    • 53 篇 光学工程
    • 51 篇 电子科学与技术(可...
    • 45 篇 化学工程与技术
    • 40 篇 机械工程
    • 40 篇 网络空间安全
    • 31 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
    • 23 篇 建筑学
  • 401 篇 理学
    • 211 篇 数学
    • 124 篇 生物学
    • 76 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 47 篇 化学
    • 31 篇 系统科学
  • 224 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 50 篇 工商管理
  • 79 篇 医学
    • 68 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 29 篇 公共卫生与预防医...
    • 29 篇 药学(可授医学、理...
  • 53 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 22 篇 农学
  • 6 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 48 篇 feature extracti...
  • 47 篇 deep learning
  • 37 篇 semantics
  • 33 篇 computational mo...
  • 32 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 21 篇 machine learning
  • 21 篇 cloud computing
  • 20 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 convolution
  • 19 篇 privacy
  • 17 篇 big data
  • 17 篇 neural networks
  • 17 篇 contrastive lear...
  • 17 篇 accuracy
  • 16 篇 image segmentati...
  • 16 篇 optimization
  • 16 篇 predictive model...

机构

  • 125 篇 state key labora...
  • 77 篇 state key labora...
  • 37 篇 college of compu...
  • 34 篇 key laboratory o...
  • 33 篇 college of compu...
  • 32 篇 fujian provincia...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 25 篇 college of compu...
  • 24 篇 college of compu...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 20 篇 guizhou universi...
  • 19 篇 college of compu...
  • 19 篇 guizhou provinci...
  • 18 篇 state key labora...
  • 18 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 14 篇 guizhou provinci...
  • 14 篇 college of compu...

作者

  • 36 篇 tian youliang
  • 33 篇 chen yuling
  • 28 篇 yuling chen
  • 28 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 peng changgen
  • 16 篇 qin yongbin
  • 16 篇 li shaobo
  • 14 篇 shen linlin
  • 13 篇 shaobo li
  • 13 篇 chen yanping
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 changgen peng
  • 12 篇 wang lihui
  • 12 篇 chu shu-chuan
  • 12 篇 xiong jinbo
  • 11 篇 tan weijie
  • 11 篇 huang ruizhang
  • 11 篇 tao li

语言

  • 1,084 篇 英文
  • 134 篇 其他
  • 17 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1232 条 记 录,以下是31-40 订阅
排序:
Adversarial Attack Method Based on Dual- frequency Domain Transformation
Adversarial Attack Method Based on Dual- frequency Domain Tr...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and big data Computing, 2023 International Conference on Cyber science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Xiong, Maolin Chen, Yuling Dou, Hui Luo, Yun Tan, Chaoyue Zhang, Yangwen College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
Deep neural network is vulnerable to adversarial samples, which means altering the image subtly to introduce errors into the neural network model. Adversarial samples can categorize into black-box and white-box attack... 详细信息
来源: 评论
A Blockchain of Blockchains Structure Based on Asset Trading Scheme
A Blockchain of Blockchains Structure Based on Asset Trading...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and big data Computing, 2023 International Conference on Cyber science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Huang, Siyuan Chen, Yuling Tan, Chaoyue Dou, Hui Luo, Yun Yang, Yuxiang College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
In the realm of blockchain applications, the issue of value isolation, commonly referred to as the value island problem, imposes inherent limitations on the applicability of corresponding assets. To overcome this chal... 详细信息
来源: 评论
Robust Object Detection Based on a Comparative Learning Perspective
Robust Object Detection Based on a Comparative Learning Pers...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and big data Computing, 2023 International Conference on Cyber science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Yang, Hao Chen, Yuling Dou, Hui Luo, Yun Tan, Chaoyue Zhang, Yangwen College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
With the advent of adversarial samples, the safety of Artificial Intelligence is of particular concern, as only a small amount of perturbation can be added to mislead a model's judgment. Therefore there is an urge... 详细信息
来源: 评论
A High Capacity Combined Carrier Steganography Without Embedding Image
A High Capacity Combined Carrier Steganography Without Embed...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and big data Computing, 2023 International Conference on Cyber science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Zhang, Yangwen Chen, Yuling Dou, Hui Luo, Yun Tan, Chaoyue Xiong, Maolin College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
The technique of image steganography is the embedding of secret information into the carrier image by means of algorithms that are widely used in the field of information transmission, but steganalysis tools built wit... 详细信息
来源: 评论
A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism
A Multiple Indicator Credit Ranking Scheme Based on Notary M...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and big data Computing, 2023 International Conference on Cyber science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Chen, Lang Chen, Yuling Tan, Chaoyue Dou, Hui Luo, Yun Chen, Pengyu College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
Blockchain has penetrated multiple fields such as finance, healthcare, supply chain, and intelligent transportation. However, the value exchange between different independent blockchain systems limits the expansion of... 详细信息
来源: 评论
Communication-Efficient Federated Learning with Sparsity and Quantization
Communication-Efficient Federated Learning with Sparsity and...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and big data Computing, 2023 International Conference on Cyber science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Long, Zhong Chen, Yuling Dou, Hui Luo, Yun Tan, Chaoyue Sun, Yancheng College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
Google proposed federated learning in 2016, which aims to solve the problems of data silos and privacy leakage in machine learning. However, as the difficulty of the target task increases and the model performance req... 详细信息
来源: 评论
Optimization of cloud computing task scheduling based on whale optimization algorithm with quasi-opposition-based and nonlinear factor  6
Optimization of cloud computing task scheduling based on wha...
收藏 引用
6th International Conference on Internet of Things, Automation and Artificial Intelligence, IoTAAI 2024
作者: Xuan, Xiong Li, Shaobo Yu, Liya Wu, Fengbin Zhang, Xingxing An, Xue College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China Guizhou University College of Mechanical Engineering Guiyang550025 China
Task scheduling has a significant impact on the resource availability and operation cost of the system in cloud computing. In order to improve the efficiency of task execution in the cloud for a given computational re...
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
Face Recognition Based on SRCS Algorithm and Score of Exponential Weighting
Face Recognition Based on SRCS Algorithm and Score of Expone...
收藏 引用
International Conference on Image, Vision and Intelligent Systems, ICIVIS 2023
作者: Zhang, Xuexue Zhang, Yongjun Gao, Weihao Long, Wei Yao, He Sate Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang550025 China
Face recognition is a prominent research area within computer vision, offering significant value across various fields of life, including certificate verification, security systems, and human-computer interactions. No... 详细信息
来源: 评论
An enhanced exponential distribution optimizer for solving task scheduling in cloud computing systems  4
An enhanced exponential distribution optimizer for solving t...
收藏 引用
4th International Conference on Advanced Algorithms and Neural Networks, AANN 2024
作者: Wu, Fengbin Li, Shaobo Wu, Libang Xiong, Xuan Xie, Rongxiang State Key Laboratory of Public Big Data Guizhou University China Guizhou Institute of Technology China College of Computer Science and Technology Guizhou University China
Cloud computing has become integral to information technology, offering a flexible and scalable way to access and utilize computing resources. In cloud computing, task scheduling policies can affect the resource usage... 详细信息
来源: 评论