咨询与建议

限定检索结果

文献类型

  • 636 篇 期刊文献
  • 596 篇 会议

馆藏范围

  • 1,232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 844 篇 工学
    • 638 篇 计算机科学与技术...
    • 502 篇 软件工程
    • 191 篇 信息与通信工程
    • 123 篇 电气工程
    • 117 篇 控制科学与工程
    • 100 篇 生物工程
    • 69 篇 生物医学工程(可授...
    • 53 篇 光学工程
    • 51 篇 电子科学与技术(可...
    • 45 篇 化学工程与技术
    • 40 篇 机械工程
    • 40 篇 网络空间安全
    • 31 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
    • 23 篇 建筑学
  • 401 篇 理学
    • 211 篇 数学
    • 124 篇 生物学
    • 76 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 47 篇 化学
    • 31 篇 系统科学
  • 224 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 50 篇 工商管理
  • 79 篇 医学
    • 68 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 29 篇 公共卫生与预防医...
    • 29 篇 药学(可授医学、理...
  • 53 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 22 篇 农学
  • 6 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 48 篇 feature extracti...
  • 47 篇 deep learning
  • 37 篇 semantics
  • 33 篇 computational mo...
  • 32 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 21 篇 machine learning
  • 21 篇 cloud computing
  • 20 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 convolution
  • 19 篇 privacy
  • 17 篇 big data
  • 17 篇 neural networks
  • 17 篇 contrastive lear...
  • 17 篇 accuracy
  • 16 篇 image segmentati...
  • 16 篇 optimization
  • 16 篇 predictive model...

机构

  • 125 篇 state key labora...
  • 77 篇 state key labora...
  • 37 篇 college of compu...
  • 34 篇 key laboratory o...
  • 33 篇 college of compu...
  • 32 篇 fujian provincia...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 25 篇 college of compu...
  • 24 篇 college of compu...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 20 篇 guizhou universi...
  • 19 篇 college of compu...
  • 19 篇 guizhou provinci...
  • 18 篇 state key labora...
  • 18 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 14 篇 guizhou provinci...
  • 14 篇 college of compu...

作者

  • 36 篇 tian youliang
  • 33 篇 chen yuling
  • 28 篇 yuling chen
  • 28 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 peng changgen
  • 16 篇 qin yongbin
  • 16 篇 li shaobo
  • 14 篇 shen linlin
  • 13 篇 shaobo li
  • 13 篇 chen yanping
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 changgen peng
  • 12 篇 wang lihui
  • 12 篇 chu shu-chuan
  • 12 篇 xiong jinbo
  • 11 篇 tan weijie
  • 11 篇 huang ruizhang
  • 11 篇 tao li

语言

  • 1,084 篇 英文
  • 134 篇 其他
  • 17 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1232 条 记 录,以下是81-90 订阅
排序:
CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain
CHSTS: Chameleon Hash based on Schnorr threshold signature o...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and big data Computing, 2023 International Conference on Cyber science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Yuan, Linlin Yang, Yuxiang Tan, Chaoyue Dou, Hui Luo, Yun Chen, Yuling College of Information Engineering Guizhou Open University Guiyang China College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
Blockchain's immutability, while a core feature, can pose challenges in cases involving sensitive information or compliance with legal regulations, hindering its development. Many subsequent works designed editabl... 详细信息
来源: 评论
An Effective Security Comparison Protocol in Cloud Computing
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5141-5158页
作者: Yuling Chen Junhong Tao Tao Li Jiangyuan Cai Xiaojun Ren State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550000China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin550000China POWERCHINA Guizhou Electric Power Engineering Co. Ltd.Guiyang550000China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and TechnologyWeifang261000China
With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and *** this can save customers’operating costs,it also poses privacy and se... 详细信息
来源: 评论
An Improved YOLOv5s-Based Smoke Detection System for Outdoor Parking Lots
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 3333-3349页
作者: Ruobing Zuo Xiaohan Huang Xuguo Jiao Zhenyong Zhang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Information and Control Engineering Qingdao University of TechnologyQingdao266520China State Key Laboratory of Industrial Control Technology College of Control Science and EngineeringZhejiang UniversityHangzhou310027China Key Laboratory of Computing Power Network and Information Security Ministry of EducationQilu University of Technology(Shandong Academy of Sciences)Jinan250353China Text Computing&Cognitive Intelligence Engineering Research Center of National Education Ministry Guizhou UniversityGuiyang550025China
In the rapidly evolving urban landscape,outdoor parking lots have become an indispensable part of the city’s transportation *** growth of parking lots has raised the likelihood of spontaneous vehicle combus-tion,a si... 详细信息
来源: 评论
LGMD-based Neural Network for Detecting Abnormal Velocity Targets in Moving Crowd  9
LGMD-based Neural Network for Detecting Abnormal Velocity Ta...
收藏 引用
9th International Symposium on computer and Information Processing technology, ISCIPT 2024
作者: Zhao, Zhongxiang Hu, Bin Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Guizhou University College of Computer Science & Technology Department of Computer Science Guiyang550025 China Artificial Intelligence Research Institute of Guizhou University Guizhou University Guiyang550025 China
Detecting abnormal velocity targets is critical especially in public surveillance for crowd activity monitoring. Although there are some explorations on one such issue, traditional methods still perform poorly in comp... 详细信息
来源: 评论
Continuous and generalized visual odometry based on FLANN_PSC-RANSAC_LSTM
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第1-2期47卷 15-28页
作者: Li, Dengao Feng, Ran Wu, Fanming Zhao, Jinhua Zhao, Jumin College of Computer Science and Technology College of Data Science Taiyuan University of Technology Shanxi Taiyuan China College of Electronic Information and Optical Engineering Taiyuan University of Technology Shanxi Taiyuan China Key Laboratory of Big Data Fusion Analysis and Application of Shanxi Province Taiyuan University of Technology Shanxi Taiyuan China Intelligent Perception Engineering Technology Center of Shanxi Taiyuan China
In the field of simultaneous localization and mapping (SLAM), visual odometry (VO) always has great application prospects. In recent years, with the progress in the field of machine learning, methods based on neural n... 详细信息
来源: 评论
VFLF: A verifiable federated learning framework against malicious aggregators in Industrial Internet of Things
VFLF: A verifiable federated learning framework against mali...
收藏 引用
作者: Zhou, Zhou Tian, Youliang Peng, Changgen Yang, Nan Long, Shigong State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang China Institute of Cryptography and Data Security Guizhou University Guizhou Guiyang China
As an important approach to overcome data silos and privacy concerns in deep learning, federated learning, which can jointly train the global model and keep data local, has shown remarkable performance in a range of i... 详细信息
来源: 评论
IGED:Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1851-1866页
作者: Yanhua Liu Yuting Han HuiChen Baokang Zhao XiaofengWang Ximeng Liu College of Computer and Data Science Fuzhou UniversityFuzhou350108China Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou350108China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350108China College of Computer National University of Defense TechnologyChangsha410073China
As the scale of the networks continually expands,the detection of distributed denial of service(DDoS)attacks has become increasingly *** propose an intelligent detection model named IGED by using improved generalized ... 详细信息
来源: 评论
AI-Enhanced Secure data Aggregation for Smart Grids with Privacy Preservation
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 799-816页
作者: Congcong Wang Chen Wang Wenying Zheng Wei Gu School of Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information Science and Engineering Zhejiang Sci-Tech UniversityHangzhou310018China State Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China School of Computer Science and Technology(School of Artificial Intelligence) Zhejiang Sci-Tech UniversityHangzhou310018China School of Computer Science(School of Cyber Science and Engineering) Nanjing University of Information Science and TechnologyNanjing210044China
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy conce... 详细信息
来源: 评论
Channel assignment and power allocation for throughput improvement with PPO in B5G heterogeneous edge networks
收藏 引用
Digital Communications and Networks 2024年 第1期10卷 109-116页
作者: Xiaoming He Yingchi Mao Yinqiu Liu Ping Ping Yan Hong Han Hu The College of Computer and Information Hohai UniversityNanjingChina The Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai UniversityNanjing China The School of Computer Science and Engineering Nanyang Technological UniversitySingapore The College of Textile and Clothing Engineering Soochow UniversitySuzhouChina The College of Internet of Things Nanjing University of Posts and TelecomurunicationsNanjingChina
In Beyond the Fifth Generation(B5G)heterogeneous edge networks,numerous users are multiplexed on a channel or served on the same frequency resource block,in which case the transmitter applies coding and the receiver u... 详细信息
来源: 评论
Multi-scale cyclical similarity prototype refinement for few-shot breast ultrasound image segmentation  17
Multi-scale cyclical similarity prototype refinement for few...
收藏 引用
17th IEEE International Conference on Signal Processing, ICSP 2024
作者: Ou, Yingfeng Yang, Xing Zhang, Jian Jian, Caiqing Wang, Lihui College of Computer Science and Technology Guizhou University Key Laboratory of Intelligent Medical Image Analysis and Precise Diagnosis of Guizhou Province State Key Laboratory of Public Big Data Engineering Research Center of Text Computing Ministry of Education Guiyang China
Few-shot learning based methods can address the reliance on large-scale labeled samples in current breast tumor segmentation. However, previous methods typically rely on a few support samples to extract abstract, coar... 详细信息
来源: 评论