咨询与建议

限定检索结果

文献类型

  • 386 篇 期刊文献
  • 170 篇 会议

馆藏范围

  • 556 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 341 篇 工学
    • 196 篇 计算机科学与技术...
    • 160 篇 软件工程
    • 64 篇 信息与通信工程
    • 59 篇 电气工程
    • 42 篇 控制科学与工程
    • 38 篇 电子科学与技术(可...
    • 32 篇 生物工程
    • 24 篇 仪器科学与技术
    • 19 篇 生物医学工程(可授...
    • 18 篇 机械工程
    • 16 篇 化学工程与技术
    • 15 篇 力学(可授工学、理...
    • 14 篇 动力工程及工程热...
    • 14 篇 网络空间安全
    • 13 篇 环境科学与工程(可...
    • 12 篇 安全科学与工程
  • 275 篇 理学
    • 151 篇 数学
    • 68 篇 物理学
    • 51 篇 生物学
    • 44 篇 统计学(可授理学、...
    • 35 篇 系统科学
    • 22 篇 化学
    • 22 篇 地球物理学
  • 64 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 22 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 54 篇 医学
    • 41 篇 临床医学
    • 25 篇 公共卫生与预防医...
    • 20 篇 基础医学(可授医学...
  • 13 篇 法学
    • 11 篇 社会学
  • 13 篇 农学
  • 8 篇 经济学
  • 4 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学

主题

  • 13 篇 deep learning
  • 11 篇 blockchain
  • 11 篇 privacy
  • 10 篇 machine learning
  • 10 篇 data models
  • 9 篇 polarization
  • 9 篇 simulation
  • 9 篇 synchronization
  • 8 篇 covid-19
  • 8 篇 data privacy
  • 7 篇 neural networks
  • 7 篇 computational mo...
  • 7 篇 security
  • 6 篇 reinforcement le...
  • 6 篇 semantics
  • 6 篇 federated learni...
  • 6 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 semantic segment...
  • 5 篇 diagnosis

机构

  • 91 篇 state key labora...
  • 57 篇 state key labora...
  • 40 篇 school of mechan...
  • 21 篇 guizhou universi...
  • 17 篇 nasa marshall sp...
  • 16 篇 guangxi key labo...
  • 15 篇 istituto naziona...
  • 15 篇 dipartimento di ...
  • 15 篇 dipartimento di ...
  • 15 篇 istituto naziona...
  • 15 篇 dipartimento di ...
  • 15 篇 université de st...
  • 15 篇 california insti...
  • 15 篇 department of as...
  • 15 篇 inaf osservatori...
  • 15 篇 department of ph...
  • 14 篇 space science da...
  • 14 篇 dipartimento di ...
  • 14 篇 université greno...
  • 14 篇 university of br...

作者

  • 23 篇 li shaobo
  • 16 篇 tian youliang
  • 14 篇 shaobo li
  • 14 篇 yuling chen
  • 13 篇 tan weijie
  • 13 篇 liu ya-feng
  • 13 篇 youliang tian
  • 11 篇 chen yuling
  • 10 篇 jing yang
  • 9 篇 weijie tan
  • 8 篇 omodei nicola
  • 8 篇 marin f.
  • 8 篇 del monte e.
  • 8 篇 iwakiri wataru
  • 8 篇 trois a.
  • 8 篇 heyl j.
  • 8 篇 gunji s.
  • 8 篇 wu k.
  • 8 篇 enoto teruaki
  • 8 篇 taverna r.

语言

  • 430 篇 英文
  • 119 篇 其他
  • 9 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data and School of Mathematics and Statistics"
556 条 记 录,以下是1-10 订阅
排序:
Robust Deep One-Class Classification Time Series Anomaly Detection
收藏 引用
Computers, Materials & Continua 2025年 第6期83卷 5181-5197页
作者: Zhengdao Yang Xuewei Wang Yuling Chen Hui Dou Haiwei Sang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550000China College of Computer Science and Technology Weifang University of Science and TechnologyWeifang261000China School of Mathematics and Big Data Guizhou Education UniversityGuiyang550018China
Anomaly detection(AD)in time series data is widely applied across various industries for monitoring and security applications,emerging as a key research focus within the field of deep *** many methods based on differe... 详细信息
来源: 评论
Security Performance Analysis for MIMO Systems: From Artificial Noise's Power and Dimension Perspective
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第6期74卷 9985-9989页
作者: Xu, Panpan Li, Zhenling Li, Chunguo Tan, Weijie Guizhou University School of Mathematics and Statistics Guiyang550025 China Southeast University School of Information Science and Engineering Nanjing210096 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China
This paper analyzes the influence of power and dimension of artificial noise (AN) on security performance of multiple-input multiple-output (MIMO) system with multiple randomly located eavesdroppers. We derive the clo... 详细信息
来源: 评论
A potential game-based outsourcing computation framework for multiple calculators
收藏 引用
Digital Communications and Networks 2022年 第5期8卷 654-663页
作者: Duo Zhang Youliang Tian Linjie Wang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Mathematics and Statistics Guizhou UniversityGuiyang550025China
Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted *** traditional outsourcing computation model forbids communication between p... 详细信息
来源: 评论
A survey of unmanned aerial vehicle flight data anomaly detection:Technologies,applications,and future directions
收藏 引用
Science China(Technological Sciences) 2023年 第4期66卷 901-919页
作者: YANG Lei LI ShaoBo LI ChuanJiang ZHANG AnSi ZHANG XuDong School of Mechanical Engineering Guizhou UniversityGuiyang 550025China State Key Laboratory of Public Big Data Guizhou UniversityGuiyang 550025China
Flight data anomaly detection plays an imperative role in the safety and maintenance of unmanned aerial vehicles(UAVs).It has attracted extensive attention from ***,the problems related to the difficulty in obtaining ... 详细信息
来源: 评论
Self-supervised probabilistic models for exploring shape memory alloys
收藏 引用
npj Computational Materials 2024年 第1期10卷 1338-1347页
作者: Yiding Wang Tianqing Li Hongxiang Zong Xiangdong Ding Songhua Xu Jun Sun Turab Lookman State Key Laboratory for Mechanical Behavior of Materials Xi’an Jiaotong UniversityXi’an710049China National Engineering Laboratory for Big Data Analytics School of Mathematics and StatisticsXi’an Jiaotong UniversityXi’an710049China AiMaterials Research LLC Santa FeNM87501USA
Recent advancements in machine learning(ML)have revolutionized the field of high-performance materials ***,developing robust ML models to decipher intricate structure-property relationships in materials remains challe... 详细信息
来源: 评论
Asynchronous Parallel Stochastic Proximal Gradient Methods for Non-Convex Composite Optimization
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2025年 第2期10卷 638-662页
作者: He, Wen-Wu Gong, Xuan-Jin Cui, Zhuo-Xu School of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fuzhou350118 China School of Mathematics and Statistics Wuhan University Wuhan430072 China
This paper considers the parallel stochastic composite optimization for general asynchronous cases where both the objective function and the regularizer are non-convex. In particular, based on the randomized stochasti... 详细信息
来源: 评论
On Boolean elements and derivations in 2-dimension linguistic lattice implication algebras
收藏 引用
Applied mathematics(A Journal of Chinese Universities) 2023年 第2期38卷 274-292页
作者: ZHU Hua ZHAO Jian-bin School of Mathematics and Statistics Zhengzhou UniversityZhengzhou 450001China Henan Academy of Big Data Zhengzhou UniversityZhengzhou 450001China Henan Key Laboratory of Financial Engineering Zhengzhou 450001China Key Laboratory of Big Data Analysis and Application Zhengzhou 450001China
A 2-dimension linguistic lattice implication algebra(2DL-LIA)can build a bridge between logical algebra and 2-dimension fuzzy linguistic *** this paper,the notion of a Boolean element is proposed in a 2DL-LIA and some... 详细信息
来源: 评论
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1435-1446页
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State Key Laboratory of Public Big Data Guizhou University Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Engineering Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ... 详细信息
来源: 评论
data-driven unsupervised anomaly detection and recovery of unmanned aerial vehicle flight data based on spatiotemporal correlation
收藏 引用
Science China(Technological Sciences) 2023年 第5期66卷 1304-1316页
作者: YANG Lei LI ShaoBo LI ChuanJiang ZHU CaiChao ZHANG AnSi LIANG GuoQiang School of Mechanical Engineering Guizhou UniversityGuiyang550025China State Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China State Key Laboratory of Mechanical Transmission Chongqing UniversityChongqing400044China
Anomaly detection is crucial to the flight safety and maintenance of unmanned aerial vehicles(UAVs)and has attracted extensive attention from ***-based approaches rely on prior knowledge,while model-based approaches a... 详细信息
来源: 评论
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 265-272页
作者: Yuling Chen Xiong Yang Tao Li Yi Ren Yangyang Long State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Computing Science University of East AngliaNorwichNR57TJUK
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and *** special structure of WSN brings both convenience and *** example,a malicious participa... 详细信息
来源: 评论