咨询与建议

限定检索结果

文献类型

  • 637 篇 期刊文献
  • 557 篇 会议
  • 1 册 图书

馆藏范围

  • 1,195 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 846 篇 工学
    • 573 篇 计算机科学与技术...
    • 470 篇 软件工程
    • 196 篇 信息与通信工程
    • 112 篇 生物工程
    • 88 篇 光学工程
    • 83 篇 控制科学与工程
    • 78 篇 电气工程
    • 74 篇 化学工程与技术
    • 72 篇 生物医学工程(可授...
    • 71 篇 电子科学与技术(可...
    • 44 篇 机械工程
    • 29 篇 交通运输工程
    • 28 篇 材料科学与工程(可...
    • 28 篇 建筑学
    • 27 篇 动力工程及工程热...
    • 26 篇 土木工程
    • 25 篇 仪器科学与技术
  • 436 篇 理学
    • 198 篇 数学
    • 127 篇 生物学
    • 119 篇 物理学
    • 63 篇 统计学(可授理学、...
    • 51 篇 化学
    • 24 篇 系统科学
  • 204 篇 管理学
    • 109 篇 图书情报与档案管...
    • 107 篇 管理科学与工程(可...
    • 28 篇 工商管理
  • 58 篇 医学
    • 53 篇 临床医学
    • 39 篇 基础医学(可授医学...
    • 25 篇 药学(可授医学、理...
  • 31 篇 法学
    • 26 篇 社会学
  • 20 篇 农学
  • 15 篇 经济学
  • 11 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 38 篇 semantics
  • 31 篇 feature extracti...
  • 24 篇 deep learning
  • 23 篇 machine learning
  • 22 篇 training
  • 20 篇 object detection
  • 19 篇 forecasting
  • 16 篇 deep neural netw...
  • 14 篇 task analysis
  • 13 篇 contrastive lear...
  • 12 篇 conferences
  • 12 篇 data mining
  • 10 篇 neural networks
  • 10 篇 computational mo...
  • 10 篇 classification (...
  • 10 篇 data models
  • 9 篇 image segmentati...
  • 9 篇 optimization
  • 9 篇 graph neural net...
  • 9 篇 benchmarking

机构

  • 42 篇 school of cyber ...
  • 38 篇 university of ch...
  • 35 篇 school of comput...
  • 30 篇 national enginee...
  • 28 篇 hubei key labora...
  • 28 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of inform...
  • 22 篇 pazhou lab
  • 22 篇 sjtu-pinghu inst...
  • 19 篇 school of softwa...
  • 18 篇 key lab of data ...
  • 18 篇 department of co...
  • 17 篇 school of inform...
  • 16 篇 fujian provincia...
  • 15 篇 state key lab of...
  • 15 篇 research center ...
  • 14 篇 school of softwa...
  • 14 篇 zhejiang lab

作者

  • 31 篇 jin hai
  • 28 篇 li xirong
  • 22 篇 hai jin
  • 21 篇 liu jun
  • 20 篇 hu shengshan
  • 19 篇 zhou linjie
  • 18 篇 chen jianping
  • 18 篇 lu liangjun
  • 15 篇 zhang leo yu
  • 14 篇 pan jeng-shyang
  • 14 篇 chen hong
  • 13 篇 li cuiping
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 11 篇 zhang lingling
  • 10 篇 jia weijia
  • 10 篇 wan wei
  • 10 篇 yang gang
  • 9 篇 li jingbing
  • 9 篇 xue xingsi

语言

  • 1,092 篇 英文
  • 94 篇 其他
  • 9 篇 中文
检索条件"机构=The Key Lab of Data Engineering and Kowledge Engineering"
1195 条 记 录,以下是611-620 订阅
排序:
An enhanced MinHash encryption scheme for encrypted deduplication
An enhanced MinHash encryption scheme for encrypted deduplic...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Qiaowen Jia Guanxiong Ha Hanwei Wang Haoyu Ma Hang Chen State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Zhejiang Lab Hangzhou China The School of Cyber Engineering Xidian University Xi’an China
The encrypted deduplication can provide both storage savings and data confidentiality for cloud storage systems. Convergent encryption (CE) is a well-known solution for encrypted deduplication, but it brings huge comp... 详细信息
来源: 评论
A Survey on Applications of Reinforcement Learning in Spatial Resource Allocation
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Di Wang, Moyang Mango, Joseph Li, Xiang Xu, Xianrui Key Laboratory of Geographic Information Science Ministry of Education School of Geographic Sciences East China Normal University Shanghai200241 China Department of Transportation and Geotechnical Engineering University of Dar es Salaam Dar es salaam Tanzania United Republic of Shanghai Key Lab for Urban Ecological Processes and Eco-Restoration East China Normal University Shanghai200241 China Key Laboratory of Spatial-Temporal Big Data Analysis and Application of Natural Resources in Megacities Ministry of Natural Resources East China Normal University Shanghai200241 China School of Economics and Management Shanghai University of Sport Shanghai200438 China
The challenge of spatial resource allocation is pervasive across various domains such as transportation, industry, and daily life. As the scale of real-world issues continues to expand and demands for real-time soluti... 详细信息
来源: 评论
Universal deep network for steganalysis of color image based on channel representation
arXiv
收藏 引用
arXiv 2021年
作者: Wei, Kangkang Luo, Weiqi Tan, Shunquan Huang, Jiwu The Guangdong Key Lab of Information Security Technology School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Up to now, most existing steganalytic methods are designed for grayscale images, and they are not suitable for color images that are widely used in current social networks. In this paper, we design a universal color i... 详细信息
来源: 评论
A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on Bandelet-DCT  9th
A Novel Robust Watermarking Algorithm for Encrypted Medical ...
收藏 引用
9th KES International Conference on Innovation in Medicine and Healthcare, KES-InMed 2021
作者: Fang, Yangxiu Liu, Jing Li, Jingbing Yi, Dan Cui, Wenfeng Xiao, Xiliang Han, Baoru Bhatti, Uzair Aslam School of Information and Communication Engineering Hainan University Haikou Hainan China State Key Laboratory of Marine Resource Utilization South China Sea Hainan University Haikou Hainan China Research Center for Healthcare Data Science Zhejiang Lab Hangzhou Zhejiang China College of Medical Informatics Chongqing Medical University Chongqing China Nanjing Normal University Nanjing Jiangsu China
Digital watermarking technology is a good way to solve the problem of image information security. However, in previous studies, watermark is encrypted, but the host image is not encrypted, which causes the leakage of ... 详细信息
来源: 评论
A Zero Watermarking Scheme for Encrypted Medical Images Based on Tetrolet-DCT  9th
A Zero Watermarking Scheme for Encrypted Medical Images Base...
收藏 引用
9th KES International Conference on Innovation in Medicine and Healthcare, KES-InMed 2021
作者: Cui, Wenfeng Liu, Jing Li, Jingbing Fang, Yangxiu Yi, Dan Xiao, Xiliang Bhatti, Uzair Aslam Han, Baoru School of Information and Communication Engineering Hainan University Haikou Hainan China State Key Laboratory of Marine Resource Utilization in the South China Sea Hainan University Haikou Hainan China Research Center for Healthcare Data Science Zhejiang Lab Hangzhou Zhejiang China Nanjing Normal University Nanjing Jiangsu China College of Medical Informatics Chongqing Medical University Chongqing China
Aiming at the problem of medical image leakage in the transmission process, in order to enhance the concealment of patient data, a Tetrolet-DCT based encrypted medical image zero watermarking scheme is proposed. First... 详细信息
来源: 评论
Evidence-aware hierarchical interactive attention networks for explainable claim verification  29
Evidence-aware hierarchical interactive attention networks f...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Wu, Lianwei Rao, Yuan Yang, Xiong Wang, Wanzhen Nazir, Ambreen Lab of Social Intelligence and Complexity Data Processing School of Software Engineering Xi'an Jiaotong University China Shannxi Joint Key Laboratory for Artifact Intelligence Sub-Lab of Xi'an Jiaotong University China Research Institute of Xi'an Jiaotong University Shenzhen China
Exploring evidence from relevant articles to confirm the veracity of claims is a trend towards explainable claim verification. However, most strategies capture the top-k check-worthy articles or salient words as evide... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China University of Texas at Dallas Dallas United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
A Semi-Supervised Approach with Error Reflection for Echocardiography Segmentation
A Semi-Supervised Approach with Error Reflection for Echocar...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xiaoxiang Han Yiman Liu Jiang Shang Qingli Li Jiangang Chen Menghan Hu Qi Zhang Yuqi Zhang Yan Wang School of Communication and Information Engineering Shanghai University Shanghai P.R.China The SMART (Smart Medicine and AI-based Radiology Technology) Lab Shanghai Institute for Advanced Communication and Data Science Shanghai University Shanghai P.R.China Department of Pediatric Cardiology Shanghai Children’s Medical Center School of Medicine Shanghai Jiao Tong University Shanghai P.R.China Shanghai Engineering Research Center of Intelligence Pediatrics (SERCIP) Shanghai P.R.China Shanghai Key Laboratory of Multidimensional Information Processing East China Normal University Shanghai P.R.China
Segmenting internal structure from echocardiography is essential for the diagnosis and treatment of various heart diseases. Semi-supervised learning shows its ability in alleviating annotations scarcity. While existin... 详细信息
来源: 评论
Breaking the curse of space explosion: Towards effcient NAS with curriculum search  37
Breaking the curse of space explosion: Towards effcient NAS ...
收藏 引用
37th International Conference on Machine Learning, ICML 2020
作者: Guo, Yong Chen, Yaofo Zheng, Yin Zhao, Peilin Chen, Jian Huang, Junzhou Tan, Mingkui School of Software Engineering South China University of Technology China Pazhou Laboratory China Weixin Group Tencent China Tencent AI Lab Tencent China Guangdong Key Laboratory of Big Data Analysis and Processing China
Neural architecture search (NAS) has become an important approach to automatically fnd effective architectures. To cover all possible good architectures, we need to search in an extremely large search space with billi... 详细信息
来源: 评论
Breaking the moments condition barrier: no-regret algorithm for bandits with super heavy-tailed payoffs  21
Breaking the moments condition barrier: no-regret algorithm ...
收藏 引用
Proceedings of the 35th International Conference on Neural Information Processing Systems
作者: Han Zhong Jiayi Huang Lin F. Yang Liwei Wang Center for Data Science Peking University Center for Data Science Peking University Pazhou Lab Department of Electrical and Computer Engineering University of California Los Angles Key Laboratory of Machine Perception MOE School of EECS Institute for Artificial Intelligence Peking University
Despite a large amount of effort in dealing with heavy-tailed error in machine learning, little is known when moments of the error can become non-existential: the random noise η satisfies Pr[|η| > |y|] ≤ 1/|y|α...
来源: 评论