咨询与建议

限定检索结果

文献类型

  • 223 篇 会议
  • 209 篇 期刊文献

馆藏范围

  • 432 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 295 篇 工学
    • 238 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 78 篇 信息与通信工程
    • 55 篇 电气工程
    • 43 篇 控制科学与工程
    • 34 篇 生物工程
    • 22 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 12 篇 交通运输工程
    • 11 篇 化学工程与技术
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
    • 7 篇 安全科学与工程
  • 128 篇 理学
    • 70 篇 数学
    • 36 篇 生物学
    • 27 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 11 篇 系统科学
    • 10 篇 化学
  • 74 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 14 篇 法学
    • 10 篇 社会学
  • 9 篇 医学
    • 8 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 19 篇 feature extracti...
  • 17 篇 semantics
  • 15 篇 machine learning
  • 13 篇 contrastive lear...
  • 12 篇 privacy
  • 11 篇 graph neural net...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 optimization
  • 8 篇 task analysis
  • 8 篇 anomaly detectio...
  • 8 篇 federated learni...
  • 7 篇 conferences
  • 7 篇 sensors
  • 7 篇 forecasting
  • 6 篇 data privacy
  • 6 篇 speech processin...
  • 6 篇 neural networks
  • 6 篇 data mining
  • 6 篇 computational mo...

机构

  • 54 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 20 篇 key laboratory o...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 chongqing key la...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 10 篇 key laboratory o...
  • 9 篇 key lab. of inte...
  • 9 篇 south china univ...
  • 9 篇 nanjing universi...
  • 9 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 school of comput...
  • 8 篇 chongqing key la...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 20 篇 wang guoyin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 11 篇 tao li
  • 10 篇 xia shuyin
  • 10 篇 liu jun
  • 10 篇 cao xiaochun
  • 8 篇 xiao bin
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 chen ke-jia
  • 7 篇 zou zhiqiang
  • 7 篇 xuemiao xu
  • 7 篇 shengfeng he
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang

语言

  • 372 篇 英文
  • 58 篇 其他
  • 2 篇 中文
检索条件"机构=The Key Laboratory of Cyberspace Big Data Intelligent Security"
432 条 记 录,以下是21-30 订阅
排序:
sSecure Net: A Hybrid CNN-LSTM-based Intrusion Detection System for Securing IoT Networks  25
sSecure Net: A Hybrid CNN-LSTM-based Intrusion Detection Sys...
收藏 引用
Proceedings of the 4th International Conference on Computer, Artificial Intelligence and Control Engineering
作者: Ovi Abul Hussain Zigang Chen Haihua Zhu Chongqing Key Laboratory of Cyberspace Security Monitoring and Governance & Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing China
The widespread deployment of IoT devices has seen the emergence of a huge security threat, and IoT networks are the favorite targets for numerous cyberattacks. Due to the scarce resources in most IoT devices, the conv... 详细信息
来源: 评论
MDPFL:A Multiple Differential Privacy Protection Method based on Federated Learning  26
MDPFL:A Multiple Differential Privacy Protection Method base...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Liu, Xinyu Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China
With the continuous development of artificial intelligence technology, machine learning in distributed network systems, such as IoVflntemet of Vehicles), will inevitably lead to privacy leakage. At present, there are ... 详细信息
来源: 评论
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed Depth Tree in Networks  26
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed ...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Sun, Lei Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Syslog records critical information of network when the system is running, and has been used to help practitioners carry out various network maintenance and operation activities. Because of abundance of syslog, automa... 详细信息
来源: 评论
Economical Electricity Supplement for Mobile Collectors in Large-Scale Multitask WSNs  21
Economical Electricity Supplement for Mobile Collectors in L...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Zhai, Xin Xu, Lijie Zhang, Jialei Wang, Kun Xu, Jia Xu, Bei Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
For large-scale multitask wireless sensor networks (LSM-WSNs), the traditional data collection mode could suffer low energy-efficiency on data transmission, since the large-scale multitask scenarios could result in mu... 详细信息
来源: 评论
Multimodal Image-Text Representation Learning for Sketch-Less Facial Image Retrieval
Multimodal Image-Text Representation Learning for Sketch-Les...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Dawei Dai Yingge Liu Shiyu Fu Guoyin Wang Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing China
Sketch-less facial image retrieval (SLFIR) framework aims to break the barriers that drawing a high-quality facial sketch requires excellent skills and substantial time, it performs the retrieval using a partial sketc... 详细信息
来源: 评论
NGMO: A Novel Geometric Mean Optimizer for Intrusion Detection in Industrial Cyber-Physical Systems
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2025年 3卷 296-308页
作者: Yao, Yunhang Zhang, Zhiyong Zhao, Kejing Wang, Peng Wu, Ruirui Henan International Joint Laboratory of Cyberspace Security Applications College of Information Engineering Luoyang471023 China Henan University of Science and Technology Henan Intelligent Manufacturing Big Data Development Innovation Laboratory Luoyang471023 China China Nonferrous Metals Processing Technology Company Ltd. Luoyang471039 China
Industrial cyber-physical systems (CPS) are experiencing various malicious attacks and encountering increasing security challenges. Although machine learning-based intrusion detection systems can help users quickly de... 详细信息
来源: 评论
Prior Semantic-Embedding Representation Learning for On-the-Fly
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Yingge Dai, Dawei Zhou, Kenan Tan, Xiufang Wu, Yiqiao Wang, Guoyin Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China
In the context of fine-grained sketch-based image retrieval (FG-SBIR) framework, sketch drawing is a time-consuming and skill-intensive process that greatly restricts its practical application. Our study aims to enhan... 详细信息
来源: 评论
GBCT: An Efficient and Adaptive Granular-Ball Clustering Algorithm for Complex data
arXiv
收藏 引用
arXiv 2024年
作者: Xia, Shuyin Shi, Bolun Wang, Yifan Xie, Jiang Wang, Guoyin Gao, Xinbo Chongqing Key Laboratory of Computational Intelligence The Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education The Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China
Traditional clustering algorithms often focus on the most fine-grained information and achieve clustering by calculating the distance between each pair of data points or implementing other calculations based on points... 详细信息
来源: 评论
Granular-ball Representation Learning for Deep CNN on Learning with Label Noise
arXiv
收藏 引用
arXiv 2024年
作者: Dai, Dawei Zhu, Hao Xia, Shuyin Wang, Guoyin Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China
In actual scenarios, whether manually or automatically annotated, label noise is inevitably generated in the training data, which can affect the effectiveness of deep CNN models. The popular solutions require data cle... 详细信息
来源: 评论
DCEL:classifier fusion model for Android malware detection
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第1期35卷 163-177页
作者: XU Xiaolong JIANG Shuai ZHAO Jinbo WANG Xinheng Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computing and Engineering University of West LondonLondon W55RFUK
The rapid growth of mobile applications,the popularity of the Android system and its openness have attracted many hackers and even criminals,who are creating lots of Android ***,the current methods of Android malware ... 详细信息
来源: 评论