咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 8 篇 会议

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 7 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 5 篇 生物工程
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 纺织科学与工程
    • 1 篇 网络空间安全
  • 7 篇 理学
    • 5 篇 生物学
    • 1 篇 数学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...

主题

  • 5 篇 deep learning
  • 2 篇 three-dimensiona...
  • 2 篇 wireless communi...
  • 2 篇 estimation
  • 2 篇 shape
  • 2 篇 solid modeling
  • 1 篇 internet of thin...
  • 1 篇 singer model
  • 1 篇 extrapolation
  • 1 篇 conferences
  • 1 篇 deep neural netw...
  • 1 篇 signal processin...
  • 1 篇 interacting mult...
  • 1 篇 kalman filter
  • 1 篇 privacy-preservi...
  • 1 篇 intelligent rail...
  • 1 篇 spatial resoluti...
  • 1 篇 contrastive lear...
  • 1 篇 servers
  • 1 篇 digital storage

机构

  • 8 篇 zhejiang key lab...
  • 4 篇 jiangsu key lab ...
  • 4 篇 state key labora...
  • 4 篇 key lab of intel...
  • 2 篇 the third resear...
  • 2 篇 zhejiang key lab...
  • 2 篇 inria bretagne r...
  • 2 篇 binjiang institu...
  • 2 篇 beijing key labo...
  • 1 篇 department of co...
  • 1 篇 college of lette...
  • 1 篇 zhengzhou univer...
  • 1 篇 state key labora...
  • 1 篇 vehicle engineer...
  • 1 篇 key laboratory o...
  • 1 篇 school of automa...
  • 1 篇 institute of com...
  • 1 篇 zhejiang key lab...
  • 1 篇 school of mechan...
  • 1 篇 itrust singapore...

作者

  • 7 篇 wang bin
  • 4 篇 bin wang
  • 3 篇 wang wei
  • 3 篇 kangkan wang
  • 3 篇 guofeng zhang
  • 3 篇 jian yang
  • 2 篇 baigen cai
  • 2 篇 li qiang
  • 2 篇 han yufei
  • 2 篇 han xu
  • 2 篇 bao xuhua
  • 2 篇 cao hongbo
  • 2 篇 yongsheng zhu
  • 2 篇 wei wang
  • 1 篇 zhao sunhang
  • 1 篇 lin xiaodong
  • 1 篇 zhang yadong
  • 1 篇 wang xinyuan
  • 1 篇 jiao dai
  • 1 篇 wanqi wang

语言

  • 18 篇 英文
  • 1 篇 其他
检索条件"机构=Zhejiang Key Laboratory of Multi-Dimensional Perception Technology"
19 条 记 录,以下是1-10 订阅
排序:
Evolutionary Game-Based Adaptive DT Association and Transfer for Wireless Computing Power Networks
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and Networking 2024年 第2期9卷 1-1页
作者: Zhang, Yadong Wang, Peng Wang, Qubeijian Zhang, Haibin Xu, Lexi Sun, Wen Wang, Bin School of Cybersecurity Northwestern Polytechnical University Xi’an China School of Cyber Engineering Xidian University Xi’an China Research Institute China United Network Communications Corporation Beijing China Zhejiang Key Laboratory of Multi-Dimensional Perception Technology Application and Cybersecurity Hangzhou China
Wireless Computing Power Networks (WCPN), guided by green principles, aim to provide efficient, flexible, and environmentally friendly computing services for Internet of Things (IoT) applications by seamlessly coordin... 详细信息
来源: 评论
Towards robust data augmentation for sequence recommendation  16
Towards robust data augmentation for sequence recommendation
收藏 引用
16th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, CyberC 2024
作者: Chen, Yan Zhao, Sunhang Wang, Xinyuan Jin, Zhengxuan Lin, Zekai Wang, Bin The Third Research Institute of the Ministry of Public Security Shanghai China College of Letters and Science United States Zhejiang Gongshang University Computer Science and Technology China Binjiang Institute of Zhejiang University China Zhengzhou University School of Computer and Artificial Intelligence China Zhejiang Key Laboratory of Multi-Dimensional Perception Technology Application and Cybersecurity China
This paper presents RAS-Rec, a novel and robust approach to sequence recommendation that leverages the power of data augmentation techniques. RAS-Rec proposes data augmentation as a means to enhance the representation... 详细信息
来源: 评论
Privacy-Preserving Large-Scale AI Models for Intelligent Railway Transportation Systems:Hierarchical Poisoning Attacks and Defenses in Federated Learning
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第11期141卷 1305-1325页
作者: Yongsheng Zhu Chong Liu Chunlei Chen Xiaoting Lyu Zheng Chen Bin Wang Fuqiang Hu Hanxi Li Jiao Dai Baigen Cai Wei Wang School of Automation and Intelligence Beijing Jiaotong UniversityBeijing100044China Institute of Computing Technologies China Academy of Railway Sciences Corporation LimitedBeijing100081China School of Computer Science and Technology Beijing Jiaotong UniversityBeijing100044China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong UniversityBeijing100044China Institute of Infrastructure Inspection China Academy of Railway Sciences Corporation LimitedBeijing100081China Zhejiang Key Laboratory of Multi-Dimensional Perception Technology Application and CybersecurityHangzhou310053China
The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system *** learning offers a promising... 详细信息
来源: 评论
Model-Driven Channel Extrapolation for Massive Fluid Antenna
Model-Driven Channel Extrapolation for Massive Fluid Antenna
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Guo Li Haibin Zhang Chengcai Wang Bin Wang School of Cyber Engineering Xi-dian University Xi'an China School of Mechanical Engineering Beihang University Beijing China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Hangzhou China
Fluid antenna (FA), with its unique adaptability and precise signal control capabilities, have emerged as potential components for the future of wireless communication. However, the massive number of ports in FA poses... 详细信息
来源: 评论
Hey! You Photographed My Screen without Approved: A Practical Screen Content Protection Scheme Based on Visual Cryptography
Hey! You Photographed My Screen without Approved: A Practica...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Liu, Kui Wang, Bin Shi, Ziwei Chen, Jiadong Zhang, Zhiwei School of Computer Science and Technology Xidian University Shaanxi Xi’an710071 China Network and Information Security Laboratory Hangzhou Hikvision Digital Technology Co. LTD. Hangzhou China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Application and Cybersecurity Hangzhou310053 China
Nowadays , with the continuous development of digital media, electronic screens have become the most direct tool for people to interact with information. Various styles of electronic screens provide vivid information ... 详细信息
来源: 评论
PAGE: Equilibrate Personalization and Generalization in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Qian Wang, Zilong Hu, Jiaqi Yan, Haonan Zhou, Jianying Lin, Xiaodong State Key Laboratory of Integrated Service Networks Xidian University Xi’an China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Application and Cybersecurity Zhejiang China iTrust Singapore University of Technology and Design Singapore Singapore School of Computer Science University of Guelph Guelph Canada
Federated learning (FL) is becoming a major driving force behind machine learning as a service, where customers (clients) collaboratively benefit from shared local updates under the orchestration of the service provid... 详细信息
来源: 评论
Clothed Human Performance Capture with a Double-layer Neural Radiance Fields
Clothed Human Performance Capture with a Double-layer Neural...
收藏 引用
2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023
作者: Wang, Kangkan Zhang, Guofeng Cong, Suxu Yang, Jian Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education China Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of CAD&CG Zhejiang University China
This paper addresses the challenge of capturing performance for the clothed humans from sparse-view or monocular videos. Previous methods capture the performance of full humans with a personalized template or recover ... 详细信息
来源: 评论
Bfs2adv: Black-Box Adversarial Attack Towards Hard-to-Attack Short Texts
SSRN
收藏 引用
SSRN 2023年
作者: Han, Xu Li, Qiang Cao, Hongbo Wang, Bin Bao, Xuhua Han, Yufei Wang, Wei Beijing Key Laboratory of Security and Privacy of Intelligent Transportation Beijing Jiaotong University Beijing100044 China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Zhejiang University Hangzhou310027 China Sangfor Technologies Inc Shenzhen518055 China INRIA Bretagne Rennes35042 France
The advent of Machine Learning as a Service (MLaaS) and deep learning applications has increased the susceptiblility of models to adversarial textual attacks, particularly in black-box settings. Prior work on black-bo... 详细信息
来源: 评论
Towards robust data augmentation for sequence recommendation
Towards robust data augmentation for sequence recommendation
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Yan Chen Sunhang Zhao Xinyuan Wang Zhengxuan Jin Zekai Lin Bin Wang The Third Research Institute of the Ministry of Public Security Shanghai China College of Letters and Science University of California Santa Barbara (UCSB) Computer Science and Technology Zhejiang Gongshang University China Binjiang Institute of Zhejiang University China School of Computer and Artificial Intelligence Zhengzhou University China Zhejiang Key Laboratory of Multi-Dimensional Perception Technology Application and Cybersecurity China
This paper presents RAS-Rec, a novel and robust approach to sequence recommendation that leverages the power of data augmentation techniques. RAS-Rec proposes data augmentation as a means to enhance the representation...
来源: 评论
Two-in-One Solution: Simultaneously Enhancing Security and Privacy for Data-Driven Models in Mobile Edge Computing
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Liu, Pengrui Yuan, Xiaohan Wang, Wei Xu, Xiangrui Li, Tao Wang, Junyong Wang, Bin Pedrycz, Witold Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation 3 Shangyuancun Beijing100044 China Haihe Lab of ITAI Tianjin300450 China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Application and Cybersecurity Hangzhou310053 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 2R3 Canada
Data-driven models are widely employed in Mobile Edge Computing to satisfy the demands of Emerging Consumer Applications. However, previous work demonstrates that data-driven models are susceptible to security threats... 详细信息
来源: 评论