咨询与建议

限定检索结果

文献类型

  • 548 篇 期刊文献
  • 533 篇 会议

馆藏范围

  • 1,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 513 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 195 篇 信息与通信工程
    • 120 篇 电气工程
    • 115 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 32 篇 交通运输工程
    • 29 篇 网络空间安全
    • 27 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 334 篇 理学
    • 170 篇 数学
    • 88 篇 生物学
    • 80 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 182 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 38 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 44 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 optimization
  • 20 篇 machine learning
  • 19 篇 graph neural net...
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 contrastive lear...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 15 篇 robustness
  • 13 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 huazhong univers...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 20 篇 wang guoyin
  • 20 篇 hai jin
  • 18 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 wang haoyu
  • 12 篇 feng gao

语言

  • 928 篇 英文
  • 142 篇 其他
  • 9 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1081 条 记 录,以下是1051-1060 订阅
排序:
Contract for Difference (CfD) Energy Decomposition Model for Maximizing Social Benefit in Electricity Market
Contract for Difference (CfD) Energy Decomposition Model for...
收藏 引用
World Congress on intelligent Control and Automation
作者: Zelin Nie Feng Gao Jiang Wu Xiaohong Guan Kun Liu State Key Laboratory for Manufacturing System Engineering Xi'an Jiaotong University Xi'an Systems Engineering Institute and Ministry of Educational Key Lab for Intelligent Networks and Networks Security Xi'an Jiaotong University Xi'an
During a process of energy transaction in electricity market, in order to ensure electrical safety and prevent excessively quick growth of electricity price, the concept of contract for difference (CfD) is introduced.... 详细信息
来源: 评论
Dynamic Locational Marginal Prices Based Zonal Division in Large-Scale Regional Electricity Markets
Dynamic Locational Marginal Prices Based Zonal Division in L...
收藏 引用
World Congress on intelligent Control and Automation
作者: Nana Yao Jiang Wu Kun Liu Jing Cai Systems Engineering Institute and Ministry of Educational Key Lab for Intelligent Networks and Networks Security Xi'an Jiaotong University Xi'an 710049 State Key Laboratory for Manufacturing System Engineering Xi'an Jiaotong University Xi'an 710049
Price indicators are considered as the core of optimal allocation of resources in electricity markets. Zonal pricing can provide more flexible price signals than nodal pricing and uniform pricing, and a reasonable div... 详细信息
来源: 评论
Permutation Flow Shop Scheduling With Delay Time Under Time-Of-Use Electricity Tariffs
Permutation Flow Shop Scheduling With Delay Time Under Time-...
收藏 引用
World Congress on intelligent Control and Automation
作者: Xingrui Cheng Feng Gao Chaobo Yan Xiaohong Guan Kun Liu Siyun Chen Nana Yao Jing Cai State Key Laboratory for Manufacturing System Engineering Xi'an Jiaotong University Xi'an 710049 Systems Engineering Institute and Ministry of Educational Key Lab for Intelligent Networks and Networks Security Xi'an Jiaotong University Xi'an 710049
Worldwide energy crisis and global economic depression make reducing electricity costs has become a focus for many factory managers. This paper set up a Permutation Flow Shop Scheduling (PFSS) model with delay time, w... 详细信息
来源: 评论
Robust low-rank tensor factorization by cyclic weighted median
收藏 引用
Science China(Information Sciences) 2015年 第5期58卷 145-155页
作者: MENG DeYu ZHANG Biao XU ZongBen ZHANG Lei GAO ChenQiang Institute for Information and System Sciences and Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Department of Computing Hong Kong Polytechnic University Chongqing Key Laboratory of Signal and Information Processing Chongqing University of Posts and Telecommunications
Low-rank tensor factorization(LRTF) provides a useful mathematical tool to reveal and analyze multi-factor structures underlying data in a wide range of practical applications. One challenging issue in LRTF is how to ... 详细信息
来源: 评论
Classification Based on Multilayer Extreme Learning Machine for Motor Imagery Task from EEG Signals
收藏 引用
Procedia Computer Science 2016年 88卷 176-184页
作者: Lijuan Duan Menghu Bao Jun Miao Yanhui Xu Juncheng Chen College of Computer Science and Technology Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing 100124 China Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology CAS Beijing 100190 China Beijing Key Laboratory on Integration and Analysis of Large-scale Stream Data Beijing 100124 China
Classification of motor imagery electroencephalogram (EEG) is one of the most important technologies for BCI. To improve the accuracy, this paper introduces a classification system based on Multilayer Extreme Learning... 详细信息
来源: 评论
security warning method and system for worker safety during live-line working
收藏 引用
IOP Conference Series: Materials Science and Engineering 2017年 第1期231卷
作者: Chilong Jiang Dehua Zou Chenhai Long Miao Yang Zhanlong Zhang Daojun Mei Hunan Live Working Center of State Grid Xingsha Economic and Technology District Changsha Hunan 410100 China Hunan Province Key Laboratory of Intelligent Live Working Technology and Equipment Xingsha Economic and Technology District Changsha Hunan 410100 China State Key Laboratory of Power Transmission Equipment & System Security and New Technology (Chongqing University) Shapingba District Chongqing 400030 China
Live-line working is an essential part in the operations in an electric power system. Live-line workers are required to wear shielding clothing. Shielding clothing, however, acts as a closed environment for the human ...
来源: 评论
A hybrid-integrated external cavity laser with ultra-wide wavelength tuning range and high side-mode suppression
A hybrid-integrated external cavity laser with ultra-wide wa...
收藏 引用
Optical Fiber Communication Conference, OFC 2016
作者: Guo, Yuyao Li, Xinhang Xu, Weihan Liu, Chuxin Jin, Minhui Lu, Liangjun Xie, Jingya Stroganov, Anton Chen, Jianping Zhou, Linjie State Key Laboratory of Advanced Optical Communication Systems and Networks Shanghai Institute for Advanced Communication and Data Science Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China SJTU-Pinghu Institute of Intelligent Optoelectronics Pinghu314200 China Terahertz Technology Innovation Research Institute Terahertz Spectrum and Imaging Technology Cooperative Innovation Center Shanghai Key Lab of Modern Optical System University of Shanghai for Science and Technology Shanghai200093 China LIGENTEC SA EPFL Innovation Park Bâtiment L Ecublens1024 Switzerland
We present a III-V/Si3N4 hybrid-integrated tunable laser. The laser shows a record of ~170-nm tuning range with a side mode suppression ratio above 64 dB and an intrinsic linewidth below 2.8 kHz. © 2022 The Autho...
来源: 评论
An economic dispatch model based on scenario tree in industrial micro-grid with wind power  27
An economic dispatch model based on scenario tree in industr...
收藏 引用
27th Chinese Control and Decision Conference, CCDC 2015
作者: Ding, Hao Gao, Feng Liu, Kun Guan, Xiaohong State Key Laboratory for Manufacturing System Engineering Xi'An Jiaotong University Xi'an China Ministry of Education Key Lab for Intelligent Networks and Networks Security Xi'An Jiaotong University Xi'an China
Wind power is a kind of clean and renewable energy, and it is of great benefit to utilize it in an industrial micro-grid. This paper establishes an economic dispatch model of industrial micro-grid with wind power that... 详细信息
来源: 评论
Simulate Human Saccadic Scan-Paths in Target Searching
收藏 引用
International Journal of Intelligence Science 2016年 第1期6卷 1-9页
作者: Lijuan Duan Jun Miao David M. W. Powers Jili Gu Laiyun Qing Beijing Key Laboratory of Trusted Computing Beijing Key Laboratory on Integration and Analysis of Large-Scale Stream Data College of Computer Science and Technology Beijing University of Technology Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences(CAS) Institute of Computing Technology CAS Beijing China School of Computer Science Engineering & Maths Flinders University of South Australia Adelaide South Australia Beijing Samsung Telecom R&D Center Beijing China University of Chinese Academy of Sciences Beijing China
Human saccade is a dynamic process of information pursuit. There are many methods using either global context or local context cues to model human saccadic scan-paths. In contrast to them, this paper introduces a mode... 详细信息
来源: 评论
Improved MILP modeling for automatic security evaluation and application to fox
Improved MILP modeling for automatic security evaluation and...
收藏 引用
作者: Qiao, Kexin Hu, Lei Sun, Siwei Ma, Xiaoshuang Kan, Haibin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing100093 China University of Chinese Academy of Sciences Beijing100049 China Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China
Counting the number of differentially active S-boxes is of great importance in evaluating the security of a block cipher against differential attack. Mouha et al. proposed a technique based on Mixed-Integer Linear Pro... 详细信息
来源: 评论