咨询与建议

限定检索结果

文献类型

  • 548 篇 期刊文献
  • 533 篇 会议

馆藏范围

  • 1,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 513 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 195 篇 信息与通信工程
    • 120 篇 电气工程
    • 115 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 32 篇 交通运输工程
    • 29 篇 网络空间安全
    • 27 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 334 篇 理学
    • 170 篇 数学
    • 88 篇 生物学
    • 80 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 182 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 38 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 44 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 optimization
  • 20 篇 machine learning
  • 19 篇 graph neural net...
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 contrastive lear...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 15 篇 robustness
  • 13 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 huazhong univers...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 20 篇 wang guoyin
  • 20 篇 hai jin
  • 18 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 wang haoyu
  • 12 篇 feng gao

语言

  • 928 篇 英文
  • 142 篇 其他
  • 9 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1081 条 记 录,以下是1071-1080 订阅
排序:
Research on fractional order controller based on best rational approximation approach
收藏 引用
Journal of Convergence Information Technology 2012年 第4期7卷 50-58页
作者: Zhao, Huimin Nie, Bing Li, Wen Deng, Wu Software Institute Dalian Jiaotong University Dalian 116028 China Key Laboratory of Numerical Simulation in the Sichuan Provincial College Neijiang Normal University Neijiang 641112 China Artificial Intelligence Key Laboratory of Sichuan Province Sichuan University of Science and Engineering Zigong 643000 China State Key Laboratory of Power Transmission Equipment and System Security and New Technology College of Electrical Engineering Chongqing University Chongqing 400044 China Key Laboratory of advanced Design and Intelligent Computing Dalian University Ministry of Education Dalian 116622 China
Introduce the basic concept of best rational approximation and constructing procedure of the best rational approximation function in Laplace domain. By an illustrative example the design method of FOC based on best ra... 详细信息
来源: 评论
Cryptanalysis of a lattice-knapsack mixed public key cryptosystem
Cryptanalysis of a lattice-knapsack mixed public key cryptos...
收藏 引用
11th International Conference on Cryptology and Network security, CANS 2012
作者: Xu, Jun Hu, Lei Sun, Siwei Wang, Ping State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China University of Chinese Academy of Sciences Beijing 100049 China School of Mathematical Science Anhui University Hefei 230601 Anhui China Tian Jin Zhong Wei Aerospace Data System Technology Co. Ltd. China Aerospace Science and Technology Corporation Beijing 100086 China Space Star Technology Co. Ltd. China Aerospace Science and Technology Corporation Beijing 100086 China Institute No.503 of the Fifth Research Academy China Aerospace Science and Technology Corporation Beijing 100086 China
Recently, a lattice based public key cryptosystem mixed with a knapsack was presented in the CANS 2011 conference. In this paper, we propose two message recovery attacks on this cryptosystem. The first one is a broadc... 详细信息
来源: 评论
MUSIZ: A generic framework for music resizing with stretching and cropping  11
MUSIZ: A generic framework for music resizing with stretchin...
收藏 引用
19th ACM International Conference on Multimedia ACM Multimedia 2011, MM'11
作者: Zhang, Liu Wang, Chaokun Ba, Yiyuan Wang, Hao Wang, Jianmin Department of Computer Science and Technology Tsinghua University China School of Software Tsinghua University Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security Ministry of Education China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS China
Content-aware music adaption, i.e. music resizing, in temporal constraints starts drawing attention from multimedia communities because of the need of real-world scenarios, e.g. animation production and radio advertis... 详细信息
来源: 评论
A Traffic congestion detection method for surveillance videos based on Macro optical flow Velocity
A Traffic congestion detection method for surveillance video...
收藏 引用
11th International Conference of Chinese Transportation Professionals: Towards Sustainable Transportation systems, ICCTP 2011
作者: Li, Xiying She, Yongye Yang, Guigen Zhao, Youting Luo, Donghua Guangdong Provincial Key Laboratory of Intelligent Transportation System School of Engineering Sun Yat-sen University Guangzhou 510006 China Traffic Management Bureau Guangdong Provincial Public Security Department Guangzhou 510440 China School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China
An intelligent and automatic traffic congestion detection method is proposed to reduce labor intensive monitoring work. The developed approach, applied on expressways, is to gather traffic congestion information using... 详细信息
来源: 评论
SAR imaging from compressed measurements based on L1/2 regularization
SAR imaging from compressed measurements based on L1/2 regul...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Jinshan Zeng Zongben Xu Hai Jiang Bingchen Zhang Wen Hong Yirong Wu Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xian China Institute of Information and System Science Xian Jiaotong University Xian China Institute of Electronics Chinese Academy of Sciences Beijing China
In this paper, a novel synthetic aperture radar (SAR) imaging method based on L 1/2 regularization is proposed. Our method implements SAR imaging from compressed measurements with high resolution, enhanced features, ... 详细信息
来源: 评论
An extraction method of road structure for surveillance Video
An extraction method of road structure for surveillance Vide...
收藏 引用
11th International Conference of Chinese Transportation Professionals: Towards Sustainable Transportation systems, ICCTP 2011
作者: Luo, Dong-Hua Zhao, Jian-Hua Li, Xi-Ying Wang, Zhen-Bo School of Information Sciences and Technology Sun Yat-sen University Guangzhou Higher Education Mega Center No. 132 East Outer Ring Road Guangzhou 510006 China Traffic Management Bureau Guangdong Provincial Public Security Department NO.388 Jianpeng Road Baiyun District Guangzhou 510440 China School of Engineering Sun Yat-sen University Guangzhou Higher Education Mega Center No.132 East Outer Ring Road Guangzhou 510006 China Guangdong Provincial Key Laboratory of Intelligent Transportation System Building 312 NO.135 West Xingang Road Guangzhou 510275 China
The scene of surveillance video is usually wide and variable, and the target vehicles inside it are often small. Surveillance videos usually are not suitable for intelligent video applications, such as video vehicle d... 详细信息
来源: 评论
Solving Sum and Product Riddle via BDD-Based Model Checking
Solving Sum and Product Riddle via BDD-Based Model Checking
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Xiangyu Luo Kaile Su Abdul Sattar Yan Chen Tsinghua National Laboratory for Information Science and Technology Key Laboratory of Security for Information System of Ministry of Education School of Software Tsinghua University Beijing China Department of Computer Science Guilin University of Electronic and Technology Guilin China School of Electronics Engineering and Computer Science Peking University Beijing China Institute for Integrated and Intelligent Systems Griffith University Brisbane QLD Australia
We model the sum and product riddle in public announcement logic, which is interpreted on an epistemic Kripke model. The model is symbolically represented as a finite state program with n agents. A model checking meth... 详细信息
来源: 评论
ROLE OF SIMULATION IN RAPID PROTOTYPING FOR CONCEPT DEVELOPMENT
收藏 引用
NAVAL ENGINEERS JOURNAL 1991年 第3期103卷 204-211页
作者: KING, JF BARTON, DE J. Fred King:is the manager of the Advanced Technology Department for Unisys in Reston Virginia. He earned his Ph.D. in mathematics from the University of Houston in 1977. He has been principal investigator of research projects in knowledge engineering pattern recognition and heuristic problem-solving. Efforts include the development of a multi-temporal multispectral classifier for identifying graincrops using LANDSAT satellite imagery data for NASA. Also as a member of the research team for a NCI study with Baylor College of Medicine and NASA he helped develop techniques for detection of carcinoma using multispectral microphotometer scans of lung tissue. He established and became technical director of the AI Laboratory for Ford Aerospace where he developed expert scheduling modeling and knowledge acquisition systems for NASA. Since joining Unisys in 1985 he has led the development of object-oriented programming environments blackboard architectures data fusion techniques using neural networks and intelligent data base systems. Douglas E. Barton:is manager of Logistics Information Systems for Unisys in Reston Virginia. He earned his B.A. degree in computer science from the College of William and Mary in 1978 and did postgraduate work in London as a Drapers Company scholar. Since joining Unisys in 1981 his work has concentrated on program management and software engineering of large scale data base management systems and design and implementation of knowledge-based systems in planning and logistics. As chairman of the Logistics Data Subcommittee of the National Security Industrial Association (NSIA) he led an industry initiative which examined concepts in knowledge-based systems in military logistics. His responsibilities also include evaluation development and tailoring of software engineering standards and procedures for data base and knowledge-based systems. He is currently program manager of the Navigation Information Management System which provides support to the Fleet Ballistic Missile Progr
A valuable technique during concept development is rapid prototyping of software for key design components. This approach is particularly useful when the optimum design approach is not readily apparent or several know... 详细信息
来源: 评论
Correlation-aware Cross-modal Attention Network for Fashion Compatibility Modeling in UGC systems
收藏 引用
ACM Transactions on Multimedia Computing, Communications, and Applications 1000年
作者: Kai Cui Shenghao Liu Wei Feng Xianjun Deng Liangbin Gao Minmin Cheng Hongwei Lu Laurence T. Yang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China China Nuclear Power Operation Technology Corporation Ltd. China
Empowered by the continuous integration of social multimedia and artificial intelligence, the application scenarios of information retrieval (IR) progressively tend to be diversified and personalized. Currently, User-... 详细信息
来源: 评论
DeFeed: Secure Decentralized Cross-Contract data Feed in Web 3.0 for Connected Autonomous Vehicles
收藏 引用
ACM Transactions on Autonomous and Adaptive systems 1000年
作者: Xingchen Sun Runhua Xu Wei Ni Li Duan Chao Li Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University China School of Computer Science and Engineering Beihang University China School of Electrical and Data Engineering University of Technology Sydney Australia
Smart contracts have been a topic of interest in blockchain research and are a key enabling technology for Connected Autonomous Vehicles (CAVs) in the era of Web 3.0. These contracts enable trustless interactions with... 详细信息
来源: 评论