咨询与建议

限定检索结果

文献类型

  • 538 篇 期刊文献
  • 496 篇 会议

馆藏范围

  • 1,034 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 663 篇 工学
    • 477 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 114 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 323 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 79 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 48 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 34 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 21 篇 school of softwa...
  • 19 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 947 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1034 条 记 录,以下是101-110 订阅
排序:
Cooperative Local Path Planning for Multi-unmanned Vehicles Formation Using the Enhanced Artificial Potential Field  3rd
Cooperative Local Path Planning for Multi-unmanned Vehicles...
收藏 引用
3rd International Conference on Autonomous Unmanned systems, ICAUS 2023
作者: Zhang, Xin Duan, Xuting Zhou, Jianshan Zhang, Long Opening Project of Key Laboratory of Operation Safety Technology on Transport Vehicles Ministry of Transport PRC Beijing China School of Transportation Science and Engineering Beihang University Beijing China State Key Lab of Intelligent Transportation System Beijing China Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control Beijing China Zhongguancun Laboratory Beijing China National Key Laboratory of Science and Technology on Information System Security Institute of Systems Engineering Beijing China
An enhanced approach utilizing APF(artificial potential field) method is introduced in this paper. By adopting this approach, the challenge of local minima that may occur when dealing with local path planning for unma... 详细信息
来源: 评论
sSecure Net: A Hybrid CNN-LSTM-based Intrusion Detection system for Securing IoT Networks  25
sSecure Net: A Hybrid CNN-LSTM-based Intrusion Detection Sys...
收藏 引用
Proceedings of the 4th International Conference on Computer, Artificial Intelligence and Control Engineering
作者: Ovi Abul Hussain Zigang Chen Haihua Zhu Chongqing Key Laboratory of Cyberspace Security Monitoring and Governance & Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing China
The widespread deployment of IoT devices has seen the emergence of a huge security threat, and IoT networks are the favorite targets for numerous cyberattacks. Due to the scarce resources in most IoT devices, the conv... 详细信息
来源: 评论
A Privacy Leak Detection Mechanism based on Service Binding  10
A Privacy Leak Detection Mechanism based on Service Binding
收藏 引用
10th International Symposium on system security, Safety, and Reliability, ISSSR 2024
作者: Wang, Boyang He, Jinling Du, Yuanhan Tang, Ming Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
With the development of mobile technology, users gradually store financial information and personal privacy data on mobile terminals, which makes mobile security particularly important. In order to effectively improve... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
intelligent Contract Timestamp Vulnerability Detection Based on key Control Flow Graph  36
Intelligent Contract Timestamp Vulnerability Detection Based...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Quan, Qing Yu Zeng, Cheng Wang, Yi Feng Wang, Jiao Ran School of Computer Science and Information Engineering Hubei University Wuhan China School of Artificial Intelligence Hubei University Wuhan China Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education Wuhan China
The extensive application of smart contract technology in the blockchain domain has positioned it as a key component of the digital economy. However, as the application scope of smart contracts expands, security issue... 详细信息
来源: 评论
FBOD: An Outlier Detection Algorithm based on data Features Suitable for Processing Large-scale datasets on Distributed Platforms  10
FBOD: An Outlier Detection Algorithm based on Data Features ...
收藏 引用
10th International Symposium on system security, Safety, and Reliability, ISSSR 2024
作者: Zhao, Jinbo He, Jinling Song, Hu Cheng, Xinyun Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
The primary objective of outlier detection is to identify values that are significantly different from other data in the dataset. However, most of the current algorithms are effective for small-scale data and their pe... 详细信息
来源: 评论
IMPACT: Importance-Informed Prefetching and Caching for I/O-Bound DNN Training
收藏 引用
IEEE Transactions on Computers 2025年
作者: Chen, Weijian He, Shuibing Zhang, Ruidong Zhang, Xuechen Chen, Ping Yang, Siling Qu, Haoyang Zhan, Xuan Zhejiang University State Key Laboratory of Blockchain and Data Security China Institute of Blockchain and Data Security Hangzhou China Zhejiang Key Laboratory of Big Data Intelligent Computing China Washington State University Vancouver School of Engineering and Computer Science VancouverWA98686 United States
Fetching large amounts of DNN training data from storage systems causes high I/O latency and GPU stalls. Importance sampling can reduce data processing on GPUs while maintaining model accuracy, but current frameworks ... 详细信息
来源: 评论
LeapGNN: accelerating distributed GNN training leveraging feature-centric model migration  25
LeapGNN: accelerating distributed GNN training leveraging fe...
收藏 引用
Proceedings of the 23rd USENIX Conference on File and Storage Technologies
作者: Weijian Chen Shuibing He Haoyang Qu Xuechen Zhang The State Key Laboratory of Blockchain and Data Security Zhejiang University and Zhejiang Lab and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security and Zhejiang Key Laboratory of Big Data Intelligent Computing Washington State University Vancouver
Distributed training of graph neural networks (GNNs) has become a crucial technique for processing large graphs. Prevalent GNN frameworks are model-centric, necessitating the transfer of massive graph vertex features ...
来源: 评论
G2G: Generalized Learning by Cross-Domain Knowledge Transfer for Federated Domain Generalization
G2G: Generalized Learning by Cross-Domain Knowledge Transfer...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xinqian Chen Jin Zhang Xiaoli Gong College of Computer Science Nankai University China Key Lab of Data and Intelligent System Security Ministry of Education China
We propose G2G, based on the global model of Generalized learning to solve the Federated Domain Generalization (FedDG) task. FedDG aims to collaboratively train a global model that can directly generalize to the unsee...
来源: 评论
Tracking Objects and Activities with Attention for Temporal Sentence Grounding  48
Tracking Objects and Activities with Attention for Temporal ...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Xiong, Zeyu Liu, Daizong Zhou, Pan Zhu, Jiahao Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Peking University Wangxuan Institute of Computer Technology China
Temporal sentence grounding (TSG) aims to localize the temporal segment which is semantically aligned with a natural language query in an untrimmed video. Most existing methods extract frame-grained features or object... 详细信息
来源: 评论