咨询与建议

限定检索结果

文献类型

  • 538 篇 期刊文献
  • 496 篇 会议

馆藏范围

  • 1,034 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 663 篇 工学
    • 477 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 114 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 323 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 79 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 48 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 34 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 21 篇 school of softwa...
  • 19 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 947 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1034 条 记 录,以下是141-150 订阅
排序:
Brain-inspired artificial intelligence research: A review
收藏 引用
Science China(Technological Sciences) 2024年 第8期67卷 2282-2296页
作者: WANG GuoYin BAO HuaNan LIU Qun ZHOU TianGang WU Si HUANG TieJun YU ZhaoFei LU CeWu GONG YiHong ZHANG ZhaoXiang HE Sheng Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Computer and Information Science Chongqing Normal UniversityChongqing 401331China State Key Laboratory of Brain and Cognitive Science Institute of BiophysicsChinese Academy of SciencesBeijing 100101China School of Psychological and Cognitive Sciences Peking UniversityBeijing 100871China State Key Laboratory of Multimedia Information Processing School of Computer SciencePeking UniversityBeijing 100871China Department of Computer Science School of ElectronicsInformation and Electrical EngineeringShanghai Jiao Tong UniversityShanghai 200240China Faculty of Electronic and Information Engineering Xi’an Jiaotong UniversityXi’an 710049China The Center for Research on Intelligent Perception and Computing Institute of AutomationChinese Academy of SciencesBeijing 100190China Institute of Biophysics Chinese Academy of SciencesBeijing 100101China
Artificial intelligence(AI) systems surpass certain human intelligence abilities in a statistical sense as a whole, but are not yet the true realization of these human intelligence abilities and behaviors. There are d... 详细信息
来源: 评论
Physically Secure and Privacy-Preserving Authentication Scheme for VANET
Physically Secure and Privacy-Preserving Authentication Sche...
收藏 引用
2024 International Conference on Artificial Intelligence of Things and systems, AIoTSys 2024
作者: Chen, Dongmei Liang, Yangfan Li, Lihui Liu, Yining School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Jiaxing University Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems Jiaxing China School of Data Science and Artificial Intelligence Wenzhou University of Technology Wenzhou China
The communication between vehicles and other entities occurs over open wireless networks, making them susceptible to various security attacks In Vehicular Ad Hoc Network (VANET). Consequently, many researchers have pr... 详细信息
来源: 评论
SLMP: A Scientific Literature Management Platform Based on Large Language Models  15
SLMP: A Scientific Literature Management Platform Based on L...
收藏 引用
15th IEEE International Conference on Knowledge Graph, ICKG 2024
作者: Guo, Menghao Jiang, Jinling Wu, Fan Sun, Shanxin Zhang, Chen Li, Wenhui Sun, Zeyi Chen, Guangyong Wu, Xindong Research Center for Life Sciences Computing Zhejiang Lab Hangzhou China Research Center for Data Hub and Security Zhejiang Lab Hangzhou China Research Center for High Efficiency Computing System Zhejiang Lab Hangzhou China Hefei University of Technology Key Laboratory of Knowledge Engineering With Big Data Hefei China
This paper presents a Scientific Literature Management Platform (SLMP, demo link1 ) based on large language models (LLMs). The platform consists of four modules: literature management, literature extraction, literatur... 详细信息
来源: 评论
Quantum security analysis of SM4 algorithm  6
Quantum security analysis of SM4 algorithm
收藏 引用
6th International Conference on Wireless Communications and Smart Grid, ICWCSG 2024
作者: Yang, Hao Wang, Chunhong Tang, Xueming Cui, Yongquan Lu, Songfeng Cai, Dunbo Qian, Ling Zhang, Runqing Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Maritime Communication Research Institute Wuhan430010 China Software Technology Co. Ltd. Suzhou215153 China
The security of commercial encryption algorithms has always been a focus of attention. The SM4 algorithm, a commercial cryptographic standard, has been recognized by ISO/IEC as an international standard and has shown ... 详细信息
来源: 评论
FedCSA: Boosting the Convergence Speed of Federated Unlearning under data Heterogeneity  21
FedCSA: Boosting the Convergence Speed of Federated Unlearni...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Wang, Zhen Alghazzawi, Daniyal M Cheng, Li Liu, Gaoyang Wang, Chen Cheng, Zeng Yang, Yang Hubei University Key Laboratory of Intelligent Sensing System and Security Ministry of Education School of Artificial Intelligence Wuhan China King Abdulaziz University Jeddah Saudi Arabia Huazhong University of Science and Technology Wuhan China
The exponential growth of the Internet and the widespread availability of personal data have raised significant concerns regarding personal privacy and societal security. In response, the 'right to be forgotten... 详细信息
来源: 评论
Disentangling Client Contributions: Improving Federated Learning Accuracy in the Presence of Heterogeneous data  21
Disentangling Client Contributions: Improving Federated Lear...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Liu, Chunming Alghazzawi, Daniyal M Cheng, Li Liu, Gaoyang Wang, Chen Zeng, Cheng Yang, Yang Hubei University Key Laboratory of Intelligent Sensing System and Security Ministry of Education School of Artificial Intelligence Wuhan China King Abdulaziz University Jeddah Saudi Arabia Huazhong University of Science and Technology Wuhan China
Federated Learning (FL) is a promising paradigm that leverages distributed data sources to train machine learning models, thereby offering significant privacy advantages. However, the inherent statistical heterogeneit... 详细信息
来源: 评论
A Virtual Network Mapping Method Based on Compound Particle Swarm Optimization  7
A Virtual Network Mapping Method Based on Compound Particle ...
收藏 引用
7th International Conference on Cyber security and Information Engineering, ICCSIE 2022
作者: Huang, Jianhua Tang, Yunlong Wei, Yongjun Wang, Huan Zhang, Haifeng Zhang, Bing School of Computer Science and Technology School of Software Guangxi University of Science and Technology Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Guangxi Education System Network Security Monitoring Center Liuzhou China Liuzhou Railway Vocational Technical College Liuzhou China
Aiming at problems of low credibility of results and low accuracy of the scheme in the mapping process of virtual networks. It is suggested to use a composite particle swarm optimization approach for virtual network m... 详细信息
来源: 评论
CoGAP: A Personalized Federated Learning Method Using Collaborative Optimization for Medical Image Classification
CoGAP: A Personalized Federated Learning Method Using Collab...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zheng, Shenhai Li, Congyu Wen, Sian Gao, Xi Yu, Lei College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China Emergency Department The Second Affiliated Hospital of Chongqing Medical University Chongqing China
Federated learning (FL) has been widely used in medical image processing to protect data privacy, but it has issues with data heterogeneity. Personalized federated learning have emerged to tackle these issues but ofte... 详细信息
来源: 评论
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerators
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerato...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Siling Yang Shuibing He Wenjiong Wang Yanlong Yin Tong Wu Weijian Chen Xuechen Zhang Xian-He Sun Dan Feng The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Lab Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Zhejiang Key Laboratory of Big Data Intelligent Computing Washington State University Vancouver Illinois Institute of Technology Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics
Graph convolutional networks (GCNs) are popular for a variety of graph learning tasks. ReRAM-based processing-in-memory (PIM) accelerators are promising to expedite GCN training owing to their in-situ computing capabi... 详细信息
来源: 评论
A New Approach to the Position of Acupoints on the Back of Humans
收藏 引用
Recent Patents on Mechanical Engineering 2023年 第2期16卷 150-162页
作者: Xie, Shenglong Liu, Zijing Zhang, Liangan Song, Fengfeng Key Laboratory of Intelligent Manufacturing Quality Big Data Tracking and Analysis of Zhejiang Province China Jiliang University Zhejiang Hangzhou310018 China Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet Anhui University of Technology Anhui Ma’anshan243032 China Hangzhou Qiandaohu Ruichun Robot Research Institute Co. Ltd Zhejiang Hangzhou310018 China Zhejiang Shusi Robot Co. Ltd Zhejiang Huzhou313000 China
Aim: In order to realize the position of acupoints on the back of humans, a new acupoints positioning approach combined with machine vision technology is proposed in this paper. Background: The acupuncture point (acup... 详细信息
来源: 评论