咨询与建议

限定检索结果

文献类型

  • 538 篇 期刊文献
  • 496 篇 会议

馆藏范围

  • 1,034 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 663 篇 工学
    • 477 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 183 篇 信息与通信工程
    • 114 篇 电气工程
    • 90 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 26 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 323 篇 理学
    • 162 篇 数学
    • 87 篇 生物学
    • 79 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 31 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 23 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection
  • 11 篇 data privacy

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 48 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 34 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 21 篇 school of softwa...
  • 19 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong
  • 11 篇 wang haoyu

语言

  • 947 篇 英文
  • 78 篇 其他
  • 8 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1034 条 记 录,以下是181-190 订阅
排序:
Last-X-Generation Archiving Strategy for Multi-Objective Evolutionary Algorithms  13
Last-X-Generation Archiving Strategy for Multi-Objective Evo...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Shu, Tianye Nan, Yang Shang, Ke Ishibuchi, Hisao Southern University of Science and Technology Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and Engineering Shenzhen518055 China Southern University of Science and Technology Shenzhen518055 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China
For evolutionary multi-objective optimization algorithms (EMOAs), an external archive can be utilized for saving good solutions found throughout the evolutionary process. Recent studies showed that a solution set sele... 详细信息
来源: 评论
Confident Information Coverage Reliability Evaluation for Sensor Networks of Openly Deployed ICP systems
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical systems 2024年 2卷 565-574页
作者: Chen, Suning Yi, Yuanyuan Yi, Lingzhi Liu, Shenghao Deng, Xianjun Xia, Yunzhi Fan, Xiaoxuan Yang, Laurence T. Park, Jong Hyuk Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security The School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan430074 China Zhongnan University of Economics and Law School of Information and Safety Engineering Wuhan430073 China Seoul National University of Technology Department of Computer Science and Engineering Seoul01811 Korea Republic of
Industrial Cyber-Physical (ICP) systems are integration of computation and physical processes to help achieve operational excellence. As sensors and actuators compose the openly deployed ICP systems and are often susc... 详细信息
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Liu, Yajun Li, Ru Li, Aimin Fei, Rong Guo, Xie Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ... 详细信息
来源: 评论
A label-guided contrastive capsule network for few-shot text classification
收藏 引用
Neural Computing and Applications 2025年 1-26页
作者: Xu, Yang Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China
Few-shot text classification involves transferring knowledge from a limited dataset to perform classification tasks in unseen domains. Existing metric-based meta-learning models, such as prototypical networks, have sh... 详细信息
来源: 评论
MDPFL:A Multiple Differential Privacy Protection Method based on Federated Learning
MDPFL:A Multiple Differential Privacy Protection Method base...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xinyu Liu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
With the continuous development of artificial intelligence technology, machine learning in distributed network systems, such as IoVflntemet of Vehicles), will inevitably lead to privacy leakage. At present, there are ...
来源: 评论
The Regular Ricci-Inverse Cosmology with Multiple Anticurvature Scalars
arXiv
收藏 引用
arXiv 2025年
作者: Mou, Yicen School of Physics Hubei University Hubei Wuhan430062 China Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education China
We investigate the modified gravity in which the Lagrangian of gravity is a function of the trace of the n-th matrix power of Ricci tensor in a Friedmann–Lemaître–Robertson–Walker(FLRW) spacetime. When n is ne... 详细信息
来源: 评论
Recognition of Disaster Images Based on Self-Supervised Learning  7
Recognition of Disaster Images Based on Self-Supervised Lear...
收藏 引用
7th International Conference on Cloud Computing and Big data Analytics, ICCCBDA 2022
作者: Wang, Linyong Wu, Ruiqi Li, Cen Zou, Zhiqiang Nanjing University of Posts and Telecommunications NanJing China College of Computer Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing NanJing China
Existing supervised deep learning model requires large amounts of labeled training data to learn new tasks. This is a limitation for many practical applications in disaster areas as well as in many other fields such a... 详细信息
来源: 评论
Economical Electricity Supplement for Mobile Collectors in Large-Scale Multitask WSNs
Economical Electricity Supplement for Mobile Collectors in L...
收藏 引用
IEEE International Conference on Big data and Cloud Computing (BdCloud)
作者: Xin Zhai Lijie Xu Jialei Zhang Kun Wang Jia Xu Bei Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
For large-scale multitask wireless sensor networks (LSM-WSNs), the traditional data collection mode could suffer low energy-efficiency on data transmission, since the large-scale multitask scenarios could result in mu...
来源: 评论
SSR-TA: Sequence to Sequence based expert recurrent recommendation for ticket automation
arXiv
收藏 引用
arXiv 2023年
作者: Cao, Chenhan Fang, Xiaoyu Luo, Bingqing Xia, Bin Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
The ticket automation provides crucial support for the normal operation of IT software systems. An essential task of ticket automation is to assign experts to solve upcoming tickets. However, facing thousands of ticke... 详细信息
来源: 评论
An Answer Summarization Scheme Based on Multilayer Attention Model
An Answer Summarization Scheme Based on Multilayer Attention...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xiaolong Xu Yihao Dong Jian Song Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
At present, deep learning technologies have been widely used in the field of natural language process, such as text summarization. In CQA, the answer summary could help users get a complete answer quickly. There are s...
来源: 评论