咨询与建议

限定检索结果

文献类型

  • 533 篇 期刊文献
  • 496 篇 会议

馆藏范围

  • 1,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 658 篇 工学
    • 474 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 183 篇 信息与通信工程
    • 109 篇 电气工程
    • 89 篇 控制科学与工程
    • 74 篇 生物工程
    • 60 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 40 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 网络空间安全
    • 25 篇 安全科学与工程
    • 23 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 21 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 320 篇 理学
    • 159 篇 数学
    • 87 篇 生物学
    • 79 篇 物理学
    • 55 篇 统计学(可授理学、...
    • 23 篇 化学
    • 23 篇 系统科学
  • 179 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 37 篇 医学
    • 31 篇 基础医学(可授医学...
    • 31 篇 临床医学
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 41 篇 feature extracti...
  • 37 篇 semantics
  • 28 篇 training
  • 24 篇 deep learning
  • 22 篇 federated learni...
  • 22 篇 privacy
  • 20 篇 machine learning
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 15 篇 graph neural net...
  • 14 篇 contrastive lear...
  • 14 篇 robustness
  • 12 篇 data privacy
  • 12 篇 deep neural netw...
  • 12 篇 neural networks
  • 12 篇 forecasting
  • 11 篇 object detection

机构

  • 58 篇 hubei key labora...
  • 55 篇 school of comput...
  • 48 篇 school of cyber ...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 36 篇 school of comput...
  • 34 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 27 篇 hubei key labora...
  • 27 篇 national enginee...
  • 27 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 21 篇 school of softwa...
  • 19 篇 school of inform...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...
  • 15 篇 university of ch...
  • 15 篇 hubei province k...

作者

  • 36 篇 xu xiaolong
  • 28 篇 jin hai
  • 25 篇 xiaolong xu
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 19 篇 hu shengshan
  • 18 篇 yang yang
  • 17 篇 huang qingming
  • 17 篇 zhou pan
  • 16 篇 xu qianqian
  • 15 篇 wang guoyin
  • 15 篇 zhang leo yu
  • 14 篇 ai bo
  • 14 篇 li minghui
  • 13 篇 zhang zhe
  • 12 篇 zhou ziqi
  • 12 篇 feng gao
  • 11 篇 liu jun
  • 11 篇 yang zhiyong
  • 11 篇 fu chong

语言

  • 945 篇 英文
  • 75 篇 其他
  • 8 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1029 条 记 录,以下是231-240 订阅
排序:
Five-dimensional Floquet topological semimetals with emergent Yang monopoles and linked Weyl surfaces
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Zheng-Rong Chen, Rui Zhou, Bin Department of Physics Hubei University Wuhan430062 China Key Laboratory of Intelligent Sensing System and Security of Ministry of Education Hubei University Wuhan430062 China
Recently, Floquet topological matter has attracted significant attention for its potential to reveal novel topological phases inaccessible in static systems. In this paper, we investigate the effect of a time-periodic... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
MC-GAN: An Adversarial Sample Defense Algorithm  20
MC-GAN: An Adversarial Sample Defense Algorithm
收藏 引用
20th International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2023
作者: Chenli, Wang Juyang, W.U. Xing, Yang Junfei, Wang Jian, S.H.U. Jiazhong, L.U. Yuanyuan, Huang Shuo, H.A.N. School of Cybersecurity Chengdu University of Information Technology Sichuan Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Sichuan Chengdu610225 China Northwestern University Department of Statistics and Data Sciences EvanstonIL60202 United States
The current adversarial sample defense algorithms are plagued by issues such as poor defense effectiveness and high training costs. In order to enhance sample classification accuracy while reducing training costs, we ... 详细信息
来源: 评论
Enhancing the MILP/MIQCP-based Automatic Search for Differential-Linear Distinguishers of Simon-Like Ciphers
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Siwei Xiang, Zejun Zeng, Xiangyong Qin, Guangxue School of Cyber Science and Technology Key Laboratory of Intelligent Sensing System and Security Hubei University Wuhan China Faculty of Mathematics and Statistics Hubei Key Laboratory of Applied Mathematics Hubei University Wuhan China
In this paper, we propose an improved method based on Mixed-Integer Linear Programming/Mixed-Integer Quadratic Constraint Programming (MILP/MIQCP) to automatically find better differential-linear (DL) distinguishers f... 详细信息
来源: 评论
Poisoned LangChain: Jailbreak LLMs by LangChain
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Ziqiu Liu, Jun Zhang, Shengkai Yang, Yang Wuhan University of Technology Wuhan China Key Laboratory of Intelligent Sensing System and Security Ministry of Education School of Artificial Intelligence Hubei University Wuhan China
With the development of Natural Language Processing (NLP), Large Language Models (LLMs) are becoming increasingly popular. LLMs are integrating more into everyday life, raising public concerns about their security vul... 详细信息
来源: 评论
Dlr: Adversarial Examples Detection and Label Recovery for Deep Neural Networks
SSRN
收藏 引用
SSRN 2023年
作者: Han, Keji Ge, Yao Wang, Ruchuan Li, Yun Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Jiangsu Nanjing210023 China
Deep neural networks (DNNs) are demonstrated to be vulnerable to the adversarial example crafted by the adversary to fool the target model. Adversarial training and adversarial example detection are two popular method... 详细信息
来源: 评论
Current density in the anomalous Hall effect regime under weak scattering
arXiv
收藏 引用
arXiv 2024年
作者: Dai, Ning Zhou, Bin Department of Physics Hubei University Wuhan430062 China Key Laboratory of Intelligent Sensing System and Security of Ministry of Education Hubei University Wuhan430062 China
A finite equilibrium current density arises in the anomalous Hall effect (AHE) as a result of time-reversal symmetry breaking, affecting both the differential current density and total current. This study illustrates ... 详细信息
来源: 评论
Score-based Generative Priors Guided Model-driven Network for MRI Reconstruction
arXiv
收藏 引用
arXiv 2024年
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Score matching with Langevin dynamics (SMLD) method has been successfully applied to accelerated MRI. However, the hyperparameters in the sampling process require subtle tuning, otherwise the results can be severely c... 详细信息
来源: 评论
Using Depth-Enhanced Spatial Transformation for Student Gaze Target Estimation in Dual-View Classroom Images
Using Depth-Enhanced Spatial Transformation for Student Gaze...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Miao, Haonan Zhao, Peizheng Sun, Yuqi Nan, Fang Zhang, Xiaolong Wu, Yaqiang Tian, Feng School of Computer Science and Technology Xi'an Jiaotong University Xi'an710049 China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China School of Advanced Technology Xi'an Jiaotong-Liverpool University Suzhou215123 China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi'an710049 China
Dual-view gaze target estimation in classroom environments has not been thoroughly explored. Existing methods lack consideration of depth information, primarily focusing on 2D image information and neglecting the late... 详细信息
来源: 评论
PathReasoner: Modeling Reasoning Path with Equivalent Extension for Logical Question Answering
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Fangzhi Lin, Qika Zhao, Tianzhe Han, Jiawei Liu, Jun School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering China
Logical reasoning task has attracted great interest since it was proposed. Faced with such a task, current competitive models, even large language models (e.g., ChatGPT and PaLM 2), still perform badly. Previous promi... 详细信息
来源: 评论