咨询与建议

限定检索结果

文献类型

  • 548 篇 期刊文献
  • 533 篇 会议

馆藏范围

  • 1,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 513 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 195 篇 信息与通信工程
    • 120 篇 电气工程
    • 115 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 32 篇 交通运输工程
    • 29 篇 网络空间安全
    • 27 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 334 篇 理学
    • 170 篇 数学
    • 88 篇 生物学
    • 80 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 182 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 38 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 44 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 optimization
  • 20 篇 machine learning
  • 19 篇 graph neural net...
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 contrastive lear...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 15 篇 robustness
  • 13 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 huazhong univers...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 20 篇 wang guoyin
  • 20 篇 hai jin
  • 18 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 wang haoyu
  • 12 篇 feng gao

语言

  • 928 篇 英文
  • 142 篇 其他
  • 9 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1081 条 记 录,以下是401-410 订阅
排序:
End-to-End Remote Sensing Image Scene Classification with Vision Transformers  23
End-to-End Remote Sensing Image Scene Classification with Vi...
收藏 引用
6th International Conference on Big data Technologies, ICBDT 2023
作者: Yuan, Hao Liu, Kun Shi, Jiechuan Wang, Can Wang, Weiwei School of Information Science and Engineering University of Jinan Jinan250022 China China High-resolution Earth Observation System Shandong Center of Data and Application University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China QiLu Research Institute Jinan250200 China
In recent years, the development of deep learning technology has led to widespread attention on Vision Transformer (ViT) as an emerging image classification method. Remote sensing image classification is an important ... 详细信息
来源: 评论
Evaluation of Continual Learning Methods for Object Hardness Recognition
Evaluation of Continual Learning Methods for Object Hardness...
收藏 引用
2023 IEEE International Conference on Real-Time Computing and Robotics, RCAR 2023
作者: Liu, Yiwen Fang, Senlin Liu, Chengliang Wang, Jingnan Mai, Ke Zhang, Yupo Yi, Zhengkun Wu, Xinyu Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Provincial Key Laboratory of Robotics and Intelligent System Shenzhen518055 China University of Chinese Academy of Sciences Beijing100049 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Siat Branch Shenzhen518055 China City University of Macau Faculty of Data Science 999078 China
How to solve the problem of continual learning of robotic tactile perception in an open, dynamic environment is a pressing task. Although continual learning has been extensively studied in computer vision, the evaluat... 详细信息
来源: 评论
Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning  24
Towards High-resolution 3D Anomaly Detection via Group-Level...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhu, Hongze Xie, Guoyang Hou, Chengbin Dai, Tao Gao, Can Wang, Jinbao Shen, Linlin National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong Hong Kong Department of Intelligent Manufacturing CATL Ningde China Fuzhou Fuyao Institute for Advanced Study Fuyao University of Science and Technology Fuzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China
High-resolution point clouds (HRPCD) anomaly detection (AD) plays a critical role in precision machining and high-end equipment manufacturing. Despite considerable 3D-AD methods that have been proposed recently, they ... 详细信息
来源: 评论
An online sparse least square support vector regression and particle filter for remaining useful life prediction of capacitive-type pressure transducer  3
An online sparse least square support vector regression and ...
收藏 引用
2024 3rd International Conference on Aerospace and Control Engineering, ICoACE 2024
作者: Wang, Senlin Dai, Lingfeng Guo, Mingzhe Lu, Yikang Fujian Institute of Research on the Structure of Matter Chinese Academy of Sciences Fujian Fuzhou362200 China Fujian Provincial Key Laboratory of Intelligent Identification and Control of Complex Dynamic System Quanzhou362200 China Fujian College University of Chinese Academy of Sciences Fujian Fuzhou350002 China School of Advanced Manufacturing Fuzhou University Fujian Quanzhou350108 China School of College of Computer and Cyberspace Security Fujian Normal University Fujian350007 China
This paper proposes a novel online sparse least square support vector regression without bias for forecasting capacitive type pressure transducer remaining useful life prediction (RUL). The proposed approach is based ... 详细信息
来源: 评论
Learning Multimodal Attention Mixed with Frequency Domain Information as Detector for Fake News Detection
Learning Multimodal Attention Mixed with Frequency Domain In...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Zihan Ma Huan Liu Zhi Zeng Hao Guo Xiang Zhao Minnan Luo School of Computer Science and Technology Xi’an Jiaotong University Xi'an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi'an China Laboratory for Big Data and Decision Nation University of Defence Technology Changsha China
Detecting fake news on social media has become a crucial task in combating online misinformation and countering malicious propaganda. Existing methods rely on semantic consistency across modalities to fuse features an... 详细信息
来源: 评论
OpenViewer: Openness-Aware Multi-View Learning  39
OpenViewer: Openness-Aware Multi-View Learning
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Du, Shide Fang, Zihan Tan, Yanchao Wang, Changwei Wang, Shiping Guo, Wenzhong College of Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
Multi-view learning methods leverage multiple data sources to enhance perception by mining correlations across views, typically relying on predefined categories. However, deploying these models in real-world scenarios... 详细信息
来源: 评论
A Fraud Detection Approach Based on Combined Feature Weighting  10th
A Fraud Detection Approach Based on Combined Feature Weighti...
收藏 引用
10th EAI International Conference on Cloud Computing, CloudComp 2020
作者: Liu, Xiaoqian Yu, Chenfei Xia, Bin Gu, Haiyan Wang, Zhenli Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Nanjing China Jiangsu Provincial Public Security Department Key Laboratory of Digital Forensics Nanjing China
data mining technology has yielded fruitful results in the area of crime discovery and intelligent decision making. Credit card is one of the most popular payment methods, providing great convenience and efficiency. H... 详细信息
来源: 评论
COMMITSHIELD: Tracking Vulnerability Introduction and Fix in Version Control systems
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Zhaonan Zhao, Yanjie Wei, Chen Wan, Zirui Liu, Yue Wang, Haoyu Huazhong University of Science and Technology Wuhan China MYbank Ant Group Hangzhou China Monash University Melbourne Australia Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Version control systems are commonly used to manage open-source software, in which each commit may introduce new vulnerabilities or fix existing ones. Researchers have developed various tools for detecting vulnerabili... 详细信息
来源: 评论
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Validating SMT Solvers via Skeleton Enumeration Empowered by...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Maolin Sun Yibiao Yang Ming Wen Yongcong Wang Yuming Zhou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Huazhong University of Science and Technology China
SMT solvers check the satisfiability of logic formulas over first-order theories, which have been utilized in a rich number of critical applications, such as software verification, test case generation, and program sy...
来源: 评论
TS-ENAS:Two-Stage Evolution for Cell-based Network Architecture Search
arXiv
收藏 引用
arXiv 2023年
作者: Zou, Juan Wu, Shenghong Xia, Yizhang Jiang, Weiwei Wu, Zeping Zheng, Jinhua Engineering Research Center of Hunan Province for Optimization and Security of Intelligent System Key Laboratory of Intelligent Computing and Information Processing Ministry of Education of China Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Hunan Province Xiangtan411105 China The College of Aerospace Science and Engineering National University of Defense Technology Hunan Changsha410073 China
Neural network architecture search provides a solution to the automatic design of network structures. However, it is difficult to search the whole network architecture directly. Although using stacked cells to search ... 详细信息
来源: 评论