咨询与建议

限定检索结果

文献类型

  • 548 篇 期刊文献
  • 533 篇 会议

馆藏范围

  • 1,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 513 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 195 篇 信息与通信工程
    • 120 篇 电气工程
    • 115 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 32 篇 交通运输工程
    • 29 篇 网络空间安全
    • 27 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 334 篇 理学
    • 170 篇 数学
    • 88 篇 生物学
    • 80 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 182 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 38 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 44 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 optimization
  • 20 篇 machine learning
  • 19 篇 graph neural net...
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 contrastive lear...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 15 篇 robustness
  • 13 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 huazhong univers...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 20 篇 wang guoyin
  • 20 篇 hai jin
  • 18 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 wang haoyu
  • 12 篇 feng gao

语言

  • 928 篇 英文
  • 142 篇 其他
  • 9 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1081 条 记 录,以下是481-490 订阅
排序:
A Real-Time Demonstration of Bidirectional Multi-Format/Rate-Adjustable Integrated Laser Communication/Ranging for Satellite Communication
A Real-Time Demonstration of Bidirectional Multi-Format/Rate...
收藏 引用
Conference on Lasers and Electro-Optics (CLEO)
作者: Yizhou Wang Yuanxiang Wang Zhen Luo Linsheng Zhong Yang Zou Xueyuan Ao Jiale Liu Feng Fan Xiaoliang Li Xiaoxiao Dai Qi Yang Deming Liu Wuhan National Lab for Optoelectronics (WNLO) & National Engineering Laboratory for Next Generation Internet Access System School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Beijing Research Institute of Telemetry Beijing China Jinyinhu Laboratory Wuhan China
A multi-format/rate-adjustable integrated laser communication/ranging system is proposed, achieving adjustable rates between 0.625-10Gbit/s. Real-time experiment shows that at 1e-4 BER the ranging error is only 0.29% ... 详细信息
来源: 评论
AutoSlicer: Automatic Program Partitioning for Securing Sensitive data Based-on data Dependency Analysis and Code Refactoring
AutoSlicer: Automatic Program Partitioning for Securing Sens...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Weizhong Qiang Hao Luo Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Legacy programs are normally monolithic (that is, all code runs in a single process and is not partitioned), and a bug in a program may result in the entire program being vulnerable and therefore untrusted. Program pa... 详细信息
来源: 评论
BSL: Understanding and Improving Softmax Loss for Recommendation
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Junkang Chen, Jiawei Wu, Jiancan Shi, Wentao Zhang, Jizhi Wang, Xiang MoE Key Laboratory of Brain-inspired Intelligent Perception and Cognition University of Science and Technology of China Hefei China The State Key Laboratory of Blockchain and Data Security Zhejiang Unversity China Institute of Artificial Intelligence Institute of Dataspace Hefei Comprehensive National Science Center China
Loss functions steer the optimization direction of recommendation models and are critical to model performance, but have received relatively little attention in recent recommendation research. Among various losses, we... 详细信息
来源: 评论
GNEA: A Novel GCN-based Network Embedding Algorithm for Semantic Social Network
GNEA: A Novel GCN-based Network Embedding Algorithm for Sema...
收藏 引用
International Symposium on system and Software Reliability (ISSSR)
作者: Jinbo Zhao Jinling He Yuanhan Du Ming Tang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
With the development of semantic social networks, social networks become more complex and their size expands rapidly, which brings significant challenges to social network analysis. Network Embedding can transform the... 详细信息
来源: 评论
Semantic and Emotional Dual Channel for Emotion Recognition in Conversation
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Yang, Zhenyu Zhang, Zhibo Cheng, Yuhu Zhang, Tong Wang, Xuesong Jinan250353 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China China University of Mining and Technology Engineering Research Center of Intelligent Control for Underground Space Ministry of Education Xuzhou Key Laboratory of Artificial Intelligence and Big Data School of Information and Control Engineering Xuzhou221116 China South China University of Technology Guangdong Provincial Key Laboratory of Computational Intelligence and Cyberspace Information School of Computer Science and Engineering Guangzhou510006 China Pazhou Lab Guangzhou510335 China Engineering Research Center Ministry of Education on Health Intelligent Perception and Paralleled Digital-Human Guangzhou China
Emotion recognition in conversation (ERC) aims at accurately identifying emotional states expressed in conversational content. Existing ERC methods, although relying on semantic understanding, often encounter challeng... 详细信息
来源: 评论
Achieving Network Resilience through Graph Neural Network-enabled Deep Reinforcement Learning
收藏 引用
IEEE Network 2025年
作者: Li, Xuzeng Zhang, Tao Wang, Jian Han, Zhen Liu, Jiqiang Kang, Jiawen Niyato, Dusit Jamalipour, Abbas Beijing Jiaotong University School of Cyberspace Science and Technology China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Guangdong University of Technology Technology School of Automation China Nanyang Technological University College of Computing and Data Science Singapore University of Sydney SydneyNSW2006 Australia
Deep reinforcement learning (DRL) has been widely used in many important tasks of communication networks. In order to improve the perception ability of DRL on the network, some studies have combined graph neural netwo... 详细信息
来源: 评论
Physically Secure and Privacy-Preserving Authentication Scheme for VANET
Physically Secure and Privacy-Preserving Authentication Sche...
收藏 引用
Artificial Intelligence of Things and systems (AIoTSys), International Conference on
作者: Dongmei Chen Yangfan Liang Lihui Li Yining Liu School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems Jiaxing University Jiaxing China School of Data Science and Artificial Intelligence Wenzhou University of Technology Wenzhou China
The communication between vehicles and other entities occurs over open wireless networks, making them susceptible to various security attacks In Vehicular Ad Hoc Network (VANET). Consequently, many researchers have pr... 详细信息
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
Real-time stealth transmission via dither-based bias control
Real-time stealth transmission via dither-based bias control
收藏 引用
Conference on Lasers and Electro-Optics (CLEO)
作者: Yuanxiang Wang Weidong Shao Linsheng Zhong Xiaoxiao Dai Qi Yang Lei Deng Deming Liu Mengfan Cheng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan China
We report a real-time 1 kbps stealthy transmission in the 10 Gbps QPSK public communication. The stealth data is embedded in dither signals of bias control. The scheme is compatible with existing optical transmission ... 详细信息
来源: 评论
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Hangtao Yao, Zeming Zhang, Leo Yu Hu, Shengshan Chen, Chao Liew, Alan Li, Zhetao School of Cyber Science and Engineering Huazhong University of Science and Technology China Swinburne University of Technology Australia Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China RMIT University Australia Xiangtan University China
Federated learning (FL) is vulnerable to poisoning attacks, where adversaries corrupt the global aggregation results and cause denial-of-service (DoS). Unlike recent model poisoning attacks that optimize the amplitude... 详细信息
来源: 评论