咨询与建议

限定检索结果

文献类型

  • 548 篇 期刊文献
  • 533 篇 会议

馆藏范围

  • 1,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 513 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 195 篇 信息与通信工程
    • 120 篇 电气工程
    • 115 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 32 篇 交通运输工程
    • 29 篇 网络空间安全
    • 27 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 334 篇 理学
    • 170 篇 数学
    • 88 篇 生物学
    • 80 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 182 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 38 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 44 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 optimization
  • 20 篇 machine learning
  • 19 篇 graph neural net...
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 contrastive lear...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 15 篇 robustness
  • 13 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 huazhong univers...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 20 篇 wang guoyin
  • 20 篇 hai jin
  • 18 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 wang haoyu
  • 12 篇 feng gao

语言

  • 928 篇 英文
  • 142 篇 其他
  • 9 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1081 条 记 录,以下是491-500 订阅
排序:
Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVs
Path Planning based on Reinforcement Learning with Improved ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qun Ding Xiaolong Xu Wenming Gui Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Jinling Institute of Technology Nanjing China
As the emerging technology of Unmanned Aerial Vehicles (UAVs) becomes mature, UAVs are widely used in environmental monitoring, communication and other fields. In view of this, this paper analyzed the task of synergis...
来源: 评论
FedCSA: Boosting the Convergence Speed of Federated Unlearning under data Heterogeneity
FedCSA: Boosting the Convergence Speed of Federated Unlearni...
收藏 引用
IEEE International Conference on Big data and Cloud Computing (BdCloud)
作者: Zhen Wang Daniyal M Alghazzawi Li Cheng Gaoyang Liu Chen Wang Zeng Cheng Yang Yang Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China King Abdulaziz University Jeddah Saudi Arabia Huazhong University of Science and Technology Wuhan China
The exponential growth of the Internet and the widespread availability of personal data have raised significant concerns regarding personal privacy and societal security. In response, the “right to be forgotten” has...
来源: 评论
Research on Control Optimization Method of Mine Ventilation system Based on intelligent Optimization Algorithm
收藏 引用
Journal of Computers (Taiwan) 2023年 第1期34卷 239-248页
作者: Lian, Wen-Li Qi, Jing-Jing Key Laboratory of Intelligent Data Information Processing and Control of Hebei Province Tangshan University Hebei Province Tangshan City063600 China Key Laboratory of Intelligent Motion Control System of Tangshan City Tangshan University Hebei Province Tangshan City063600 China Tangshan University Hebei Province Tangshan City063600 China
In view of the complex ventilation network in the mine, many influencing factors, and the complex establishment of the air demand model, this paper establishes an air volume optimization model with the minimum energy ... 详细信息
来源: 评论
Using Depth-Enhanced Spatial Transformation for Student Gaze Target Estimation in Dual-View Classroom Images
Using Depth-Enhanced Spatial Transformation for Student Gaze...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haonan Miao Peizheng Zhao Yuqi Sun Fang Nan Xiaolong Zhang Yaqiang Wu Feng Tian School of Computer Science and Technology Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Advanced Technology Xi’an Jiaotong-Liverpool University Suzhou China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an China
Dual-view gaze target estimation in classroom environments has not been thoroughly explored. Existing methods lack consideration of depth information, primarily focusing on 2D image information and neglecting the late... 详细信息
来源: 评论
Alexa Skills: security Vulnerabilities and Countermeasures
Alexa Skills: Security Vulnerabilities and Countermeasures
收藏 引用
IEEE Conference on Communications and Network security (CNS)
作者: Dan Su Jiqiang Liu Sencun Zhu Xiaoyang Wang Wei Wang Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University School of EECS The Pennsylvania State University Beijing Key Laboratory of Traffic Data Analysis and Mining Beijing Jiaotong University
The home voice assistants such as Amazon Alexa have become increasingly popular due to many interesting voice-activated services provided through special applications called skills. These skills, though useful, have a... 详细信息
来源: 评论
Fingerprint Presentation Attack Detector Using Global-Local Model
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Haozhe Zhang, Wentian Liu, Feng Wu, Haoqian Shen, Linlin The Computer Vision Institute College of Computer Science and Software Engineering SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society The National Engineering Laboratory for Big Data System Computing Technology The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China
The vulnerability of automated fingerprint recognition systems (AFRSs) to presentation attacks (PAs) promotes the vigorous development of PA detection (PAD) technology. However, PAD methods have been limited by inform... 详细信息
来源: 评论
Distributed Control of Multi-agent systems with Unknown Time-varying Gains: A Novel Indirect Framework for Prescribed Performance
arXiv
收藏 引用
arXiv 2022年
作者: Li, Zeqiang Wang, Yujuan Huang, Xiucai The State Key Laboratory of Power Transmission Equipment System Security and New Technology Chongqing Key Laboratory of Intelligent Unmanned Systems School of Automation Chongqing University Chongqing400044 China The Star Institute for Intelligent Systems Chongqing400044 China
In this paper, a new yet indirect performance guaranteed framework is established to address the distributed tracking control problem for networked uncertain nonlinear strict-feedback systems with unknown time-varying... 详细信息
来源: 评论
Anomalous Hall effects in magnetic weak topological insulator films
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Rui Yi, Xiao-Xia Zhou, Bin Xu, Dong-Hui Department of Physics Hubei University Wuhan430062 China Key Laboratory of Intelligent Sensing System and Security of Ministry of Education Hubei University Wuhan430062 China Department of Physics Chongqing Key Laboratory for Strongly Coupled Physics Chongqing University Chongqing400044 China Center of Quantum Materials and Devices Chongqing University Chongqing400044 China
The interplay between magnetism and strong topological insulator gives rise to distinct new topological phases and various intriguing phenomena, attracting significant attention in recent years. However, magnetic effe... 详细信息
来源: 评论
LEGNN: A Label Ensemble Perspective for Training a Label-Noise-Resistant GNN with Reduced Complexity
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Rui Shi, Bin Liang, Zhiming Ruan, Jianfei Dong, Bo Lin, Lu School of Computer Science and Technology Xi'an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering China School of Distance Education Xi'an Jiaotong University China College of Information Sciences and Technology Penn State University United States
Graph Neural Networks (GNNs) have been widely employed for semi-supervised node classification tasks on graphs. However, the performance of GNNs is significantly affected by label noise, that is, a small amount of inc... 详细信息
来源: 评论
Disentangling Client Contributions: Improving Federated Learning Accuracy in the Presence of Heterogeneous data
Disentangling Client Contributions: Improving Federated Lear...
收藏 引用
IEEE International Conference on Big data and Cloud Computing (BdCloud)
作者: Chunming Liu Daniyal M Alghazzawi Li Cheng Gaoyang Liu Chen Wang Cheng Zeng Yang Yang Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China King Abdulaziz University Jeddah Saudi Arabia Huazhong University of Science and Technology Wuhan China
Federated Learning (FL) is a promising paradigm that leverages distributed data sources to train machine learning models, thereby offering significant privacy advantages. However, the inherent statistical heterogeneit...
来源: 评论