咨询与建议

限定检索结果

文献类型

  • 548 篇 期刊文献
  • 533 篇 会议

馆藏范围

  • 1,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 513 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 195 篇 信息与通信工程
    • 120 篇 电气工程
    • 115 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 32 篇 交通运输工程
    • 29 篇 网络空间安全
    • 27 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 334 篇 理学
    • 170 篇 数学
    • 88 篇 生物学
    • 80 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 182 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 38 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 44 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 optimization
  • 20 篇 machine learning
  • 19 篇 graph neural net...
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 contrastive lear...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 15 篇 robustness
  • 13 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 huazhong univers...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 20 篇 wang guoyin
  • 20 篇 hai jin
  • 18 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 wang haoyu
  • 12 篇 feng gao

语言

  • 928 篇 英文
  • 142 篇 其他
  • 9 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1081 条 记 录,以下是541-550 订阅
排序:
Deep Common Feature Mining for Efficient Video Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Zheng, Yaoyan Yang, Hongyu Huang, Di State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing100191 China Institute of Artificial Intelligence Beihang University Beijing100191 China Shanghai Artificial Intelligence Laboratory Shanghai201112 China Zhejiang Industrial Big Data and Robot Intelligent System Key Laboratory Hangzhou Innovation Institute Beihang University Hangzhou310051 China
Recent advancements in video semantic segmentation have made substantial progress by exploiting temporal correlations. Nevertheless, persistent challenges, including redundant computation and the reliability of the fe... 详细信息
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
arXiv
收藏 引用
arXiv 2024年
作者: Deng, Kaijun Zheng, Dezhi Xie, Jindong Wang, Jinbao Xie, Weicheng Shen, Linlin Song, Siyang Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China Department of Computer Science University of Exeter United Kingdom
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
Few-shot Open Relation Extraction with Gaussian Prototype and Adaptive Margin
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Tianlin Zhang, Lingling Wang, Jiaxin Lei, Yunkuo Li, Yifei Wang, Haofen Liu, Jun School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi’an710049 China School of Computer Science and Technology Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi’an710049 China College of Design and Innovation Tongji University Shanghai200092 China
Few-shot relation extraction with none-of-the-above (FsRE with NOTA) aims at predicting labels in few-shot scenarios with unknown classes. FsRE with NOTA is more challenging than the conventional few-shot relation ext... 详细信息
来源: 评论
HRTS: Hierarchical Rauch-Tung-Striebel Smoother With Online Learning Priors for EEG Denoising
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第2期9卷 673-688页
作者: Wang, Chuan-Sheng Zhang, Ling Fu, Tian-Lin Chen, Zhao-Qi Zhang, Fu-Quan Department of Automatic Control Technical Polytechnic University of Catalonia Autonomous Region of Catalonia Barcelona Spain School of Computer and Data Science Minjiang University No.200 Xiyuangong Road Fuzhou University Town Fujian Province Fuzhou City China College of Computer and Big Data Fuzhou University No.2 Wulongjiang North Road Fuzhou University Town Fujian Province Fuzhou City China Digital Media Art Key Laboratory of Sichuan Province Sichuan Conservatory of Music Fuzhou Technology Innovation Center of Intelligent Manufacturing Information System Minjiang University No.200 Xiyuangong Road Fuzhou University Town Fujian Province Fuzhou City China Fujian Province University No.1 Campus New Village Longjiang Street Fujian Province Fuqing City China
Electroencephalogram (EEG) is a nonlinear signal that reflects the physio-logical state of the brain at different times, containing rich information. However, the possible interference during the collection and transm... 详细信息
来源: 评论
A Solar-Blind Photodetector with Ultrahigh Rectification Ratio and Photoresponsivity Based on the Mote2/Ta:Β-Ga2o3 Pn Junction
SSRN
收藏 引用
SSRN 2023年
作者: Zeng, Guang Zhang, Meng-Ru Chen, Yu-Chang Li, Xiao-Xi Chen, Ding-Bo Shi, Cai-Yu Zhao, Xue-Feng Chen, Na Wang, Ting-Yun Zhang, David Wei Lu, Hong-Liang State Key Laboratory of ASIC and System Shanghai Institute of Intelligent Electronics & Systems School of Microelectronics Fudan University Shanghai200433 China Jia-Shan Fudan Institute Zhejiang Province Jiaxing314100 China State Key Laboratory of Integrated Chip and System Frontier Institute of Chip and System Fudan University Shanghai200433 China Key Laboratory of Specialty Fiber Optics and Optical Access Networks Shanghai Institute Communication and Data Science Shanghai University Shanghai200444 China
High-performance solar-blind photodetectors have attracted increasing attention due to their important implications in military, medical, and industrial applications. Among a large number of wide-bandgap semiconductor... 详细信息
来源: 评论
SFTA: Spiking Neural Networks Vulnerable to Spiking Feature Transferable Attack
SFTA: Spiking Neural Networks Vulnerable to Spiking Feature ...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)
作者: Xuanwei Lin Chen Dong Ximeng Liu College of Computer and Data Science Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing (Fuzhou University) Key Lab of Information Security of Network Systems (Fuzhou University)
Many recent works have shown that spiking neural networks (SNNs) are vulnerable to well-crafted adversarial attacks in the white-box setting, which may lead to misclassification of the trained model. However, the info... 详细信息
来源: 评论
Short-term Portfolio Optimization using Doubly Regularized Exponential Growth Rate
Short-term Portfolio Optimization using Doubly Regularized E...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Quanlong Guan Jinneng He Zhao-Rong Lai Yuyu Zhou Quming Jiang Ziliang Chen College of Information Science and Technology Jinan University Guangzhou China Guangdong Institute of Smart Education Jinan University Guangzhou China Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou China Guangdong-Macao Advanced Intelligent Computing Joint Laboratory Zhuhai China Chutian Dragon Co. Ltd Dongguan China School of Intelligent Systems Science and Engineering Jinan University China
In the realm of short-term portfolio optimization, the integration of machine learning with exponential growth rate techniques is gaining prominence. This paper introduces a novel approach for short-term portfolio opt... 详细信息
来源: 评论
DAMPER: A Dual-Stage Medical Report Generation Framework with Coarse-Grained MeSH Alignment and Fine-Grained Hypergraph Matching  39
DAMPER: A Dual-Stage Medical Report Generation Framework wit...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Huang, Xiaofei Chen, Wenting Liu, Jie Lu, Qisheng Luo, Xiaoling Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Electrical Engineering City University of Hong Kong Kowloon Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Medical report generation is crucial for clinical diagnosis and patient management, summarizing diagnoses and recommendations based on medical imaging. However, existing work often overlook the clinical pipeline invol... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
A Botnet data Collection Method for Industrial Internet
A Botnet Data Collection Method for Industrial Internet
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Shu Jian Xian Bo Wang Chenli Lu Jiazhong Huang Yuanyuan Han Shuo School of Cybersecurity Chengdu University of Information Technology Chengdu Sichuan China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu Sichuan China Department of Statistics and Data Sciences Northwestern University Evanston IL USA
Industrial internet security is related to industrial production operations and national economic security. Network intrusion detection dataset in industrial control environment can effectively train detection models ...
来源: 评论