咨询与建议

限定检索结果

文献类型

  • 548 篇 期刊文献
  • 533 篇 会议

馆藏范围

  • 1,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 513 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 195 篇 信息与通信工程
    • 120 篇 电气工程
    • 115 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 32 篇 交通运输工程
    • 29 篇 网络空间安全
    • 27 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 334 篇 理学
    • 170 篇 数学
    • 88 篇 生物学
    • 80 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 182 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 38 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 44 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 optimization
  • 20 篇 machine learning
  • 19 篇 graph neural net...
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 contrastive lear...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 15 篇 robustness
  • 13 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 huazhong univers...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 20 篇 wang guoyin
  • 20 篇 hai jin
  • 18 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 wang haoyu
  • 12 篇 feng gao

语言

  • 928 篇 英文
  • 142 篇 其他
  • 9 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1081 条 记 录,以下是551-560 订阅
排序:
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild
arXiv
收藏 引用
arXiv 2024年
作者: Ling, Xiang Wu, Zhiyu Wang, Bin Deng, Wei Wu, Jingzheng Ji, Shouling Luo, Tianyue Wu, Yanjun Intelligent Software Research Center Institute of Software Chinese Academy of Sciences China China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China Network and Data Security China Hangzhou Research Institute Xidian University China Zhejiang University China
Given the remarkable achievements of existing learning-based malware detection in both academia and industry, this paper presents MalGuise, a practical black-box adversarial attack framework that evaluates the securit... 详细信息
来源: 评论
MC-GAN: An Adversarial Sample Defense Algorithm
MC-GAN: An Adversarial Sample Defense Algorithm
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: WANG CHENLI WU JUYANG YANG XING WANG JUNFEI SHU JIAN LU JIAZHONG HUANG YUANYUAN HAN SHUO School of Cybersecurity Chengdu University of Information Technology Chengdu Sichuan China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu Sichuan China Department of Statistics and Data Sciences Northwestern University Evanston IL USA
The current adversarial sample defense algorithms are plagued by issues such as poor defense effectiveness and high training costs. In order to enhance sample classification accuracy while reducing training costs, we ...
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Two-Stage OD Flow Prediction for Emergency in Urban Rail Transit
收藏 引用
IEEE Transactions on intelligent Transportation systems 2024年 第1期25卷 920-928页
作者: Zhu, Guangyu Ding, Jiacun Wei, Yun Yi, Yang Xu, Sendren Sheng-Dong Wu, Edmond Q. Beijing Jiaotong University Key Lab. of Transport Industry of Big Data Application Technologies for Comprehensive Transport The Beijing Research Center of Urban Traffic Information Sensing and Service Technologies Beijing100044 China Beijing Mass Transit Railway Operation Corporation Ltd. Beijing100014 China Yangzhou University College of Information Engineering Yangzhou225127 China National Taiwan University of Science and Technology Automation and Control Center The Graduate Institute of Automation and Control Taipei106335 Taiwan Shanghai Jiao Tong University Key Laboratory of System Control and Information Processing Ministry of Education of China The Shanghai Engineering Research Center of Intelligent Control and Management Department of Automation Shanghai200240 China
Urban rail transit (URT) is vulnerable to natural disasters and social emergencies including fire, storm and epidemic (such as COVID-19), and real-time origin-destination (OD) flow prediction provides URT operators wi... 详细信息
来源: 评论
Visible-Thermal Multiple Object Tracking: Large-scale Video dataset and Progressive Fusion Approach
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, Yabin Wang, Qianwu Li, Chenglong Tang, Jin Huang, Zhixiang The Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University School of Public Safety and Emergency Management Anhui University of Science and Technology Hefei231131 China School of Artificial Intelligence Anhui University Hefei230601 China Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Security Artificial Intelligence School of Artificial Intelligence Anhui University Hefei230601 China Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China Center for Big Data and Population Health of IHM China
The complementary benefits from visible and thermal infrared data are widely utilized in various computer vision task, such as visual tracking, semantic segmentation and object detection, but rarely explored in Multip... 详细信息
来源: 评论
Detecting and Corrupting Convolution-based Unlearnable Examples  39
Detecting and Corrupting Convolution-based Unlearnable Examp...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Li, Minghui Wang, Xianlong Yu, Zhifei Hu, Shengshan Zhou, Ziqi Zhang, Longling Zhang, Leo Yu School of Software Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Convolution-based unlearnable examples (UEs) employ class-wise multiplicative convolutional noise to training samples, severely compromising model performance. This fire-new type of UEs have successfully countered all...
来源: 评论
A Point Cloud Registration Method for Substations Based on an Improved SAC-IA Algorithm
A Point Cloud Registration Method for Substations Based on a...
收藏 引用
Chinese Automation Congress (CAC)
作者: Lei Wang Yiping Chen Haonan Zong Lulu Wang Jun Yin School of Computer Nanjing University of Posts and Telecommunications Nanjing PR China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing PR China School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing PR China
This paper proposes a point cloud registration method for substations based on an improved SAC-IA algorithm. This method optimizes the SAC-IA algorithm by filtering the randomly selected point pairs to ensure that the...
来源: 评论
Adversarial Training Via Multi-Guidance and Historical Memory Enhancement
SSRN
收藏 引用
SSRN 2024年
作者: Zhao, Chenyu Qian, Yaguan Wang, Bin Gu, Zhaoquan Ji, Shouling Wang, Wei Zhang, Yanchun School of Science Zhejiang University of Science and Technology China Network and Data Security China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China School of Computer Science and Technology Zhejiang University China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University China Institute for Sustainable Industries and Liveable Cities Victoria University Australia Peng Cheng Laboratory China
DNNs are often susceptible to the influence of adversarial examples, potentially leading to severe security issues. Adversarial training stands out as one of the most effective defenses. In this paper, we empirically ... 详细信息
来源: 评论
Mixed Motivation Driven Social Multi-Agent Reinforcement Learning for Autonomous Driving
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第6期12卷 1272-1282页
作者: Long Chen Peng Deng Lingxi Li Xuemin Hu State Key Laboratory of Multimodal Artificial Intelligence Systems and the State Key Laboratory of Management and Control for Complex Systems Chinese Academy of Sciences Beijing WAYTOUS Inc. Beijing Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ) Shenzhen Institute of Artificial Intelligence and Robotics Xi'an Jiaotong University Xi'an China School of Computer Science and Information Engineering Hubei University Wuhan China Purdue School of Engineering and Technology Indiana University-Purdue University Indianapolis Indianapolis IN USA School of Artificial Intelligence Hubei University Wuhan Key Laboratory of Intelligent Sensing System and Security (Hubei University) Ministry of Education Wuhan China
Despite great achievement has been made in autonomous driving technologies, autonomous vehicles (AVs) still exhibit limitations in intelligence and lack social coordination, which is primarily attributed to their reli... 详细信息
来源: 评论
Structural disorder-induced topological phase transitions in quasicrystals
收藏 引用
Physical Review B 2024年 第19期109卷 195301-195301页
作者: Tan Peng Yong-Chen Xiong Chun-Bo Hua Zheng-Rong Liu Xiaolu Zhu Wei Cao Fang Lv Yue Hou Bin Zhou Ziyu Wang Rui Xiong Key Laboratory of Artificial Micro- and Nano-Structures of Ministry of Education School of Physics and Technology Wuhan University Wuhan 430072 China Hubei Key Laboratory of Energy Storage and Power Battery and School of Mathematics Physics and Optoelectronic Engineering Hubei University of Automotive Technology Shiyan 442002 China School of Electronic and Information Engineering Hubei University of Science and Technology Xianning 437100 China Department of Physics Hubei University Wuhan 430062 China The Institute of Technological Science Wuhan University Wuhan 430072 China Key Laboratory of Intelligent Sensing System and Security of Ministry of Education Hubei University Wuhan 430062 China
Recently, structural disorder-induced topological phase transitions in periodic systems have attracted much attention. However, in aperiodic systems such as quasicrystalline systems, the interplay between structural d... 详细信息
来源: 评论