咨询与建议

限定检索结果

文献类型

  • 548 篇 期刊文献
  • 533 篇 会议

馆藏范围

  • 1,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 513 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 195 篇 信息与通信工程
    • 120 篇 电气工程
    • 115 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 32 篇 交通运输工程
    • 29 篇 网络空间安全
    • 27 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 334 篇 理学
    • 170 篇 数学
    • 88 篇 生物学
    • 80 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 182 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 38 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 44 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 optimization
  • 20 篇 machine learning
  • 19 篇 graph neural net...
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 contrastive lear...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 15 篇 robustness
  • 13 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 huazhong univers...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 20 篇 wang guoyin
  • 20 篇 hai jin
  • 18 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 wang haoyu
  • 12 篇 feng gao

语言

  • 928 篇 英文
  • 142 篇 其他
  • 9 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1081 条 记 录,以下是591-600 订阅
排序:
Graph Sampling based Fairness-aware Recommendation over Sensitive Attribute Removal
Graph Sampling based Fairness-aware Recommendation over Sens...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Shenghao Liu Guoyang Wu Xianjun Deng Hongwei Lu Bang Wang Laurence Yang James J. Park Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Smart Internet Technology School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea
Discrimination against different user groups has received growing attention in the recommendation field. To address this problem, existing works typically remove sensitive attributes that may cause discrimination thro...
来源: 评论
Research on security Assessment of intelligent Electronic Devices in Smart Grids Considering Cyber-Attacks and Physical Faults
SSRN
收藏 引用
SSRN 2023年
作者: Chen, Yang-Rong Li, Jun-E Xia, Yu Zhang, Rui-Wen Li, Ling-Ling Li, Xiao-Yu Ge, Lin School of Intelligent Engineering Zhengzhou University of Aeronautics Zhengzhou450046 China Henan Data Security Engineering Technology Research Center Zhengzhou450046 China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Zhengzhou University of Aeronautics China
The smart grid contains lots of intelligent electronic devices (IEDs). IEDs are considered high-priority targets of cyber-attacks. Assessing the security of IEDs effectively can help operators take timely measures to ... 详细信息
来源: 评论
DNN Task Assignment in UAV Networks: A Generative AI Enhanced Multi-Agent Reinforcement Learning Approach
arXiv
收藏 引用
arXiv 2024年
作者: Tang, Xin Chen, Qian Weng, Wenjie Liao, Binhan Wang, Jiacheng Cao, Xianbin Li, Xiaohuan Guangxi University Key Laboratory of Intelligent Networking and Scenario System School of Information and Communication Guilin University of Electronic Technology Guilin541004 China The College of Computing and Data Science Nanyang Technological University 639798 Singapore School of Architecture and Transportation Engineering Guilin University of Electronic Technology Guilin541004 China National Engineering Laboratory for Comprehensive Transportation Big Data Application Technology Guangxi Nanning530001 China College of Computing and Data Science Nanyang Technological University 639798 Singapore School of Electronic and Information Engineering The Key Laboratory of Advanced Technology of Near Space Information System Ministry of Industry and Information Technology of China Beihang University Beijing100191 China
Unmanned Aerial Vehicles (UAVs) possess high mobility and flexible deployment capabilities, prompting the development of UAVs for various application scenarios within the Internet of Things (IoT). The unique capabilit... 详细信息
来源: 评论
Hypotheses Tree Building for One-Shot Temporal Sentence Localization
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Daizong Fang, Xiang Zhou, Pan Di, Xing Lu, Weining Cheng, Yu Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China Peking University China Nanyang Technological University Singapore ProtagoLabs Inc United States Tsinghua University China Microsoft Research United States
Given an untrimmed video, temporal sentence localization (TSL) aims to localize a specific segment according to a given sentence query. Though respectable works have made decent achievements in this task, they severel... 详细信息
来源: 评论
Space-Air-Ground Integrated Network with Native Intelligence(NI-SAGIN):Concept,Architecture,Access and Networking
收藏 引用
China Communications 2022年 第1期19卷 I0002-I0007页
作者: Zhenyu Xiao Qihui Wu Jiajia Liu Ning Zhang Tao Sun the School of Electronic and Information Engineering Beihang University IET China Institute of Communications and of Electronics the Nanjing University of Aeronautics and Astronautics(NUAA) key lab of Ministry of Industry and Information Technology of China the School of Cybersecurity Northwestern Polytechnical University Shaanxi Provincial Engineering Laboratory of Cyber Security Xi’an Unmanned System Security and Intelligent Communications ISTC Center IEEE IOT-AHSN TC IEEE Communications Society1 IEEE Vehicular Technology Society1 the Department of Electrical and Computer Engineering at University of Windsor1 China Mobile Research Institute1 GPP SA21 China Mobile’s 3GPP SA and CT groups
Ubiquitous coverage is one of the most important goals for mobile communication *** achieve this,integration of space,air,and ground networks is highly demanded,which expects to become the one of the enabling technolo... 详细信息
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Haozhao Wang Wenchao Xu Yunfeng Fan Ruixuan Li Pan Zhou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computing The Hong Kong Polytechnic University Hong Kong Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co...
来源: 评论
Generalized Category Discovery with Large Language Models in the Loop
arXiv
收藏 引用
arXiv 2023年
作者: An, Wenbin Shi, Wenkai Tian, Feng Lin, Haonan Wang, QianYing Wu, Yaqiang Cai, Mingxiang Wang, Luyan Chen, Yan Zhu, Haiping Chen, Ping School of Automation Science and Engineering Xi’an Jiaotong University China School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering China Lenovo Research China University of Massachusetts Boston United States
Generalized Category Discovery (GCD) is a crucial task that aims to recognize both known and novel categories from a set of unlabeled data by utilizing a few labeled data with only known categories. Due to the lack of... 详细信息
来源: 评论
Forensicability Assessment of Questioned Images in Recapturing Detection
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Changsheng Zhao, Lin Cai, Rizhao Yu, Zitong Huang, Jiwu Kot, Alex C. The Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China The Department of Electrical and Electrics Engineering Nanyang Technological University Singapore639798 Singapore
Recapture detection of face and document images is an important forensic task. With deep learning, the performances of face anti-spoofing (FAS) and recaptured document detection have been improved significantly. Howev... 详细信息
来源: 评论
Towards Few-shot Inductive Link Prediction on Knowledge Graphs: A Relational Anonymous Walk-guided Neural Process Approach
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Zicheng Luo, Linhao Pan, Shirui Nguyen, Quoc Viet Hung Gong, Chen School of Computer Science and Engineering Nanjing University of Science and Technology China Jiangsu Key Laboratory of Image and Video Understanding for Social Security China Department of Data Science and AI Monash University Australia School of Information and Communication Technology Griffith University Australia Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education
Few-shot inductive link prediction on knowledge graphs (KGs) aims to predict missing links for unseen entities with few-shot links observed. Previous methods are limited to transductive scenarios, where entities exist... 详细信息
来源: 评论
GRIDLESS TOMOGRAPHIC SAR IMAGING BASED ON ACCELERATED ATOMIC NORM MINIMIZATION WITH EFFICIENCY
GRIDLESS TOMOGRAPHIC SAR IMAGING BASED ON ACCELERATED ATOMIC...
收藏 引用
2022 International Conference on Radar systems, RADAR 2022
作者: Gao, Silin Zhang, Zhe Zhang, Bingchen Wu, Yirong Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China Key Laboratory of Technology in Geo-spatial Information Processing and Application System Chinese Academy of Sciences Beijing100190 China School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Beijing100049 China Key Laboratory of Intelligent Aerospace Big Data Application Technology Suzhou215123 China Suzhou Aerospace Information Research Institute Suzhou215123 China
Synthetic aperture radar (SAR) tomography (TomoSAR) enables the reconstruction and three-dimensional (3D) localization of targets based on multiple two-dimensional (2D) observations of the same scene. The resolving al... 详细信息
来源: 评论