咨询与建议

限定检索结果

文献类型

  • 548 篇 期刊文献
  • 533 篇 会议

馆藏范围

  • 1,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 513 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 195 篇 信息与通信工程
    • 120 篇 电气工程
    • 115 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 32 篇 交通运输工程
    • 29 篇 网络空间安全
    • 27 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 334 篇 理学
    • 170 篇 数学
    • 88 篇 生物学
    • 80 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 182 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 38 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 44 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 optimization
  • 20 篇 machine learning
  • 19 篇 graph neural net...
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 contrastive lear...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 15 篇 robustness
  • 13 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 huazhong univers...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 20 篇 wang guoyin
  • 20 篇 hai jin
  • 18 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 wang haoyu
  • 12 篇 feng gao

语言

  • 928 篇 英文
  • 142 篇 其他
  • 9 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1081 条 记 录,以下是661-670 订阅
排序:
Application Research of Vertical Federated Learning Technology in Banking Risk Control Model Strategy
Application Research of Vertical Federated Learning Technolo...
收藏 引用
IEEE International Conference on Big data and Cloud Computing (BdCloud)
作者: Yong Luo Zhi Lu Xiaofei Yin Songfeng Lu Yiting Weng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China China Minsheng Banking Corp. Ltd. Beijing China Shenzhen Huazhong University of Science and Technology Research Institute Wuhan China Shu Lun Pan Beijing China
This study centers on the application of vertical federated learning technology in the context of Internet banking loans, with a particular focus on innovations in data privacy protection, risk control model algorithm...
来源: 评论
Detecting and Corrupting Convolution-based Unlearnable Examples
arXiv
收藏 引用
arXiv 2023年
作者: Li, Minghui Wang, Xianlong Yu, Zhifei Hu, Shengshan Zhou, Ziqi Zhang, Longling Zhang, Leo Yu School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Convolution-based unlearnable examples (UEs) employ class-wise multiplicative convolutional noise to training samples, severely compromising model performance. This fire-new type of UEs have successfully countered all... 详细信息
来源: 评论
ADA-GAD: Anomaly-Denoised Autoencoders for Graph Anomaly Detection
arXiv
收藏 引用
arXiv 2023年
作者: He, Junwei Xu, Qianqian Jiang, Yangbangyan Wang, Zitai Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
Graph anomaly detection is crucial for identifying nodes that deviate from regular behavior within graphs, benefiting various domains such as fraud detection and social network. Although existing reconstruction-based ... 详细信息
来源: 评论
Simultaneous Speech Extraction for Multiple Target Speakers under the Meeting Scenarios
arXiv
收藏 引用
arXiv 2022年
作者: Zeng, Bang Suo, Hongbing Wan, Yulong Li, Ming School of Computer Science Wuhan University Wuhan China Suzhou Municipal Key Laboratory of Multimodal Intelligent Systems Duke Kunshan University Kunshan China Data & AI Engineering System OPPO Beijing China
The common target speech separation directly estimate the target source, ignoring the interrelationship between different speakers at each frame. We propose a multiple-target speech separation model (MTSS) to simultan... 详细信息
来源: 评论
Shadow detection of moving objects in traffic monitoring video  9
Shadow detection of moving objects in traffic monitoring vid...
收藏 引用
9th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2020
作者: Zhang, Mingrui Zhao, Wenbing Li, Xiying Wang, Dan Beijing University of Technology College of Computer Science and Technology Beijing China Sun Yat-sen University Intelligent Transportation Research Center School of Intelligent System Engineering Guangzhou China Key Laboratory of Intelligent Transportation System of Guangdong Province Guangzhou China Key Laboratory of Video Image Intelligent Analysis and Application Technology Ministry of Public Security Guangzhou China
Moving object detection is an important application of computer vision. Commonly used foreground separation algorithms such as Gaussian mixture modeling, ViBe, frame difference method, etc., do not consider the color ... 详细信息
来源: 评论
Understanding Large Language Model Supply Chain: Structure, Domain, and Vulnerabilities
arXiv
收藏 引用
arXiv 2025年
作者: Hu, Yanzhe Wang, Shenao Nie, Tianyuan Zhao, Yanjie Wang, Haoyu Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Large Language Models (LLMs) have revolutionized artificial intelligence (AI), driving breakthroughs in natural language understanding, text generation, and autonomous systems. However, the rapid growth of LLMs presen... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
Dual-Correction Adaptation Network for Noisy Knowledge Transfer
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Yunyun Zheng, Weiwen Chen, Songcan The Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Computer Science and Engineering Nanjing University of Posts & Telecommunications Nanjing210046 China The MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Computer Science & Technology/AI Nanjing University of Aeronautics & Astronautics Nanjing210023 China
Previous unsupervised domain adaptation (UDA) methods aim to promote target learning via a single-directional knowledge transfer from label-rich source domain to unlabeled target domain, while its reverse adaption fro... 详细信息
来源: 评论
Enhancing Pulmonary Nodule Classification performance with TriCaps-RL: A Capsule Network Reinforcement Learning Approach
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第3期9卷 1441-1459页
作者: Zheng, Guang-Yuan Zhang, Fu-Quan Cheng, Chen Shan, Hong-Tao Soomro, Nouman Qadeer Liu, Yi College of Information Technology Shanghai Jian Qiao University Shanghai201306 China School of Mathematics and Computer Science Yanan University Shaanxi 716000 China School of Computer and Data Science Minjiang University No.200 Xiyuangong Road Fuzhou University Town Fuzhou350108 China Digital Media Art Key Laboratory of Sichuan Province Sichuan Conservatory of Music Chengdu610021 China Fuzhou Technology Innovation Center of intelligent Manufacturing information System Minjiang University Fuzhou350108 China Fujian Province University Fuzhou350300 China College of Business Shanghai Jian Qiao University Shanghai201306 China College of Electronic and Electrical Engineering Shanghai University of Engineering Science Shanghai201620 China Software Department Mehran University of Engineering & Technology Sindh 76062 Pakistan
Distinguishing the manifestations of pulmonary nodules poses a significant challenge in the medical field, demanding the expertise of experienced radiologists. This complexity results in the high cost and inadequacy o... 详细信息
来源: 评论
III-V/Si hybrid external-cavity laser utilizing TM mode in the passive photonic circuit  27
III-V/Si hybrid external-cavity laser utilizing TM mode in t...
收藏 引用
27th OptoElectronics and Communications Conference/International Conference on Photonics in Switching and Computing, OECC/PSC 2022
作者: Guo, Yuyao Li, Xinhang Jin, Minhui Lu, Liangjun Xie, Jingya Chen, Jianping Zhou, Linjie Shanghai Institute for Advanced Communication and Data Science State Key Laboratory of Advanced Optical Communication Systems and Networks Shanghai Jiao Tong University Department of Electronic Engineering Shanghai200240 China SJTU-Pinghu Institute of Intelligent Optoelectronics Pinghu314200 China Terahertz Technology Innovation Research Institute Terahertz Spectrum and Imaging Technology Cooperative Innovation Center University of Shanghai for Science and Technology Shanghai Key Lab of Modern Optical System Shanghai200093 China
We present a III-V/Si hybrid laser using the silicon waveguide TM mode to reduce the propagation loss, backscattering, and two-photon absorption. The TM-mode laser has superior performance than the TE-mode laser. ... 详细信息
来源: 评论