咨询与建议

限定检索结果

文献类型

  • 548 篇 期刊文献
  • 533 篇 会议

馆藏范围

  • 1,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 513 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 195 篇 信息与通信工程
    • 120 篇 电气工程
    • 115 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 32 篇 交通运输工程
    • 29 篇 网络空间安全
    • 27 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 334 篇 理学
    • 170 篇 数学
    • 88 篇 生物学
    • 80 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 182 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 38 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 44 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 optimization
  • 20 篇 machine learning
  • 19 篇 graph neural net...
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 contrastive lear...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 15 篇 robustness
  • 13 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 huazhong univers...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 20 篇 wang guoyin
  • 20 篇 hai jin
  • 18 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 wang haoyu
  • 12 篇 feng gao

语言

  • 928 篇 英文
  • 142 篇 其他
  • 9 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1081 条 记 录,以下是671-680 订阅
排序:
SFDA-rPPG: Source-Free Domain Adaptive Remote Physiological Measurement with Spatio-Temporal Consistency
arXiv
收藏 引用
arXiv 2024年
作者: Xie, Yiping Yu, Zitong Wu, Bingjie Xie, Weicheng Shen, Linlin Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Singapore
Remote Photoplethysmography (rPPG) is a non-contact method that uses facial video to predict changes in blood volume, enabling physiological metrics measurement. Traditional rPPG models often struggle with poor genera... 详细信息
来源: 评论
Partial Deep Domain Adaptation for Non-Intrusive Load Monitoring
Partial Deep Domain Adaptation for Non-Intrusive Load Monito...
收藏 引用
IEEE International Conference on Big data and Cloud Computing (BdCloud)
作者: Yuying Li Yang Yang Chen Wang Runqin Liu Hongbo Jiang Wenping Liu Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China Huazhong University of Science and Technology Wuhan China China Unicom Central South Research Institute Changsha China Hunan University Changsha China Hubei University of Economics Wuhan China
With the widespread deployment of smart meters and the burgeoning integration of the Ubiquitous Power Internet of Things (UPIoT), Non-Intrusive Load Monitoring (NILM) has emerged as an essential technology, providing ...
来源: 评论
Backdoor Defense with Machine Unlearning
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Yang Fan, Mingyuan Chen, Cen Liu, Ximeng Ma, Zhuo Wang, Li Ma, Jianfeng Xi'An China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'An China College of Computer and Data Science Fuzhou University Fuzhou China School of Data Science and Engineering East China Normal University Shanghai China Ant Group Hangzhou China
Backdoor injection attack is an emerging threat to the security of neural networks, however, there still exist limited effective defense methods against the attack. In this paper, we propose BAERASER, a novel method t... 详细信息
来源: 评论
Efficient Adaptive Label Refinement for Label Noise Learning
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Wenzhen Cheng, Debo Lu, Guangquan Zhou, Bo Li, Jiaye Zhang, Shichao School of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guangxi Guilin541004 China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Guilin541004 China UniSA STEM University of South Australia AdelaideSA5095 Australia Guangxi Collaborative Innovation Center of Modern Sericulture and Silk Hechi University Guangxi Hechi546300 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou310027 China
Deep neural networks are highly susceptible to overfitting noisy labels, which leads to degraded performance. Existing methods address this issue by employing manually defined criteria, aiming to achieve optimal parti... 详细信息
来源: 评论
Exfiltration-resistant Proxy Re-Encryption for IoT data Sharing in Unreliable Clouds
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhou, Yuyang Zhao, Liang Li, Fagen Takagi, Tsuyoshi School of Cyberspace Security Hainan University Haikou570000 China Department of Mathematical Informatics Graduate School of Information Science and Technology The university of Tokyo Tokyo113-8656 Japan School of Cyber Science and Engineering Sichuan University Chengdu610065 China Key Laboratory of Data Protection and Intelligent Management [Sichuan University Ministry of Education China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
The sharing of Internet of Things (IoT) data plays an extensive role in our everyday lives. Exploring secure and efficient methods for data sharing is a prominent area of research. Proxy re-encryption (PRE) in the clo... 详细信息
来源: 评论
Uplink Precoding Design for Cell-Free Massive MIMO With Iteratively Weighted MMSE
Uplink Precoding Design for Cell-Free Massive MIMO With Iter...
收藏 引用
作者: Wang, Zhe Zhang, Jiayi Ngo, Hien Quoc Ai, Bo Debbah, Merouane Frontiers Science Center for Smart High-Speed Railway System The School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China Institute of Electronics Communications and Information Technology Queen’s University Belfast BelfastBT3 9DT United Kingdom State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China Henan Joint International Research Laboratory of Intelligent Networking and Data Analysis The Frontiers Science Center for Smart High-Speed Railway System Zhengzhou University Zhengzhou450001 China Peng Cheng Laboratory Research Center of Networks and Communications Shenzhen518066 China Technology Innovation Institute Abu Dhabi United Arab Emirates CentraleSupélec University Paris-Saclay Gif-sur-Yvette91192 France
In this paper, we investigate a cell-free massive multiple-input multiple-output system with both access points and user equipments equipped with multiple antennas over the Weichselberger Rayleigh fading channel. We s... 详细信息
来源: 评论
Raft Consensus Algorithm Based on Credit Model in Consortium Blockchain
收藏 引用
Wuhan University Journal of Natural Sciences 2020年 第2期25卷 146-154页
作者: CHEN Yunfang LIU Ping ZHANG Wei School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023JiangsuChina Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023JiangsuChina
As one of the underlying technologies of the blockchain,the consensus algorithm plays a vital role in ensuring security and *** a consensus algorithm for the private blockchain,Raft has better performance than the res... 详细信息
来源: 评论
Domain generalization for document authentication against practical recapturing attacks
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Changsheng Zhang, Shuzheng Lan, Fengbo Huang, Jiwu The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Recapturing attack can be employed as a simple but effective anti-forensic tool for digital document images. Inspired by the document inspection process that compares a questioned document against a reference sample, ... 详细信息
来源: 评论
ER: Equivariance Regularizer for Knowledge Graph Completion
arXiv
收藏 引用
arXiv 2022年
作者: Cao, Zongsheng Xu, Qianqian Yang, Zhiyong Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Peng Cheng Laboratory Shenzhen China
Tensor factorization and distanced based models play important roles in knowledge graph completion (KGC). However, the relational matrices in KGC methods often induce a high model complexity, bearing a high risk of ov... 详细信息
来源: 评论
Classifying Galaxy Morphologies with Few-Shot Learning
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Zhirui Zou, Zhiqiang Li, Nan Chen, Yanli College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Jiangsu Nanjing China Key Laboratory of Optical Astronomy National Astronomical Observatories Chinese Academy of Sciences Beijing China University of Chinese Academy of Science Beijing China
The taxonomy of galaxy morphology is critical in astrophysics as the morphological properties are powerful tracers of galaxy evolution. With the upcoming Large-scale Imaging Surveys, billions of galaxy images challeng... 详细信息
来源: 评论