咨询与建议

限定检索结果

文献类型

  • 548 篇 期刊文献
  • 533 篇 会议

馆藏范围

  • 1,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 513 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 195 篇 信息与通信工程
    • 120 篇 电气工程
    • 115 篇 控制科学与工程
    • 74 篇 生物工程
    • 61 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 41 篇 机械工程
    • 32 篇 交通运输工程
    • 29 篇 网络空间安全
    • 27 篇 安全科学与工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 20 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 334 篇 理学
    • 170 篇 数学
    • 88 篇 生物学
    • 80 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 182 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 38 篇 医学
    • 32 篇 基础医学(可授医学...
    • 32 篇 临床医学
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学

主题

  • 44 篇 feature extracti...
  • 37 篇 semantics
  • 30 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 optimization
  • 20 篇 machine learning
  • 19 篇 graph neural net...
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 contrastive lear...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 15 篇 robustness
  • 13 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 huazhong univers...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 20 篇 wang guoyin
  • 20 篇 hai jin
  • 18 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 wang haoyu
  • 12 篇 feng gao

语言

  • 928 篇 英文
  • 142 篇 其他
  • 9 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1081 条 记 录,以下是741-750 订阅
排序:
Discrimination-Aware Domain Adversarial Neural Network
收藏 引用
Journal of Computer Science & Technology 2020年 第2期35卷 259-267页
作者: Yun-Yun Wang Jian-Min Gu Chao Wang Song-Can Chen Hui Xue College of Computer Science and Engineering Nanjing University of Posts and Telecommunications Nanjing 210046China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210046China College of Computer Science and Technology/College of Artificial Intelligence Nanjing University of Aeronautics and AstronauticsNanjing 210023China Key Laboratory of Pattern Analysis and Machine Intelligence Ministry of Industry and Information Technology Nanjing 210023China School of Computer Science and Engineering Southeast UniversityNanjing 210096China
The domain adversarial neural network(DANN)methods have been successfully proposed and attracted much attention *** DANNs,a discriminator is trained to discriminate the domain labels of features generated by a generat... 详细信息
来源: 评论
A hybrid Chinese named entity recognition method for Internet of Things
A hybrid Chinese named entity recognition method for Interne...
收藏 引用
2022 International Conference on Algorithms, Microchips and Network Applications
作者: Wang, Ying Wang, Zehao Li, Hong Liu, Peipei Li, Yachao Zuo, Fang Institute of Intelligence Networks System Henan University Henan475001 China Henan Experimental Teaching Demonstration Centre of Modern Network Technology Henan University Henan475001 China Intelligent Data Processing Engineering Research Center of Henan Province Henan University Henan475001 China Institute of Information Engineering Chinese Academy of Sciences Beijing China Henan International Joint Laboratory of Theories and Key Technologies on Intelligence Networks Henan University Henan475001 China
In order to facilitate government departments to assess security risks and prevent infiltration, it's necessary to recognize the IoT device from open data by the method of Named entity recognition (NER). In this s... 详细信息
来源: 评论
Poisoning as a Post-Protection: Mitigating Membership Privacy Leakage From Gradient and Prediction of Federated Models
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Liu, Gaoyang Xu, Tianlong Yang, Yang Abdelmoniem, Ahmed M. Wang, Chen J., Liu Huazhong University of Science and Technology Hubei Key Laboratory of Internet of Intelligence School of Electronic Information and Communications Wuhan430074 China Simon Fraser University School of Computing Science BurnabyBCV5A 1S6 Canada Ministry of Education Key Laboratory of Intelligent Sensing System and Security China Hubei University School of Artificial Intelligence Wuhan430062 China Queen Mary University of London School of Electronic Engineering and Computer Science United Kingdom
Federated learning (FL) is a distributed learning paradigm that enables multiple clients to train a unified model without sharing their private data. However, recent works demonstrate that FL models are vulnerable to ... 详细信息
来源: 评论
Tensor-Based Multi-Scale Correlation Anomaly Detection for AIoT-Enabled Consumer Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Zeng, Jiuzhen Yang, Laurence T. Wang, Chao Deng, Xianjun Yang, Xiangli Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan430074 China Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou450001 China St. Francis Xavier University Department of Computer Science AntigonishNSB2G 2W5 Canada University of South China School of Electrical Engineering Hengyang421001 China
Artificial Intelligence of Things (AIoT) is an innovative paradigm expected to enable various consumer applications that is transforming our lives. While enjoying benefits and services from these applications, we also... 详细信息
来源: 评论
Universal deep network for steganalysis of color image based on channel representation
arXiv
收藏 引用
arXiv 2021年
作者: Wei, Kangkang Luo, Weiqi Tan, Shunquan Huang, Jiwu The Guangdong Key Lab of Information Security Technology School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Up to now, most existing steganalytic methods are designed for grayscale images, and they are not suitable for color images that are widely used in current social networks. In this paper, we design a universal color i... 详细信息
来源: 评论
Cross-Frequency Collaborative Training Network and dataset for Semi-supervised First Molar Root Canal Segmentation
arXiv
收藏 引用
arXiv 2025年
作者: Zhou, Zhenhuan Zhang, Yuchen He, Along Wang, Peng Xie, Xueshuo Li, Tao College of Computer Science Nankai University Tianjin300350 China Key Laboratory of Data and Intelligent System Security Ministry of Education China Department of stomatology Tianjin Union Medical Center Tianjin China Haihe Lab of ITAI Tianjin300459 China
Root canal (RC) treatment is a highly delicate and technically complex procedure in clinical practice, heavily influenced by the clinicians’ experience and subjective judgment. Deep learning has made significant adva... 详细信息
来源: 评论
Correlation effects on topological structure in complex network evolution
收藏 引用
Physica A: Statistical Mechanics and its Applications 2025年 671卷
作者: Chen, Xiaojie Qiao, Weile Pan, Guijun School of physics Hubei University Hubei Wuhan430062 China Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education Hubei Wuhan430062 China
Network growth model is an important and popular research topic aimed at uncovering the mechanisms of network formation and evolution. Most growth models focus on two key mechanisms: growth and preferential attachment... 详细信息
来源: 评论
Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, Hongze Xie, Guoyang Hou, Chengbin Dai, Tao Gao, Can Wang, Jinbao Shen, Linlin National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong Department of Intelligent Manufacturing CATL Ningde China Fuzhou Fuyao Institute for Advanced Study Fuyao University of Science and Technology Fuzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China
High-resolution point clouds (HRPCD) anomaly detection (AD) plays a critical role in precision machining and high-end equipment manufacturing. Despite considerable 3D-AD methods that have been proposed recently, they ... 详细信息
来源: 评论
基于污点和概率的逃逸恶意软件多路径探索
收藏 引用
security and Safety 2023年 第3期2卷 83-106页
作者: 徐钫洲 张网 羌卫中 金海 National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Lab Cluster and Grid Computing LabWuhan 430074China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data SecurityWuhan 430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Jinyinhu Laboratory Wuhan 430040China
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution ***,malware can emp... 详细信息
来源: 评论
Constructions of Optimal Frequency-Hopping Sequences with Controlled Minimum Gaps
收藏 引用
IEEE Transactions on Information Theory 2025年
作者: Li, Chen Li, Chunlei Zeng, Xiangyong Li, Dian Hubei University Key Laboratory of Intelligent Sensing System and Security Ministry of Education Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Wuhan430062 China University of Bergen Department of Informatics BergenN-5020 Norway
Frequency-hopping sequences (FHSs) with low Hamming correlation and wide gaps significantly contribute to the anti-interference performance in FH communication systems. This paper investigates FHSs with optimal Hammin... 详细信息
来源: 评论