咨询与建议

限定检索结果

文献类型

  • 538 篇 期刊文献
  • 529 篇 会议

馆藏范围

  • 1,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 688 篇 工学
    • 501 篇 计算机科学与技术...
    • 415 篇 软件工程
    • 188 篇 信息与通信工程
    • 112 篇 电气工程
    • 98 篇 控制科学与工程
    • 75 篇 生物工程
    • 62 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 40 篇 机械工程
    • 30 篇 交通运输工程
    • 29 篇 网络空间安全
    • 25 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 329 篇 理学
    • 165 篇 数学
    • 88 篇 生物学
    • 81 篇 物理学
    • 55 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 180 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 91 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 43 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 machine learning
  • 19 篇 optimization
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 graph neural net...
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 16 篇 contrastive lear...
  • 15 篇 robustness
  • 14 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 52 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 25 篇 huazhong univers...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 21 篇 wang guoyin
  • 20 篇 hai jin
  • 19 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 feng gao
  • 11 篇 yang zhiyong

语言

  • 950 篇 英文
  • 106 篇 其他
  • 10 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1067 条 记 录,以下是761-770 订阅
排序:
Cross-heterogeneous Domain Authentication Scheme Based on Blockchain
收藏 引用
Journal of Artificial Intelligence and Technology 2021年 第2期1卷 92-100页
作者: Jing Liu Yixin Liu Yingxu Lai Rongchen Li Siyu Wu Sami Mian College of Computer Science Faculty of Information TechnologyBeijing University of TechnologyBeijing 100124China Shaanxi Key Laboratory of Network and System Security Xi’an 710071China Science and Technology on Information Assurance Laboratory Beijing 100072China Engineering Research Center of Intelligent Perception and Autonomous Control Ministry of EducationBeijing 100124China Fan Gongxiu Honors College Beijing University of TechnologyBeijing 100124China University of Pittsburgh PittsburghPA 15260USA
With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their *** organizations use public key inf... 详细信息
来源: 评论
Prediction of exosomal piRNAs based on deep learning for sequence embedding with attention mechanism
Prediction of exosomal piRNAs based on deep learning for seq...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Yulian Ding Aimin Li Rong Fei Xie Guo Fangxiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China Department of Computer Science Department of Mechanical Engineering Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada
PIWI-interacting RNAs (piRNAs) are a type of small non-coding RNAs which bind with the PIWI proteins to exert biological effects in various regulatory mechanisms. A growing amount of evidence reveals that exosomal piR... 详细信息
来源: 评论
GenFace: A Large-Scale Fine-Grained Face Forgery Benchmark and Cross Appearance-Edge Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Yu, Zitong Wang, Tianyi Huang, Xiaobin Shen, Linlin Gao, Zan Ren, Jianfeng Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Nanyang Technological University 50 Nanyang Ave Block N 4 639798 Singapore Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University China Jinan250014 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China School of Computer Science University of Nottingham Ningbo China
The rapid advancement of photorealistic generators has reached a critical juncture where the discrepancy between authentic and manipulated images is increasingly indistinguishable. Thus, benchmarking and advancing tec... 详细信息
来源: 评论
Distilled Transformers with Locally Enhanced Global Representations for Face Forgery Detection
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Li, Qiufu Yu, Zitong Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Guangdong Shenzhen518060 China School of Computing and Information Technology Great Bay University Guangdong Dongguan523000 China
Face forgery detection (FFD) is devoted to detecting the authenticity of face images. Although current CNN-based works achieve outstanding performance in FFD, they are susceptible to capturing local forgery patterns g... 详细信息
来源: 评论
A Review of Multimodal Explainable Artificial Intelligence: Past, Present and Future
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Shilin An, Wenbin Tian, Feng Nan, Fang Liu, Qidong Liu, Jun Shah, Nazaraf Chen, Ping School of Computer Science and Technology Xi’an Jiaotong University Xi’an710049 China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an710049 China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an710049 China Institute for Future Transport and Cities Coventry University Priory Street CoventryCV1 5FB United Kingdom Department of Engineering University of Massachusetts Boston BostonMA02125 United States
Artificial intelligence (AI) has rapidly developed through advancements in computational power and the growth of massive datasets. However, this progress has also heightened challenges in interpreting the "black-... 详细信息
来源: 评论
Estimating Power Consumption of Containers and Virtual Machines in data Centers
Estimating Power Consumption of Containers and Virtual Machi...
收藏 引用
IEEE International Conference on Cluster Computing
作者: Xusheng Zhang Ziyu Shen Bin Xia Zheng Liu Yun Li Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications
Virtualization technologies provide solutions of cloud computing. Virtual resource scheduling is a crucial task in data centers, and the power consumption of virtual resources is a critical foundation of virtualizatio... 详细信息
来源: 评论
Disentangled Representation Learning with Transmitted Information Bottleneck
arXiv
收藏 引用
arXiv 2023年
作者: Dang, Zhuohang Luo, Minnan Jia, Chengyou Dai, Guang Wang, Jihong Chang, Xiaojun Wang, Jingdong The School of Computer Science and Technology The Ministry of Education Key Laboratory of Intelligent Networks and Network Security The Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Shaanxi Xi’an710049 China The SGIT AI Laboratory Xi’an710048 China The State Grid Shaanxi Electric Power Company Ltd. State Grid Corporation of China Xi’an710048 China The School of Information Science and Technology University of Science and Technology of China Hefei230026 China Abu Dhabi United Arab Emirates Baidu Inc Beijing100085 China
Encoding only the task-related information from the raw data, i.e., disentangled representation learning, can greatly contribute to the robustness and generalizability of models. Although significant advances have bee... 详细信息
来源: 评论
Multi-Object Tracking Based on Anchor-Free Detection and Message Passing Association
Multi-Object Tracking Based on Anchor-Free Detection and Mes...
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Zhou Fang Zhi Zhang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan China
Due to the current multi-target tracking work, in the scene of dense and staggered targets, the tracked targets are prone to ID switch, which greatly affects the tracking effect. Aiming at this problem, this paper pro... 详细信息
来源: 评论
Robust Imagined Speech Production from Electrocorticography with Adaptive Frequency Enhancement
Robust Imagined Speech Production from Electrocorticography ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xu Xu Chong Fu Junxin Chen Gwanggil Jeon David Camacho School of Computer Science and Engineering Northeastern University Shenyang China School of Software Dalian University of Technology Dalian China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China College of Information Technology Incheon National University Incheon Korea Department of Computer Systems Engineering Universidad Politécnica de Madrid Madrid Spain
Imagined speech production with electrocorticography (ECoG) plays a crucial role in brain-computer interface system. A challenging issue is the great variation underlying the frequency bands of the ECoG signals’ enco... 详细信息
来源: 评论
Deformation And Penetration Hybrid Detection-Net For Parcels Inspection In Industrial Supply Chain
Deformation And Penetration Hybrid Detection-Net For Parcels...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhi Chen Cuifeng Du Xiujie Huang Zelong Lin Yuyu Zhou Quanlong Guan Zhefu Li Shuanghuan Lv Xiaofeng Wu Xiaotian Zhuang College of Information Science and Technology Jinan University Guangzhou China Guangdong Institute of Smart Education Jinan University Guangzhou China Cetc Potevio Science&Technology Co. Ltd Guangzhou China Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou China School of Intelligent Systems Science and Engineering Jinan University Zhuhai China Guangzhou Polytechnic of Sports Guangzhou China Beijing JD Zhenshi Information Technology Co. Ltd Beijing China
The express delivery industry has become integral to modern social life, but supply chain parcels, especially those made of corrugated cardboard, are at risk of damage during transportation. Although corrugated cardbo...
来源: 评论