咨询与建议

限定检索结果

文献类型

  • 538 篇 期刊文献
  • 529 篇 会议

馆藏范围

  • 1,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 688 篇 工学
    • 501 篇 计算机科学与技术...
    • 415 篇 软件工程
    • 188 篇 信息与通信工程
    • 112 篇 电气工程
    • 98 篇 控制科学与工程
    • 75 篇 生物工程
    • 62 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 40 篇 机械工程
    • 30 篇 交通运输工程
    • 29 篇 网络空间安全
    • 25 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 329 篇 理学
    • 165 篇 数学
    • 88 篇 生物学
    • 81 篇 物理学
    • 55 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 180 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 91 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 43 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 machine learning
  • 19 篇 optimization
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 graph neural net...
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 16 篇 contrastive lear...
  • 15 篇 robustness
  • 14 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 52 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 25 篇 huazhong univers...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 21 篇 wang guoyin
  • 20 篇 hai jin
  • 19 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 feng gao
  • 11 篇 yang zhiyong

语言

  • 950 篇 英文
  • 106 篇 其他
  • 10 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1067 条 记 录,以下是781-790 订阅
排序:
Learning Task-aware Robust Deep Learning systems
arXiv
收藏 引用
arXiv 2020年
作者: Han, Keji Li, Yun Long, Xianzhong Ge, Yao Nanjing University of Posts and Telecommunications China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing
Many works demonstrate that deep learning system is vulnerable to adversarial attack. A deep learning system consists of two parts: the deep learning task and the deep model. Nowadays, most existing works investigate ... 详细信息
来源: 评论
Adaptive Perception for Unified Visual Multi-modal Object Tracking
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: Hu, Xiantao Zhong, Bineng Liang, Qihua Shi, Liangtao Mo, Zhiyi Tai, Ying Yang, Jian Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining Guilin541004 China Guangxi Normal University Security Guilin541004 China Guangxi Normal University Intelligent Technology Guilin541004 China Guangxi Normal University Ministry of Education Guilin541004 China Wuzhou University School of Data Science Wuzhou543002 China Wuzhou University Software Engineering Wuzhou543002 China Nanjing University State Key Laboratory for Novel Software Technology Suzhou215163 China Nanjing University of Science and Technology School of Computer Science Nanjing210094 China Nanjing University of Science and Technology Engineering Nanjing210094 China
Recently, many multi-modal trackers prioritize RGB as the dominant modality, treating other modalities as auxiliary, and fine-tuning separately various multi-modal tasks. This imbalance in modality dependence limits t... 详细信息
来源: 评论
Three-way conflict analysis model via the best-worst method: Balancing subjective preferences and objective data on incomplete and dispersed systems
收藏 引用
International Journal of Approximate Reasoning 2025年 186卷
作者: Zhu, Junjie Zhang, Qinghua Luo, Nanfang Liu, Fan Yin, Longjun School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing400065 China Tourism Multi-source Data Perception and Decision Technology Key Laboratory of the Ministry of Culture and Tourism Chongqing400065 China
In real-world environments, different issues contribute to conflicts with varying weights. However, current conflict analysis weighting models face significant limitations when dealing with incomplete data and dispers... 详细信息
来源: 评论
Video-Based 3D Human Pose Estimation Research
Video-Based 3D Human Pose Estimation Research
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Siting Tao Zhi Zhang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan China China
At present, most of the video-based 3D human pose estimation methods process the video frame by frame, ignoring the timing information of the upper and lower frames of the video. When there is a single-frame estimatio... 详细信息
来源: 评论
Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
arXiv
收藏 引用
arXiv 2022年
作者: Zhu, Yao Chen, Yuefeng Li, Xiaodan Chen, Kejiang He, Yuan Tian, Xiang Zheng, Bolun Chen, Yaowu Huang, Qingming The Zhejiang University Hangzhou310013 China The Security Department of Alibaba Group China The CAS Key Laboratory of Electro-Magnetic Space Information University of Science and Technology of China China The Hangzhou Dianzi University China Zhejiang Provincial Key Laboratory for Network Multimedia Technologies China The Zhejiang University Zhejiang Provincial Key Laboratory for Network Multimedia Technologies China The Zhejiang University Zhejiang University Embedded System Engineering Research Center Ministry of Education of China China The University of Chinese Academy of Sciences China The Key Laboratory of Intelligent Information Processing Chinese Academy of Sciences China
Transferable adversarial attacks against Deep neural networks (DNNs) have received broad attention in recent years. An adversarial example can be crafted by a surrogate model and then attack the unknown target model s... 详细信息
来源: 评论
FuXi Weather: A data-to-forecast machine learning system for global weather
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Xiuyu Zhong, Xiaohui Xu, Xiaoze Huang, Yuanqing Li, Hao Neelin, J. David Chen, Deliang Feng, Jie Han, Wei Wu, Libo Qi, Yuan Shanghai Academy of Artificial Intelligence for Science Shanghai200232 China Artificial Intelligence Innovation and Incubation Institute Fudan University Shanghai200433 China School of Atmospheric Physics Nanjing University of Information Science and Technology Nanjing210044 China Earth System Modeling and Prediction Centre China Meteorological Administration Beijing100081 China Department of Atmospheric and Oceanic Sciences University of California Los Angeles90095 United States Ministry of Education Key Laboratory for Earth System Modeling Department of Earth System Science Tsinghua University Beijing100084 China University of Gothenburg Gothenburg Sweden Department of Atmospheric and Oceanic Sciences Institute of Atmospheric Sciences Fudan University Shanghai200433 China School of Data Science Fudan University Shanghai200433 China Institute for Big Data Fudan University Shanghai200433 China MOE Laboratory for National Development and Intelligent Governance Fudan University Shanghai200433 China
Weather forecasting traditionally relies on numerical weather prediction (NWP) systems that integrates global observational systems, data assimilation (DA), and forecasting models. Despite steady improvements in forec... 详细信息
来源: 评论
Modeling and analysis of the dynamic mechanism of rumor propagation considering the process of rumor refuting
Nonlinear Science
收藏 引用
Nonlinear Science 2025年 3卷
作者: Xutao Li Junshan Pan Yong Hu Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security Key Laboratory of Intelligent Sensing System and Security (Hubei University) Ministry of Education School of Cyber Science and Technology Hubei University Wuhan 430062 Hubei China School of Physics Huazhong University of Science and Technology Wuhan 430074 Hubei China
The boost of rumor spreading by the Internet has caused a series of social problems. Refuting the rumor timely can alleviate the harm caused by rumor dissemination. To investigate the propagation mechanism of rumor af...
来源: 评论
Generalized Face Forgery Detection via Adaptive Learning for Pre-trained Vision Transformer
arXiv
收藏 引用
arXiv 2023年
作者: Luo, Anwei Cai, Rizhao Kong, Chenqi Ju, Yakun Kang, Xiangui Huang, Jiwu Kot, Alex C. The School of Information Technology Jiangxi University of Finance and Economics Nanchang330013 China The School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China Lab. School of Electrical and Electronic Engineering Nanyang Technology University Singapore The Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The China-Singapore International Joint Research Institute Singapore
With the rapid progress of generative models, the current challenge in face forgery detection is how to effectively detect realistic manipulated faces from different unseen domains. Though previous studies show that p... 详细信息
来源: 评论
MC3D-AD: A Unified Geometry-aware Reconstruction Model for Multi-category 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Cheng, Jiayi Gao, Can Zhou, Jie Wen, Jiajun Dai, Tao Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D Anomaly Detection (AD) is a promising means of controlling the quality of manufactured products. However, existing methods typically require carefully training a task-specific model for each category independently,... 详细信息
来源: 评论
Attention Field Size Alters Patterns of Population Receptive Fields in the Early Visual Cortex
收藏 引用
Neuroscience Bulletin 2022年 第2期38卷 205-208页
作者: Bo Liu Xiaochun Wang Le Wang Qiaojun Qu Wei Zhang Bin Wang Jie Xiang Ting Yan Tianyi Yan Hui Zhang College of Medical Imaging Shanxi Medical UniversityTaiyuan 030001China Department of Radiology First Clinical Medical CollegeShanxi Medical UniversityTaiyuan 030001China College of Information and Computer Taiyuan University of TechnologyTaiyuan 030001China Intelligent Imaging Big Data and Functional Nano-imaging Engineering Research Center of Shanxi Province Shanxi Medical UniversityTaiyuan 030001China Translational Medicine Research Center Shanxi Medical UniversityTaiyuan 030001China School of Life Science Beijing Institute of TechnologyBeijing 100081China Ministry of Industry and Information Technology Key Laboratory of Convergence Medical Engineering System and Healthcare TechnologyBeijing Institute of TechnologyBeijing 100081China
Dear Editor,Visual spatial attention is a cognitive process by which prior information about the relevance of spatial locations is used to improve perceptual performance[1].Visual attention is spread across the attent... 详细信息
来源: 评论