咨询与建议

限定检索结果

文献类型

  • 538 篇 期刊文献
  • 529 篇 会议

馆藏范围

  • 1,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 688 篇 工学
    • 501 篇 计算机科学与技术...
    • 415 篇 软件工程
    • 188 篇 信息与通信工程
    • 112 篇 电气工程
    • 98 篇 控制科学与工程
    • 75 篇 生物工程
    • 62 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 40 篇 机械工程
    • 30 篇 交通运输工程
    • 29 篇 网络空间安全
    • 25 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 329 篇 理学
    • 165 篇 数学
    • 88 篇 生物学
    • 81 篇 物理学
    • 55 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 180 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 91 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 43 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 machine learning
  • 19 篇 optimization
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 graph neural net...
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 16 篇 contrastive lear...
  • 15 篇 robustness
  • 14 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 52 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 25 篇 huazhong univers...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 21 篇 wang guoyin
  • 20 篇 hai jin
  • 19 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 feng gao
  • 11 篇 yang zhiyong

语言

  • 950 篇 英文
  • 106 篇 其他
  • 10 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1067 条 记 录,以下是821-830 订阅
排序:
Giant negative ECE near room temperature and large positive ECE of CoFe2O4-BiFeO3/P(VDF-TrFE) sandwich flexible films
收藏 引用
Applied Surface Science 2025年 707卷
作者: Lv, Xiang Xu, Lingfang Ge, Yalong Liang, Tian Qin, Ronghua Yang, Changping Key Laboratory of Intelligent Sensing System and Security of the Ministry of Education Hubei Key Laboratory of Micro-Nanoelectronic Materials and Devices School of Microelectronics Hubei University Wuhan430062 China Hubei Provincial Key Laboratory of Green Materials for Light Industry Hubei University of Technology Wuhan430062 China Faculty of Materials Science and Engineering Taiyuan University of Science and Technology Taiyuan030027 China
The electrocaloric effect (ECE) represents an eco-friendly, solid-state cooling technique utilizing a safe and potent electric field to facilitate the refrigeration process. This research demonstrates that incorporati... 详细信息
来源: 评论
CodeEnhance: A Codebook-Driven Approach for Low-Light Image Enhancement
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Xu Hou, XianXu Lai, Zhihui Zhou, Jie Zhang, Ya-Nan Pedrycz, Witold Shen, Linlin The Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518060 China The Department of Electrical & Computer Engineering University of Alberta University of Alberta Canada
Low-light image enhancement (LLIE) aims to improve low-illumination images. However, existing methods face two challenges: (1) uncertainty in restoration from diverse brightness degradations;(2) loss of texture and co... 详细信息
来源: 评论
Sample hardness based gradient loss for long-tailed cervical cell detection
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Minmin Li, Xuechen Gao, Xiangbo Chen, Junliang Shen, Linlin Wu, Huisi Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence of Robotics of Society Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China University of California Irvine United States
Due to the difficulty of cancer samples collection and annotation, cervical cancer datasets usually exhibit a long-tailed data distribution. When training a detector to detect the cancer cells in a WSI (Whole Slice Im... 详细信息
来源: 评论
How to respond to emerging threats of cyberspace security via social engineering? A novel paradigm to solve cyberspace security issues
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Lin, Hao Wang, Chun-Dong Gao, Hao-Yu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing Novel Software Technology Ministry of Education Tianjin China Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin China College of Data Science and Application Inner Mongolia University of Technology Hohhot China
Cybersecurity researchers always ignore the "people" behind the issues when dealing with cyberspace security issues. The human and technological aspects of cyberspace security must be simultaneously addresse... 详细信息
来源: 评论
Multi-objective optimization for fuzzy workflow scheduling
Multi-objective optimization for fuzzy workflow scheduling
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Jie Zhu Jing Zhang Chang Lu Haiping Huang Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China Nanjing University of Posts & Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Nanjing University of Aeronautics and Astronautics Nanjing China
A fuzzy workflow scheduling problem is investigated with fuzzy temporal parameters, such as the fuzzy task processing times, fuzzy data transmission times and the fuzzy due dates. In the considered problem, the resour... 详细信息
来源: 评论
Secure and Privacy-preserving data-sharing Framework based on Blockchain Technology for Al-Najaf/Iraq Oil Refinery  19
Secure and Privacy-preserving Data-sharing Framework based o...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Umran, Samir M. Lu, SongFeng Abduljabbar, Zaid Ameen Lu, Zhi Feng, Bingyan Zheng, Lu Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Iraqi Cement State Company Ministry of Industry and Minerals Baghdad10011 Iraq Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057 China University of Basrah College of Education for Pure Sciences Iraq Al-Kunooze University College Technical Computer Engineering Department Basrah Iraq Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan430074 China Industrial Internet Research Institute Wuhan Huazhong Numerical Control Co. Ltd Wuhan430074 China South-Central University for Nationalities College of Computer Science Wuhan430074 China
The Industrial Internet of Things or Industry 4.0 efficiently enhances the manufacturing process in terms of raising productivity, system performance, cost reduction, and building large-scale systems. It enables the c... 详细信息
来源: 评论
GRIDLESS TOMOGRAPHIC SAR IMAGING BASED ON ACCELERATED ATOMIC NORM MINIMIZATION WITH EFFICIENCY
arXiv
收藏 引用
arXiv 2022年
作者: Gao, Silin Zhang, Zhe Zhang, Bingchen Wu, Yirong Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China Key Laboratory of Technology in Geo-spatial Information Processing and Application System Chinese Academy of Sciences Beijing100190 China School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Beijing100049 China Key Laboratory of Intelligent Aerospace Big Data Application Technology Suzhou215123 China Suzhou Aerospace Information Research Institute Suzhou215123 China
Synthetic aperture radar (SAR) tomography (TomoSAR) enables the reconstruction and three-dimensional (3D) localization of targets based on multiple two-dimensional (2D) observations of the same scene. The resolving al... 详细信息
来源: 评论
A novel TomoSAR imaging method with few observations based on nested array
arXiv
收藏 引用
arXiv 2022年
作者: Jiang, Pengyu Zhang, Zhe Zhang, Bingchen Xu, Zhongqiu Key Laboratory of Technology in Geo-Spatial Information Processing and Application System Chinese Academy of Sciences Beijing100190 China Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Beijing100049 China Suzhou Aerospace Information Research Institute Suzhou215000 China Key Laboratory of Intelligent Aerospace Big Data Application Technology Suzhou21500 China
Synthetic aperture radar tomography (TomoSAR) baseline optimization technique is capable of reducing system complexity and improving the temporal coherence of data, which has become an important research in the field ... 详细信息
来源: 评论
Software Defect Prediction via Deep Belief Network
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 925-932页
作者: WEI Hua SHAN Chun HU Changzhen ZHANG Yu YU Xiao School of Computer Science and Technology Beijing Institute of Technology China Information Technology Security Evaluation Center Beijing Key Laboratory of Software Security Engineering Technology Beijing Institute of Technology School of Electrical and Information Engineering and Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture State Key Laboratory in China for Geomechanics and Deep Underground Engineering (Beijing) China University of Mining and Technology School of Computer Science and Technology Shandong University of Technology
Defect distribution prediction is a meaningful topic because software defects are the fundamental cause of many attacks and data loss. Building accurate prediction models can help developers find bugs and prioritize t... 详细信息
来源: 评论
CODH++: Macro-semantic differences oriented instance segmentation network
收藏 引用
Expert systems with Applications 2022年 202卷 1页
作者: Zhang, Wenchao Fu, Chong Cao, Lin Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China School of Computer Science The University of Auckland New Zealand
With the idea of divide and rule, there exist two different forms of semantic features flowing in the two stage instance segmentation paradigms. They are the global features at the image level and the instance feature... 详细信息
来源: 评论