咨询与建议

限定检索结果

文献类型

  • 538 篇 期刊文献
  • 529 篇 会议

馆藏范围

  • 1,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 688 篇 工学
    • 501 篇 计算机科学与技术...
    • 415 篇 软件工程
    • 188 篇 信息与通信工程
    • 112 篇 电气工程
    • 98 篇 控制科学与工程
    • 75 篇 生物工程
    • 62 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 40 篇 机械工程
    • 30 篇 交通运输工程
    • 29 篇 网络空间安全
    • 25 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 329 篇 理学
    • 165 篇 数学
    • 88 篇 生物学
    • 81 篇 物理学
    • 55 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 180 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 91 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 43 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 machine learning
  • 19 篇 optimization
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 graph neural net...
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 16 篇 contrastive lear...
  • 15 篇 robustness
  • 14 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 52 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 25 篇 huazhong univers...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 21 篇 wang guoyin
  • 20 篇 hai jin
  • 19 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 feng gao
  • 11 篇 yang zhiyong

语言

  • 950 篇 英文
  • 106 篇 其他
  • 10 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1067 条 记 录,以下是851-860 订阅
排序:
Exploring the Spatial Correlation of Shadowing in RF-based Device-Free Localization by Block Sparse Bayesian Learning
Exploring the Spatial Correlation of Shadowing in RF-based D...
收藏 引用
IEEE International Conference on Robotics and Biomimetics
作者: Jiaju Tan Xin Zhao Xuemei Guo Guoli Wang School of Mathematics and Computational Science Wuyi University Jiangmen China Tianjin Key Laboratory of Intelligent Robotic (tjKLIR) Institute of Robotics and Automatic Information System (IRAIS) Nankai University Tianjin China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education School of Data and Computer Science Sun Yat-sen University Guangzhou China
Device-Free Localization (DFL) realized by the Radio Frequency (RF) signal sensing, is an emerging technology to obtain the target’s position without needing the target carrying any electronic devices or tags. Due to... 详细信息
来源: 评论
Cell-Free Massive MIMO with Multi-Antenna Users over Weichselberger Rician Channels
arXiv
收藏 引用
arXiv 2022年
作者: Li, Xin Zhang, Jiayi Wang, Zhe Ai, Bo Ng, Derrick Wing Kwan The School of Electronic and Information Engineering The Frontiers Science Center for Smart High-Speed Railway System Beijing Jiaotong University Beijing100044 China The State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China The Frontiers Science Center for Smart High-Speed Railway System Henan Joint International Research Laboratory of Intelligent Networking and Data Analysis Zhengzhou University Zhengzhou450001 China Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen China School of Electrical Engineering and Telecommunications University of New South Wales NSW2052 Australia
We consider a cell-free massive multiple-input multiple-output (MIMO) system with multi-antenna access points and user equipments (UEs) over Weichselberger Rician fading channels with random phase-shifts. More specifi... 详细信息
来源: 评论
Shadow Detection Of Moving Objects In Traffic Monitoring Video
Shadow Detection Of Moving Objects In Traffic Monitoring Vid...
收藏 引用
IEEE Joint International Information Technology and Artificial Intelligence Conference (ITAIC)
作者: Mingrui Zhang Wenbing Zhao Xiying Li Dan Wang College of Computer Science and Technology Beijing University of Technology Beijing China Intelligent Transportation Research Center School of Intelligent System Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Intelligent Transportation System of Guangdong Province Guangzhou China Key Laboratory of Video Image Intelligent Analysis and Application Technology Ministry of Public Security Guangzhou China
Moving object detection is an important application of computer vision. Commonly used foreground separation algorithms such as Gaussian mixture modeling, ViBe, frame difference method, etc., do not consider the color ... 详细信息
来源: 评论
MSpace: Multi security namespace management for containers
Journal of Engineering Research (Kuwait)
收藏 引用
Journal of Engineering Research (Kuwait) 2025年
作者: Liang, Hao He, Gongshan Jiang, Jinhu National Digital Switching System Engineering & Technological Research Center Zhengzhou 450002 China Key Laboratory of Cyberspace Security Ministry of Education Zhengzhou 450002 China School of Computer Science Fudan University Shanghai 200438 China Institute of Big Data Fudan University Shanghai 200433 China
Existing system security frameworks like LSM are primarily designed for the operating system kernel and are not applicable to user-level container methods. This is primarily because the system security framework is de... 详细信息
来源: 评论
Community-based message forwarding in mobile social networks
Community-based message forwarding in mobile social networks
收藏 引用
2019 International Conference on Advances in Computer Technology, Information Science and Communications, CTISC 2019
作者: Chen, Zhiming Xiang, Yang School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
With the popularity of various smart devices and the application of sensor network technology, message transmission using mobile devices is becoming widespread. This paper focuses on the forwarding in mobile social ne... 详细信息
来源: 评论
Under-determined audio source separation using the convolutive narrowband approximation and flexible ℓ p regularizer
收藏 引用
Applied Acoustics 2025年 240卷
作者: Junjie Yang Liu Yang Yi Guo Yuan Xie Shengli Xie School of Automation Guangdong University of Technology Guangdong Key Laboratory of IoT Information Technology (GDUT) and Key Laboratory of Intelligent Information Processing and System Integration of IoT (GDUT) Ministry of Education Guangzhou 510006 China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou 510006 China School of Computer Data and Mathematical Sciences Western Sydney University Parramatta 2150 NSW Australia Mechanical and Electrical Engineering Guangzhou University and Key Laboratory of Intelligent Detection and The Internet of Things in Manufacturing (GDUT) Ministry of Education Guangzhou 510006 China
Convolutive narrowband approximation (CNA) model is widely utilized in audio source separation, particularly in strongly reverberant scenarios. However, in under-determined audio source separation, the CNA model often...
来源: 评论
Congestion Relief in Downlink OFDMA Cellular system Using Inter-Cell Relay
收藏 引用
China Communications 2019年 第4期16卷 35-46页
作者: Weifeng Lu Mingqi Zhu Jia Xu Siguang Chen Lijun Yang Jian Xu School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications College of Internet of Things Nanjing University of Posts and Telecommunications School of Computer Science and Engineering Nanjing University of Science and Technology
This paper proposes the concept of inter-cell relay for downlink orthogonal frequency division multiple access(OFDMA) cellular systems, which uses multi-hop to relay calls from overloaded cells to light-load neighbori... 详细信息
来源: 评论
DB-SBR: A dual-backbone model for student behavior recognition
收藏 引用
Pattern Recognition 2026年 169卷
作者: Lin Wang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing 210023 PR China School of Computer Science Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing 210023 PR China
Aiming at the challenge of student behavior recognition in such complex scenarios as smart classroom, we propose a Dual-Backbone Model for Student Behavior Recognition (DB-SBR). First, we innovatively propose a dual-b...
来源: 评论
Personalized Local Differential Privacy for Multi-dimensional Range Queries over Mobile User data
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: He, Yuanyuan Wang, Meiqi Deng, Xianjun Yang, Peng Xue, Qiao Yang, Laurence T. Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Electronic Information and Communications Wuhan430074 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210000 China
Multi-dimensional range queries performed on the mobile user data records become increasingly important and popular in the fields of e-commerce, social media, transportation logistics, etc. Meanwhile, mobile users usu... 详细信息
来源: 评论
MedSteGAN: Medical Embedding-Optimized Steganography with Improved GAN
SSRN
收藏 引用
SSRN 2023年
作者: Peng, Yuxiang Fu, Chong Zheng, Yu Tian, Yunjia Cao, Guixing Chen, Junxin School of Computer Science and Engineering Northeastern University Liaoning Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Liaoning Shenyang110819 China Department of Information Engineering The Chinese University of Hong Kong Ma Liu Shui Shatin New Territories Hong Kong Institute of Telecommunication Satellite China Academy of Space Technology Beijing100094 China School of Software Dalian University of Technology Liaoning Dalian116621 China
Medical diagnosing systems contain sensitive information, especially the resulting certificate of diagnosis that involves the patient’s privacy, required to be protected carefully. An effective way is to secretly emb... 详细信息
来源: 评论