咨询与建议

限定检索结果

文献类型

  • 538 篇 期刊文献
  • 529 篇 会议

馆藏范围

  • 1,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 688 篇 工学
    • 501 篇 计算机科学与技术...
    • 415 篇 软件工程
    • 188 篇 信息与通信工程
    • 112 篇 电气工程
    • 98 篇 控制科学与工程
    • 75 篇 生物工程
    • 62 篇 电子科学与技术(可...
    • 44 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 40 篇 机械工程
    • 30 篇 交通运输工程
    • 29 篇 网络空间安全
    • 25 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 化学工程与技术
    • 21 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 20 篇 建筑学
  • 329 篇 理学
    • 165 篇 数学
    • 88 篇 生物学
    • 81 篇 物理学
    • 55 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 系统科学
  • 180 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 91 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 29 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 10 篇 农学
  • 8 篇 军事学
  • 4 篇 教育学
  • 1 篇 文学

主题

  • 43 篇 feature extracti...
  • 37 篇 semantics
  • 29 篇 training
  • 26 篇 deep learning
  • 26 篇 federated learni...
  • 25 篇 privacy
  • 20 篇 machine learning
  • 19 篇 optimization
  • 18 篇 signal processin...
  • 18 篇 speech processin...
  • 18 篇 graph neural net...
  • 17 篇 computational mo...
  • 17 篇 accuracy
  • 16 篇 contrastive lear...
  • 15 篇 robustness
  • 14 篇 data privacy
  • 13 篇 deep neural netw...
  • 13 篇 security
  • 12 篇 neural networks
  • 12 篇 forecasting

机构

  • 60 篇 hubei key labora...
  • 55 篇 school of comput...
  • 52 篇 school of cyber ...
  • 41 篇 national enginee...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of comput...
  • 37 篇 jiangsu key labo...
  • 30 篇 national enginee...
  • 30 篇 jiangsu key labo...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 25 篇 huazhong univers...
  • 23 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 17 篇 school of cyber ...
  • 16 篇 jiangsu key labo...

作者

  • 36 篇 xu xiaolong
  • 30 篇 jin hai
  • 26 篇 xiaolong xu
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 21 篇 wang guoyin
  • 20 篇 hai jin
  • 19 篇 yang yang
  • 18 篇 zhou pan
  • 17 篇 huang qingming
  • 17 篇 zhang leo yu
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 14 篇 ai bo
  • 13 篇 zhang zhe
  • 12 篇 liu jun
  • 12 篇 wang jinbao
  • 12 篇 feng gao
  • 11 篇 yang zhiyong

语言

  • 950 篇 英文
  • 106 篇 其他
  • 10 篇 中文
检索条件"机构=the Key Laboratory of Data and Intelligent System Security"
1067 条 记 录,以下是941-950 订阅
排序:
Topic modeling for noisy short texts with multiple relations  30
Topic modeling for noisy short texts with multiple relations
收藏 引用
30th International Conference on Software Engineering and Knowledge Engineering, SEKE 2018
作者: Liu, Chiyu Liu, Zheng Li, Tao Xia, Bin Jiangsu Key Laboratory of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China
Understanding contents in social networks by inferring high-quality latent topics from short texts is a significant task in social analysis, which is challenging because social network contents are usually extremely s... 详细信息
来源: 评论
Multiple residual dense networks for reconfigurable intelligent surfaces cascaded channel estimation
arXiv
收藏 引用
arXiv 2021年
作者: Jin, Yu Zhang, Jiayi Huang, Chongwen Yang, Liang Xiao, Huahua Ai, Bo Wang, Zhiqin The School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China The Frontiers Science Center for Smart High-speed Railway System Beijing Jiaotong University Beijing100044 China Zhejiang Provincial Key Lab of Information Processing Communication and Networking Zhejiang University Hangzhou310007 China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China ZTE Corporation State Key Laboratory of Mobile Network Mobile Multimedia Technology Shenzhen518057 China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China Henan Joint International Research Laboratory of Intelligent Networking and Data Analysis Zhengzhou University Zhengzhou450001 China Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen518055 China China Academy of Information and Communications Technology Beijing100191 China
Reconfigurable intelligent surface (RIS) constitutes an essential and promising paradigm that relies programmable wireless environment and provides capability for space-intensive communications, due to the use of low-... 详细信息
来源: 评论
Spring migration duration exceeds that of autumn migration in Far East Asian Greater White-fronted Geese (Anser albifrons)
收藏 引用
Avian Research 2019年 第3期10卷 319-329页
作者: Xueqin Deng Qingshan Zhao Lei Fang Zhenggang Xu Xin Wang Haoren He Lei Cao Anthony David Fox State Key Laboratory of Urban and Regional Ecology Research Center for Eco-Environmental Sciences Chinese Academy of SciencesBeijing 100085China University of Chinese Academy of Sciences Beijing 100049China School of Life Science University of Science and Technology of ChinaHefei 230026AnhuiPeople’s Republic of China Key Laboratory of Forestry Remote Sensing Based Big Data and Ecological Security for Hunan Province Central South University of Forestry and TechnologyChangsha 410004China Information Management and System Department IBSSXi’an Jiaotong-Liverpool UniversitySuzhou 215123China Department of Bioscience Aarhus UniversityKalo Grenavej 148410 RondeDenmark
Background:Migration theory suggests,and some empirical studies show, that in order to compete for the best breeding sites and increase reproductive success,long-distance avian migrants tend to adopt a time minimizati... 详细信息
来源: 评论
Anomaly detection for drinking water quality via deep bilSTM ensemble  18
Anomaly detection for drinking water quality via deep bilSTM...
收藏 引用
2018 Genetic and Evolutionary Computation Conference, GECCO 2018
作者: Chen, Xingguo Feng, Fan Wu, Jikai Liu, Wenyu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu Province China
In this paper, a deep BiLSTM ensemble method was proposed to detect anomaly of drinking water quality. First, a convolutional neural network (CNN) is utilized as a feature extractor in order to process the raw data of... 详细信息
来源: 评论
Global context aware RCNN for object detection
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Wenchao Fu, Chong Xie, Haoyu Zhu, Mai Tie, Ming Chen, Junxin School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Science and Technology on Space Physics Laboratory Beijing100076 China College of Medicine and Biological Information Engineering Northeastern University Shenyang110819 China
RoIPool/RoIAlign is an indispensable process for the typical two-stage object detection algorithm, it is used to rescale the object proposal cropped from the feature pyramid to generate a fixed size feature map. Howev... 详细信息
来源: 评论
Impact of Feature Selection Methods on data Classification for IDS
Impact of Feature Selection Methods on Data Classification f...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Shuai Jiang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
The rapid increase of data has led to many security issues. Various new technologies and other sub-disciplines have been introduced into the research of intrusion detection system (IDS), which has become a hot topic i... 详细信息
来源: 评论
Lightweight EEG Classification Model Based on EEG-sensor with Few Channels
Lightweight EEG Classification Model Based on EEG-sensor wit...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Haoyan Xu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In the traditional work, based on EEG Sensors monitoring the physiological and emotional state of humans, the time-frequency analysis method is usually used to extract the characteristics of the signal, and then analy... 详细信息
来源: 评论
A Car Face Parts Detection Algorithm Based on Faster R-CNN  18
A Car Face Parts Detection Algorithm Based on Faster R-CNN
收藏 引用
18th COTA International Conference of Transportation Professionals: Intelligence, Connectivity, and Mobility, CICTP 2018
作者: Zhou, Zhihao Li, Xiying Qiu, Mingkai Research Center of Intelligent Transportation System School of Engineering Sun Yat-sen Univ. Guangzhou Guangdong510006 China Guangdong Provincial Key Laboratory of Intelligent Transportation System Guangzhou Guangdong510006 China Key Laboratory of Video and Image Intelligent Analysis and Application Technology Ministry of Public Security Guangzhou Guangdong510006 China
The main appearance difference between different types of vehicles is located in the front face area, so the car face parts detection is a key role in fine-grained vehicle recognition. This paper presents a faster R-C... 详细信息
来源: 评论
Joint Spatial-Temporal Trajectory Clustering Method for Mobile Social Networks
Joint Spatial-Temporal Trajectory Clustering Method for Mobi...
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Ji Tang Linfeng Liu Jiagao Wu Jian Zhou Yang Xiang School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
As an important issue in the trajectory mining task, the trajectory clustering technique has attracted lots of the attention in the field of data mining. Trajectory clustering technique identifies the similar trajecto... 详细信息
来源: 评论
Multi-agent game abstraction via graph attention neural network
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Yong Wang, Weixun Hu, Yujing Hao, Jianye Chen, Xingguo Gao, Yang National Key Laboratory for Novel Software Technology Nanjing University Tianjin University NetEase Fuxi AI Lab Noah's Ark Lab Huawei Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications
In large-scale multi-agent systems, the large number of agents and complex game relationship cause great difficulty for policy learning. Therefore, simplifying the learning process is an important research issue. In m... 详细信息
来源: 评论