咨询与建议

限定检索结果

文献类型

  • 241 篇 会议
  • 112 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 236 篇 工学
    • 164 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 83 篇 信息与通信工程
    • 36 篇 控制科学与工程
    • 35 篇 电气工程
    • 31 篇 电子科学与技术(可...
    • 16 篇 机械工程
    • 12 篇 仪器科学与技术
    • 12 篇 网络空间安全
    • 11 篇 动力工程及工程热...
    • 11 篇 建筑学
    • 11 篇 化学工程与技术
    • 9 篇 交通运输工程
    • 9 篇 生物工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 7 篇 光学工程
    • 7 篇 土木工程
    • 5 篇 材料科学与工程(可...
  • 129 篇 理学
    • 81 篇 数学
    • 34 篇 物理学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 16 篇 化学
    • 14 篇 生物学
  • 61 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 23 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 4 篇 经济学
  • 4 篇 法学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 19 篇 laboratories
  • 13 篇 computer science
  • 12 篇 wireless sensor ...
  • 10 篇 heuristic algori...
  • 9 篇 optimization
  • 9 篇 algorithm design...
  • 8 篇 statistics
  • 8 篇 bandwidth
  • 8 篇 clustering algor...
  • 8 篇 evolutionary com...
  • 7 篇 computational mo...
  • 7 篇 computer network...
  • 6 篇 couplings
  • 6 篇 vectors
  • 6 篇 feature extracti...
  • 6 篇 sociology
  • 6 篇 training
  • 5 篇 linear discrimin...
  • 5 篇 face recognition
  • 5 篇 data mining

机构

  • 43 篇 college of infor...
  • 31 篇 key laboratory o...
  • 25 篇 school of comput...
  • 24 篇 anhui province k...
  • 21 篇 anhui university...
  • 17 篇 anhui province k...
  • 15 篇 department of co...
  • 11 篇 hubei key labora...
  • 11 篇 microsoft resear...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...

作者

  • 38 篇 li yingsong
  • 26 篇 yingsong li
  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 11 篇 huang zhixiang
  • 9 篇 junwei qi
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 xianbin cao
  • 7 篇 zhang lei
  • 6 篇 chenxi shao
  • 6 篇 qi junwei
  • 6 篇 ping zhu
  • 6 篇 dong xu

语言

  • 337 篇 英文
  • 8 篇 其他
  • 8 篇 中文
检索条件"机构=Anhui Key Laboratory of Software Engineering in Computing and Communication"
353 条 记 录,以下是321-330 订阅
排序:
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论
Understanding the Robustness of 3D Object Detection with Bird’s-Eye-View Representations in Autonomous Driving
arXiv
收藏 引用
arXiv 2023年
作者: Zhu, Zijian Zhang, Yichi Chen, Hai Dong, Yinpeng Zhao, Shu Ding, Wenbo Zhong, Jiachen Zheng, Shibao Institute of Image Communication and Network Engineering Shanghai Jiao Tong University China Dept. of Comp. Sci. and Tech. Institute for AI THBI Lab BNRist Center Tsinghua University China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education School of Computer Science and Technology Anhui University Information Materials and Intelligent Sensing Laboratory of Anhui Province China SAIC Motor AI Lab China Zhongguancun Laboratory China
3D object detection is an essential perception task in autonomous driving to understand the environments. The Bird’s-Eye-View (BEV) representations have significantly improved the performance of 3D detectors with cam... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Rank-one Projections with Adaptive Margins for Face Recognition
Rank-one Projections with Adaptive Margins for Face Recognit...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Dong Xu S. Lin Shuicheng Yan Xiaoou Tang Department of Electrical Engineering Columbia University USA MOE-Microsoft Key Laboratory of Multimedia Computing and Communication & Department of EEIS University of Science and Technology Hefei Anhui China Microsoft Research Asia Beijing China Department of Information Engineering Chinese University of Hong Kong Hong Kong China Beckman Institute University of Illinois Urbana-Champaign Champaign USA
In supervised dimensionality reduction, tensor representations of images have recently been employed to enhance classification of high-dimensional data with small training sets. To handle tensor data, this approach ha... 详细信息
来源: 评论
BADROBOT: JAILBREAKING EMBODIED LLMS IN THE PHYSICAL WORLD
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Zhu, Chenyu Wang, Xianlong Zhou, Ziqi Yin, Changgan Li, Minghui Xue, Lulu Wang, Yichen Hu, Shengshan Liu, Aishan Guo, Peijin Zhang, Leo Yu National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Beihang University China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Embodied AI represents systems where AI is integrated into physical entities. Large Language Model (LLM), which exhibits powerful language understanding abilities, has been extensively employed in embodied AI by facil... 详细信息
来源: 评论
An Optimized Hierarchical Classifier for Pedestrian Detection
An Optimized Hierarchical Classifier for Pedestrian Detectio...
收藏 引用
7th World Congress on Intelligent Control and Automation (WCICA 2008), vol.3
作者: Yanwu Xu Xianbin Cao Hong Qiao Department of Computer Science and Technology University of Science and Technology Hefei China Anhui Province Key Laboratory of Software Computing and Communication Hefei China Institute of Automation Chinese Academy and Sciences Beijing China
Classification is an essential technology in Pedestrian Detection System (PDS). Until now, single-classifier and basic cascaded classifier had been widely used in PDS;however, most of them can hardly satisfy the 3 req... 详细信息
来源: 评论
Discriminant analysis with tensor representation
Discriminant analysis with tensor representation
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Shuicheng Yan Dong Xu Qiang Yang Lei Zhang Xiaoou Tang Hong-Jiang Zhang Department of Information Engineering Chinese University of Hong Kong Sha Tin Hong Kong China MOE-Microsoft Key Laboratory of Multimedia Computing and Communication & Department of EEIS University of Science and Technology Hefei Anhui China Department of Computer Science Hong Kong University of Science and Technology Hong Kong China Microsoft Research Asia Beijing China
In this paper, we present a novel approach to solving the supervised dimensionality reduction problem by encoding an image object as a general tensor of 2nd or higher order. First, we propose a discriminant tensor cri... 详细信息
来源: 评论
Cellular signal transduction network simulation based on microscopic agent model
收藏 引用
Xitong Fangzhen Xuebao / Journal of System Simulation 2008年 第17期20卷 4703-4707页
作者: Shao, Chen-Xi Deng, Hong-Li Yang, Ming Wang, Zi-Cai Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Control and Simulation Center Harbin Institute of Technology Harbin 150001 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
A hierarchical MAS (multi-agent system) based on a multi-level discrete space and microscopic agent model for signal transduction network modeling and simulation was proposed. The space can effectively represent the h... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论