咨询与建议

限定检索结果

文献类型

  • 1,640 篇 期刊文献
  • 1,031 篇 会议
  • 2 册 图书

馆藏范围

  • 2,673 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,734 篇 工学
    • 1,103 篇 计算机科学与技术...
    • 905 篇 软件工程
    • 523 篇 信息与通信工程
    • 264 篇 生物工程
    • 257 篇 电气工程
    • 233 篇 电子科学与技术(可...
    • 217 篇 控制科学与工程
    • 192 篇 生物医学工程(可授...
    • 178 篇 光学工程
    • 114 篇 化学工程与技术
    • 94 篇 机械工程
    • 84 篇 仪器科学与技术
    • 79 篇 动力工程及工程热...
    • 71 篇 建筑学
    • 69 篇 土木工程
    • 57 篇 材料科学与工程(可...
    • 56 篇 交通运输工程
  • 1,136 篇 理学
    • 574 篇 数学
    • 329 篇 生物学
    • 260 篇 物理学
    • 203 篇 统计学(可授理学、...
    • 135 篇 化学
    • 84 篇 系统科学
  • 430 篇 管理学
    • 257 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 116 篇 工商管理
  • 210 篇 医学
    • 168 篇 临床医学
    • 120 篇 基础医学(可授医学...
    • 73 篇 药学(可授医学、理...
  • 74 篇 农学
  • 64 篇 法学
    • 57 篇 社会学
  • 46 篇 经济学
  • 14 篇 教育学
  • 8 篇 军事学
  • 7 篇 文学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 76 篇 semantics
  • 73 篇 training
  • 68 篇 feature extracti...
  • 67 篇 deep learning
  • 50 篇 computational mo...
  • 50 篇 machine learning
  • 41 篇 data models
  • 40 篇 accuracy
  • 39 篇 predictive model...
  • 36 篇 convolution
  • 35 篇 neural networks
  • 30 篇 reinforcement le...
  • 30 篇 signal processin...
  • 29 篇 image segmentati...
  • 29 篇 federated learni...
  • 27 篇 optimization
  • 26 篇 object detection
  • 26 篇 convolutional ne...
  • 25 篇 beamforming
  • 24 篇 task analysis

机构

  • 286 篇 shenzhen researc...
  • 113 篇 school of scienc...
  • 97 篇 department of el...
  • 81 篇 school of scienc...
  • 55 篇 the department o...
  • 47 篇 school of data s...
  • 46 篇 peng cheng labor...
  • 40 篇 international re...
  • 40 篇 university of ch...
  • 39 篇 shenzhen interna...
  • 35 篇 national enginee...
  • 34 篇 shenzhen researc...
  • 30 篇 school of softwa...
  • 26 篇 shenzhen researc...
  • 25 篇 school of comput...
  • 23 篇 the shenzhen res...
  • 23 篇 key laboratory o...
  • 23 篇 the chinese univ...
  • 22 篇 national univers...
  • 22 篇 college of infor...

作者

  • 111 篇 zhang rui
  • 51 篇 chang tsung-hui
  • 45 篇 zhu lipeng
  • 44 篇 zhu guangxu
  • 41 篇 li haizhou
  • 34 篇 shi qingjiang
  • 32 篇 wang shuai
  • 26 篇 cui shuguang
  • 25 篇 luo zhi-quan
  • 24 篇 shen linlin
  • 23 篇 mei weidong
  • 22 篇 li yang
  • 22 篇 wan xiang
  • 21 篇 shao xiaodan
  • 20 篇 tsung-hui chang
  • 20 篇 zhou pan
  • 20 篇 wang changmiao
  • 18 篇 xia yong
  • 17 篇 wu yik-chung
  • 17 篇 shuguang cui

语言

  • 2,368 篇 英文
  • 254 篇 其他
  • 64 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Big Data Science and Intelligent Engineering Research Institute"
2673 条 记 录,以下是661-670 订阅
排序:
Hard-Label Black-Box Attacks on 3D Point Clouds
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Daizong Tao, Yunbo Zhou, Pan Hu, Wei Wangxuan Institute of Computer Technology Peking University No. 128 Zhongguancun North Street Beijing China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
With the maturity of depth sensors in various 3D safety-critical applications, 3D point cloud models have been shown to be vulnerable to adversarial attacks. Almost all existing 3D attackers simply follow the white-bo... 详细信息
来源: 评论
ImagineNet: Target Speaker Extraction with Intermittent Visual Cue Through Embedding Inpainting
ImagineNet: Target Speaker Extraction with Intermittent Visu...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zexu Pan Wupeng Wang Marvin Borsdorf Haizhou Li Institute of Data Science National University of Singapore (NUS) Singapore Department of Electrical and Computer Engineering NUS Singapore Machine Listening Lab University of Bremen Germany Shenzhen Research Institute of Big Data School of Data Science The Chinese University of Hong Kong Shenzhen China
The speaker extraction technique seeks to single out the voice of a target speaker from the interfering voices in a speech mixture. Typically an auxiliary reference of the target speaker is used to form voluntary atte... 详细信息
来源: 评论
TPE for JPEG images with Dynamic M-ary Decomposition and Adaptive Threshold Constraints
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Ma, Yakun Chai, Xiuli Long, Guoqiang Gan, Zhihua Zhang, Yushu Henan University School of Artificial Intelligence Henan Engineering Research Center for Industrial Internet of Things Zhengzhou450046 China Henan University School of Software Intelligent Data Processing Engineering Research Center of Henan Province Institute of Intelligent Network System Kaifeng475004 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing211106 China
Traditional JPEG image encryption that prioritizes solely confidentiality fails to account for the pressing usability requirements of cloud-based environments, thus boosting the boom in thumbnail-preserving encryption... 详细信息
来源: 评论
Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes
Understanding and Detecting Privacy Leakage Vulnerabilities ...
收藏 引用
International Symposium on Software Reliability engineering (ISSRE)
作者: Ziming Chen Yue Li Jianbo Gao Jiashuo Zhang Ke Wang Jianbin Hu Zhi Guan Zhong Chen School of Computer Science Peking University Beijing China College of Computer Science and Technology Taiyuan University of Technology Taiyuan China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China Peking University Chongqing Research Institute of Big Data Chongqing China National Engineering Research Center for Software Engineering Peking University Beijing China
The application on a blockchain cannot maintain secrecy because its data is replicated across all peers in the network. To remedy this problem, Hyperledger Fabric introduces private data collection (PDC) into its smar... 详细信息
来源: 评论
A Provably Secure and Lightweight Access Control Protocol for EI-Based Vehicle to Grid Environment
收藏 引用
IEEE Internet of Things Journal 2023年 第18期10卷 16650-16657页
作者: Shamshad, Salman Mahmood, Khalid Shamshad, Usman Hussain, Ibrar Hussain, Shafiq Das, Ashok Kumar The University of Lahore Department of Software Engineering Lahore54590 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan Riphah International University Riphah School of Computing and Innovation Lahore54000 Pakistan University of Sahiwal Department of Computer Science Sahiwal57000 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Virginia Modeling Analysis and Simulation Center SuffolkVA23435 United States
The energy Internet (EI) presents a novel paradigm for renewable energy distribution that utilizes communication and computing technologies to revolutionize the conventional intelligent transportation systems (ITSs) a... 详细信息
来源: 评论
data Allocation for Approximate Gradient Coding in Edge Networks
Data Allocation for Approximate Gradient Coding in Edge Netw...
收藏 引用
IEEE International Symposium on Information Theory
作者: Haojun Li Yi Chen Kenneth W. Shum Chi Wan Sung School of Science and Engineering The Chinese University of Hong Kong Shenzhen Shenzhen Research Institute of Big Data Department of Electrical Engineering City University of Hong Kong Hong Kong SAR
To leverage the computing power in an edge network, one can divide a machine learning task into several subtasks and assign the subtasks to several computing devices to complete. Under master-worker architecture, the ...
来源: 评论
Optimized Dynamic Watermarking for Audio DNNs with Adaptive Embedding and Boundary Sampling
Optimized Dynamic Watermarking for Audio DNNs with Adaptive ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Hao Fei Hewang Nie Siqi Sun Songfeng Lu Ting Luo Ling Qian Dunbo Cai Zhiguo Huang Runqing Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen China China Mobile (Suzhou) Software Technology Company Limited Suzhou China
The intensified concerns arising from the widespread adoption of deep learning have led to increased scrutiny of intellectual property protection in DNN models. Existing audio watermarking techniques, predominantly ba... 详细信息
来源: 评论
Active-IRS-Aided Wireless Communication: Fundamentals, Designs and Open Issues
arXiv
收藏 引用
arXiv 2023年
作者: Kang, Zhenyu You, Changsheng Zhang, Rui National University of Singapore Singapore Southern University of Science and Technology China School of Science and Engineering Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen China
intelligent reflecting surface (IRS) has emerged as a promising technology to realize smart radio environment for future wireless communication systems. Existing works in this line of research have mainly considered t...
来源: 评论
Connector-S: A Survey of Connectors in Multi-modal Large Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Zhu, Xun Zhang, Zheng Chen, Xi Shi, Yiming Li, Miao Wu, Ji Department of Electronic Engineering Tsinghua University China College of AI Tsinghua University China Beijing National Research Center for Information Science and Technology China Center for Big Data and Clinical Research Institute for Precision Medicine Tsinghua University China
With the rapid advancements in multi-modal large language models (MLLMs), connectors play a pivotal role in bridging diverse modalities and enhancing model performance. However, the design and evolution of connectors ...
来源: 评论
TPE-H2MWD:an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
收藏 引用
Frontiers of Information Technology & Electronic engineering 2023年 第8期24卷 1169-1180页
作者: Xiuli CHAI Xiuhui CHEN Yakun MA Fang ZUO Zhihua GAN Yushu ZHANG School of Artificial Intelligence Henan Engineering Research Center for Industrial Internet of ThingsHenan UniversityZhengzhou450046China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China School of Software Intelligent Data Processing Engineering Research Center of Henan ProvinceInstitute of Intelligent Network SystemHenan UniversityKaifeng475004China College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing211106China
With the substantial increase in image transmission,the demand for image security is ***-like images can be obtained by conventional encryption schemes,and although the security of the images can be guaranteed,the noi... 详细信息
来源: 评论