咨询与建议

限定检索结果

文献类型

  • 310 篇 期刊文献
  • 227 篇 会议
  • 1 册 图书

馆藏范围

  • 538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 364 篇 工学
    • 262 篇 计算机科学与技术...
    • 216 篇 软件工程
    • 64 篇 信息与通信工程
    • 53 篇 控制科学与工程
    • 45 篇 生物工程
    • 44 篇 电气工程
    • 33 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 25 篇 光学工程
    • 25 篇 电子科学与技术(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 13 篇 材料科学与工程(可...
    • 12 篇 交通运输工程
    • 11 篇 仪器科学与技术
    • 10 篇 土木工程
  • 175 篇 理学
    • 72 篇 数学
    • 54 篇 生物学
    • 53 篇 物理学
    • 26 篇 统计学(可授理学、...
    • 23 篇 化学
    • 11 篇 系统科学
  • 100 篇 管理学
    • 58 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 38 篇 医学
    • 31 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 15 篇 药学(可授医学、理...
    • 11 篇 公共卫生与预防医...
  • 26 篇 法学
    • 18 篇 社会学
  • 5 篇 农学
  • 4 篇 经济学
  • 4 篇 教育学
  • 3 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 18 篇 deep learning
  • 18 篇 graph neural net...
  • 16 篇 machine learning
  • 16 篇 blockchain
  • 15 篇 federated learni...
  • 15 篇 privacy
  • 14 篇 semantics
  • 14 篇 training
  • 12 篇 computational mo...
  • 12 篇 accuracy
  • 11 篇 feature extracti...
  • 10 篇 security
  • 9 篇 data privacy
  • 8 篇 object detection
  • 8 篇 scalability
  • 8 篇 deep neural netw...
  • 8 篇 contrastive lear...
  • 8 篇 blockchains
  • 8 篇 adaptation model...
  • 7 篇 recommender syst...

机构

  • 30 篇 key lab of educa...
  • 29 篇 school of comput...
  • 18 篇 guangxi key lab ...
  • 16 篇 guangxi key lab ...
  • 15 篇 school of comput...
  • 12 篇 school of cyber ...
  • 12 篇 institute of art...
  • 11 篇 institute of sci...
  • 11 篇 guangxi normal u...
  • 10 篇 college of compu...
  • 10 篇 zhangjiang fudan...
  • 10 篇 school of comput...
  • 9 篇 zju-hangzhou glo...
  • 9 篇 moe frontiers ce...
  • 9 篇 key lab of educa...
  • 9 篇 zhejiang lab
  • 8 篇 ministry of educ...
  • 8 篇 cas key laborato...
  • 8 篇 school of softwa...
  • 8 篇 deqing alpha inn...

作者

  • 16 篇 fu xingcheng
  • 16 篇 li xianxian
  • 15 篇 li jianxin
  • 15 篇 sun qingyun
  • 11 篇 luo xudong
  • 11 篇 yuan haonan
  • 9 篇 xianxian li
  • 9 篇 gao yisen
  • 9 篇 muhammad adnan k...
  • 8 篇 hao zhou
  • 8 篇 jinyan wang
  • 8 篇 shen yulong
  • 8 篇 wang jinyan
  • 8 篇 dong xuewen
  • 7 篇 jiang yu-gang
  • 7 篇 sagheer abbas
  • 7 篇 qu qiang
  • 7 篇 chunhe xia
  • 7 篇 tianbo wang
  • 6 篇 xian youquan

语言

  • 459 篇 英文
  • 73 篇 其他
  • 10 篇 中文
检索条件"机构=Blockchain Innovation Lab/School of Computer Science and Technology"
538 条 记 录,以下是241-250 订阅
排序:
Optimal Hub Placement and Deadlock-Free Routing for Payment Channel Network Scalability
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Lingxiao Dong, Xuewen Gao, Sheng Qu, Qiang Zhang, Xiaodong Tian, Wensheng Shen, Yulong School of Computer Science and Technology Xidian University Xi’an China School of Information Central University of Finance and Economics Beijing China Shenzhen Institute of Advanced Techbology Chinese Academy of Sciences Huawei Blockchain Lab Huawei Cloud Tech Co. Ltd Shenzhen China Nanhu Lab Jiaxing China
As a promising implementation model of payment channel network (PCN), payment channel hub (PCH) could achieve high throughput by providing stable off-chain transactions through powerful hubs. However, existing PCH sch... 详细信息
来源: 评论
Optimal Hub Placement and Deadlock-Free Routing for Payment Channel Network Scalability
TechRxiv
收藏 引用
TechRxiv 2023年
作者: Yang, Lingxiao Dong, Xuewen Gao, Sheng Qu, Qiang Zhang, Xiaodong Tian, Wensheng Shen, Yulong School of Computer Science and Technology Xidian University Xi’an China School of Information Central University of Finance and Economics Beijing China Shenzhen Institute of Advanced Techbology Chinese Academy of Sciences Huawei Blockchain Lab Huawei Cloud Tech Co. Ltd Shenzhen China Nanhu Lab Jiaxing China
As a promising implementation model of payment channel network (PCN), payment channel hub (PCH) could achieve high throughput by providing stable off-chain transactions through powerful hubs. However, existing PCH sch... 详细信息
来源: 评论
FINDER: A Simple and Effective Defender against Unnoticeable Graph Injection Attacks
FINDER: A Simple and Effective Defender against Unnoticeable...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Linlin Su Jinyan Wang Zeming Gan Xianxian Li Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin China School of Computer Science and Engineering Guangxi Normal University Guilin China
Graph Neural Networks (GNNs) have various applications in real-life scenarios. However, they are vulnerable to adversarial attacks, especially Graph Injection Attacks (GIAs). The flexible and high-risk GIAs pose a sig... 详细信息
来源: 评论
Efficient Adaptive label Refinement for label Noise Learning
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Wenzhen Cheng, Debo Lu, Guangquan Zhou, Bo Li, Jiaye Zhang, Shichao School of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guangxi Guilin541004 China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Guilin541004 China UniSA STEM University of South Australia AdelaideSA5095 Australia Guangxi Collaborative Innovation Center of Modern Sericulture and Silk Hechi University Guangxi Hechi546300 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou310027 China
Deep neural networks are highly susceptible to overfitting noisy labels, which leads to degraded performance. Existing methods address this issue by employing manually defined criteria, aiming to achieve optimal parti... 详细信息
来源: 评论
Efficient Federated Learning Using Dynamic Update and Adaptive Pruning with Momentum on Shared Server Data
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Ji Jia, Juncheng Zhang, Hong Yun, Yuhui Wang, Leye Zhou, Yang Dai, Huaiyu Dou, Dejing Hithink RoyalFlush Information Network Co. Ltd. Hangzhou China School of Computer Science and Technology Soochow University Collaborative Innovation Center of Novel Software Technology and Industrialization Suzhou China School of Computer Science and Technology Soochow University Suzhou China Baidu Research Beijing China Key Lab of High Confidence Software Technologies Ministry of Education Software Institute Peking University Beijing China Department of Computer Science and Software Engineering Auburn University Auburn United States Department of Electrical and Computer Engineering North Carolina State University NC United States BEDI Cloud and School of Computer Science Fudan University Beijing China
Despite achieving remarkable performance, Federated Learning (FL) encounters two important problems, i.e., low training efficiency and limited computational resources. In this paper, we propose a new FL framework, i.e... 详细信息
来源: 评论
A Multimedia Approach to Problem Descriptions for Fine-Grained Detail Characterization
A Multimedia Approach to Problem Descriptions for Fine-Grain...
收藏 引用
IEEE International Requirements Engineering Conference Workshops (REW)
作者: Bowen Zheng Zhi Li Hongbin Xiao School of Computer Science and Engineering Guangxi Normal University Guilin China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin China
Requirements analysis has always been regarded as the starting point and focus of requirements engineering. The Problem Frames (PF) approach provides a problem-oriented requirements analysis method by describing the s...
来源: 评论
DARR: A Dual-Branch Arithmetic Regression Reasoning Framework for Solving Machine Number Reasoning  39
DARR: A Dual-Branch Arithmetic Regression Reasoning Framewor...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Li, Chengtai Tan, Yee Yang He, Yuting Ren, Jianfeng Bai, Ruibin Zhao, Yitian Yu, Heng Jiang, Xudong The Digital Port Technologies Lab School of Computer Science University of Nottingham Ningbo China China Cixi Institute of Biomedical Engineering Ningbo Institute of Industrial Technology Chinese Academy of Sciences China School of Computer Science University of Nottingham Malaysia Malaysia Shenzhen Institute of Advanced Technology Chinese Academy of Sciences China Beacons of Excellence Research and Innovation Institute University of Nottingham Ningbo China China School of Electrical & Electronic Engineering Nanyang Technological University Singapore
Abstract visual reasoning (AVR) is a critical ability of humans, and it has been widely studied, but arithmetic visual reasoning, a unique task in AVR to reason over number sense, is less studied in the literature. To... 详细信息
来源: 评论
LOGCAN++: Adaptive Local-global class-aware network for semantic segmentation of remote sensing imagery
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Xiaowen Lian, Rongrong Wu, Zhenkai Guo, Hongbo Yang, Fan Ma, Mengting Wu, Sensen Du, Zhenhong Song, Siyang Zhang, Wei The School of Software Technology Zhejiang University Hangzhou310027 China The school of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200030 China The School of Computer Science and Technology Zhejiang University Hangzhou310027 China The School of Earth Sciences Zhejiang University Hangzhou310027 China The Innovation Center of Yangtze River Delta Zhejiang University Zhejiang Jiaxing314103 China The HUBG Lab Department of Computer Science University of Exeter United Kingdom
Remote sensing images usually characterized by complex backgrounds, scale and orientation variations, and large intra-class variance. General semantic segmentation methods usually fail to fully investigate the above i... 详细信息
来源: 评论
Node Classification in Graph Neural Networks under Dual Consistency
Node Classification in Graph Neural Networks under Dual Cons...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Qiyu Li Xianxian Li De Li Jinyan Wang Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin China School of Computer Science and Engineering Guangxi Normal University Guilin China
In recent years, graph neural networks (GNNs) have become a popular semi-supervised learning method for processing graph-structured data. However, traditional graph neural network models rely heavily on labeled data d...
来源: 评论
DiffusionAD: Norm-guided One-step Denoising Diffusion for Anomaly Detection
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Hui Wang, Zheng Wu, Zuxuan Jiang, Yu-Gang Shanghai Key Lab of Intell. Info. Processing School of CS Fudan University China Shanghai Collaborative Innovation Center of Intelligent Visual Computing China School of Computer Science Zhejiang University of Technology China
Anomaly detection has garnered extensive applications in real industrial manufacturing due to its remarkable effectiveness and efficiency. However, previous generative-based models have been limited by suboptimal reco... 详细信息
来源: 评论