咨询与建议

限定检索结果

文献类型

  • 1,708 篇 会议
  • 1,588 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 3,304 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,130 篇 工学
    • 1,268 篇 计算机科学与技术...
    • 997 篇 软件工程
    • 411 篇 信息与通信工程
    • 322 篇 电子科学与技术(可...
    • 305 篇 控制科学与工程
    • 295 篇 电气工程
    • 242 篇 光学工程
    • 203 篇 机械工程
    • 187 篇 生物工程
    • 153 篇 仪器科学与技术
    • 131 篇 生物医学工程(可授...
    • 104 篇 动力工程及工程热...
    • 103 篇 化学工程与技术
    • 90 篇 材料科学与工程(可...
    • 87 篇 交通运输工程
    • 79 篇 土木工程
    • 53 篇 建筑学
    • 49 篇 网络空间安全
  • 1,113 篇 理学
    • 525 篇 数学
    • 330 篇 物理学
    • 229 篇 生物学
    • 167 篇 统计学(可授理学、...
    • 120 篇 系统科学
    • 107 篇 化学
  • 538 篇 管理学
    • 332 篇 管理科学与工程(可...
    • 216 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 122 篇 医学
    • 99 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 73 篇 法学
    • 60 篇 社会学
  • 40 篇 经济学
  • 30 篇 农学
  • 13 篇 教育学
  • 10 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 77 篇 laboratories
  • 76 篇 feature extracti...
  • 70 篇 computer science
  • 61 篇 data mining
  • 55 篇 computational mo...
  • 53 篇 deep learning
  • 53 篇 training
  • 50 篇 optimization
  • 50 篇 semantics
  • 43 篇 accuracy
  • 40 篇 machine learning
  • 33 篇 predictive model...
  • 32 篇 protocols
  • 32 篇 clustering algor...
  • 31 篇 object detection
  • 30 篇 neural networks
  • 29 篇 reinforcement le...
  • 28 篇 bandwidth
  • 28 篇 data models
  • 26 篇 computer archite...

机构

  • 114 篇 national enginee...
  • 99 篇 college of compu...
  • 59 篇 school of comput...
  • 58 篇 college of infor...
  • 47 篇 hubei province k...
  • 42 篇 the key laborato...
  • 36 篇 department of co...
  • 36 篇 school of cyber ...
  • 33 篇 school of inform...
  • 33 篇 school of comput...
  • 31 篇 school of optica...
  • 30 篇 university of ch...
  • 29 篇 school of comput...
  • 29 篇 shenzhen city ke...
  • 27 篇 national enginee...
  • 25 篇 hubei key labora...
  • 25 篇 key laboratory o...
  • 25 篇 state key labora...
  • 24 篇 shenzhen univers...
  • 23 篇 department of el...

作者

  • 42 篇 shen linlin
  • 40 篇 ren jiadong
  • 37 篇 hai jin
  • 35 篇 jin hai
  • 28 篇 yang yang
  • 25 篇 mei-ling shyu
  • 25 篇 shu-ching chen
  • 23 篇 zhigang zhang
  • 20 篇 chen shu-ching
  • 20 篇 ji zhen
  • 20 篇 li jianqiang
  • 19 篇 hu shengshan
  • 18 篇 wang xingjun
  • 18 篇 shyu mei-ling
  • 17 篇 zhen ji
  • 17 篇 zhang zhigang
  • 17 篇 shu haowen
  • 17 篇 linlin shen
  • 16 篇 陈景标
  • 14 篇 zhang leo yu

语言

  • 2,763 篇 英文
  • 428 篇 其他
  • 117 篇 中文
  • 1 篇 日文
检索条件"机构=Computer Science and Engineering System Laboratory"
3304 条 记 录,以下是641-650 订阅
排序:
GM-DF: Generalized Multi-Scenario Deepfake Detection
arXiv
收藏 引用
arXiv 2024年
作者: Lai, Yingxin Yu, Zitong Yang, Jing Li, Bin Kang, Xiangui Shen, Linlin The School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Information Security The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510080 China Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Existing face forgery detection usually follows the paradigm of training models in a single domain, which leads to limited generalization capacity when unseen scenarios and unknown attacks occur. In this paper, we ela... 详细信息
来源: 评论
A Continuous Verification Mechanism for Clients in Federated Unlearning to Defend the Right to be Forgotten
A Continuous Verification Mechanism for Clients in Federated...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Shanshan Chen Jun Liu Yuying Li Yamin Li Yang Yang Gaoyang Liu Chen Wang Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China School of Computer Science and Information Engineering Hubei University Wuhan China Huazhong University of Science and Technology Wuhan China
In Federated Learning (FL), the regulatory need for the "right to be forgotten" requires efficient Federated Unlearning (FU) methods, which enable FL models to unlearn appointed training data. Associating wi... 详细信息
来源: 评论
Scavenger: Better Space-Time Trade-Offs for Key-Value Separated LSM-trees
Scavenger: Better Space-Time Trade-Offs for Key-Value Separa...
收藏 引用
International Conference on Data engineering
作者: Jianshun Zhang Fang Wang Sheng Qiu Yi Wang Jiaxin Ou Junxun Huang Baoquan Li Peng Fang Dan Feng Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of data storage systems and Technology Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology China Shenzhen Huazhong University of Science and Technology Research Institute Bytefrance Inc.
Key- Value Stores (KVS) implemented with log- structured merge-tree (LSM-tree) have gained widespread ac-ceptance in storage systems. Nonetheless, a significant challenge arises in the form of high write amplification... 详细信息
来源: 评论
Deep Q-learning Sampling Based on Advantages  5
Deep Q-learning Sampling Based on Advantages
收藏 引用
5th International Conference on Intelligent Robotics and Control engineering, IRCE 2022
作者: Xie, Ming Ren, Xinrui Yu, Jianbo Shu, Feng Shanghai Engineering Research Center of Ultra-Precision Motion Control and Measurement Academy for Engineering and Technology Fudan University Shanghai China School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai China School of Microelectronics Fudan University State Key Laboratory of ASIC and System Shanghai200433 China
Deep Q-learning (DQN) has shown recent success on a wide range of complicated sequential decision-making issues, especially in the classic control area. However, in most DQN training, the sampling policies, particular... 详细信息
来源: 评论
Robust Output Feedback Control Design for Inertia Emulation by Wind Turbine Generators
Robust Output Feedback Control Design for Inertia Emulation ...
收藏 引用
IEEE General Meeting Power& Energy Society
作者: Samaneh Morovati Yichen Zhang Seddik Djouadi Kevin Tomsovic Andrew Wintenberg Mohammed Olama Electrical Engineering and Computer Science The University of Tennessee Knoxville Energy system devision Argonne National Laboratory Electrical Engineering and Computer Science University of Michigan Ann Arbor Computational Sciences and Engineering Division Oak Ridge National Laboratory
Wind generation has gained widespread use as a renewable energy source. Most wind turbines and other renewables connected to the grid through converters result in a reduction in the natural inertial response to grid f... 详细信息
来源: 评论
SSC- l0 : Sparse Subspace Clustering with the l0 Inequality Constraint  7th
SSC- l0 : Sparse Subspace Clustering with the l0 Inequality...
收藏 引用
7th Asian Conference on Pattern Recognition, ACPR 2023
作者: Wang, Yangbo Zhou, Jie Lin, Qingshui Lu, Jianglin Gao, Can National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518060 China Basic Teaching Department Liaoning Technical University Huludao125105 China College of Engineering Northeastern University BostonMA02115 United States
Self-expression learning methods often obtain a coefficient matrix to measure the similarity between pairs of samples. However, directly using all points to represent a fixed sample in a class under the self-expressio... 详细信息
来源: 评论
The Knowledge of Cyber-Security Vulnerabilities in an Institution of Higher and University Education. A Case of ISP-Bukavu (Institut Supérieur Pédagogique de Bukavu) (TTC = Teachers’ Training College)
收藏 引用
Journal of computer and Communications 2023年 第4期11卷 12-32页
作者: Dominique Wasso Kiseki Vincent Havyarimana Therence Niyonsaba Désiré Lumonge Zabagunda Walumbuka Ilundu Wail Thabo Semong Computer Engineering University of Burundi (UB) Bujumbura Burundi Ecole Normale Supérieure (ENS) Bujumbura Burundi University Research Laboratory in Modeling and Applied Statistical Engineering (LURMISTA) Nyamugerera Bujumbura Department of Physics and Technology ISP Bukavu Democratic Republic of Congo Department of Management Computer Science ISP Bukavu Democratic Republic of Congo Departement of Computer science and Information System Bostwana International University of Science and Technology Palapye Bostwana
This study pursues the objective of analyzing and verifying the knowledge of the agents of the Institut Supérieur Pédagogique/ISP-Bukavu (TTC = Teachers’ training College) in relation to the practical flaws... 详细信息
来源: 评论
Outsourced Secure Cross-Modal Retrieval based on Secret Sharing for Lightweight Clients
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Niu, Ziyu Wang, Hao Li, Zhi Su, Ye Xu, Lijuan Zhang, Yudi Susilo, Willy Shandong Normal University School of Information Science and Engineering Jinan China University of Wollongong School of Computing and Information Technology Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education National Supercomputer Center in Jinan Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Cross-modal retrieval is a technique that uses one modality to query another modality in multimedia data (e.g., retrieving images based on text, or retrieving text based on images). It can break down the barriers betw... 详细信息
来源: 评论
Efficient Hybrid Multi-Population Genetic Algorithm for Multi-UAV Task Assignment in Consumer Electronics Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Bai, Xiaoshan Jiang, Haoyu Li, Chao Ullah, Inam Dabel, Maryam M. Al Bashir, Ali Kashif Wu, Zongze Sam, Shuzhi Shenzhen University College of Mechatronics and Control Engineering National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Shenzhen University College of Mechatronics and Control Engineering Shenzhen518060 China Shenzhen University Shenzhen City Joint Laboratory of Autonomous Unmanned Systems and Intelligent Manipulation Shenzhen518060 China Tashkent State University of Economics Department of Artificial Intelligence Tashkent100066 Uzbekistan University of Hafr Al Batin Department of Computer Science and Engineering College of Computer Science and Engineering Saudi Arabia Manchester Metropolitan University Manchester United Kingdom Shenzhen518060 China National University of Singapore Department of Electrical and Computer Engineering Singapore117576 Singapore
In recent years, as people’s living standards have improved and consumption concepts have been transformed, the demand for purchasing consumer electronics online has continued to grow, further stimulating the develop... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论