咨询与建议

限定检索结果

文献类型

  • 6,102 篇 期刊文献
  • 4,922 篇 会议
  • 5 册 图书

馆藏范围

  • 11,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,406 篇 工学
    • 4,516 篇 计算机科学与技术...
    • 3,769 篇 软件工程
    • 1,566 篇 信息与通信工程
    • 861 篇 控制科学与工程
    • 835 篇 电气工程
    • 769 篇 生物工程
    • 751 篇 化学工程与技术
    • 711 篇 电子科学与技术(可...
    • 536 篇 光学工程
    • 521 篇 生物医学工程(可授...
    • 512 篇 机械工程
    • 361 篇 材料科学与工程(可...
    • 348 篇 仪器科学与技术
    • 304 篇 动力工程及工程热...
    • 287 篇 交通运输工程
    • 221 篇 建筑学
    • 216 篇 土木工程
  • 4,258 篇 理学
    • 2,075 篇 数学
    • 1,248 篇 物理学
    • 921 篇 生物学
    • 686 篇 统计学(可授理学、...
    • 593 篇 化学
    • 311 篇 系统科学
  • 1,898 篇 管理学
    • 1,095 篇 管理科学与工程(可...
    • 869 篇 图书情报与档案管...
    • 359 篇 工商管理
  • 517 篇 医学
    • 432 篇 临床医学
    • 306 篇 基础医学(可授医学...
    • 217 篇 药学(可授医学、理...
  • 276 篇 法学
    • 229 篇 社会学
  • 228 篇 农学
  • 156 篇 经济学
  • 86 篇 教育学
  • 32 篇 军事学
  • 30 篇 文学
  • 18 篇 艺术学
  • 1 篇 历史学

主题

  • 265 篇 semantics
  • 225 篇 feature extracti...
  • 209 篇 deep learning
  • 163 篇 data mining
  • 137 篇 computational mo...
  • 130 篇 training
  • 122 篇 machine learning
  • 115 篇 convolution
  • 114 篇 knowledge engine...
  • 101 篇 neural networks
  • 98 篇 image segmentati...
  • 97 篇 predictive model...
  • 95 篇 computer science
  • 90 篇 data models
  • 89 篇 object detection
  • 89 篇 reinforcement le...
  • 89 篇 accuracy
  • 87 篇 optimization
  • 86 篇 contrastive lear...
  • 82 篇 laboratories

机构

  • 403 篇 college of compu...
  • 306 篇 university of ch...
  • 257 篇 key laboratory o...
  • 174 篇 iccub universita...
  • 173 篇 infn sezione di ...
  • 171 篇 department of ph...
  • 167 篇 school of inform...
  • 158 篇 infn sezione di ...
  • 157 篇 horia hulubei na...
  • 152 篇 h.h. wills physi...
  • 151 篇 yandex school of...
  • 148 篇 van swinderen in...
  • 138 篇 universiteit maa...
  • 125 篇 massachusetts in...
  • 116 篇 national researc...
  • 113 篇 warsaw
  • 113 篇 university of ci...
  • 113 篇 university of ma...
  • 112 篇 université clerm...
  • 110 篇 lpnhe sorbonne u...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 116 篇 barter w.
  • 114 篇 brundu d.
  • 110 篇 bellee v.
  • 102 篇 bowcock t.j.v.
  • 102 篇 casse g.
  • 101 篇 bobulska d.
  • 101 篇 blake t.
  • 101 篇 borsato m.
  • 101 篇 betancourt c.
  • 100 篇 belin s.
  • 97 篇 afsharnia h.
  • 95 篇 belavin v.
  • 91 篇 bediaga i.
  • 88 篇 cali s.
  • 85 篇 amato s.
  • 83 篇 baryshnikov f.
  • 80 篇 bjørn m.
  • 76 篇 niyato dusit

语言

  • 9,490 篇 英文
  • 1,302 篇 其他
  • 258 篇 中文
  • 6 篇 德文
  • 6 篇 法文
检索条件"机构=Data Engineering and Knowledge Engineering Key Laboratory"
11029 条 记 录,以下是4261-4270 订阅
排序:
Ultrafast and deterministic generation of Bell states in the ultrastrong coupling regime
arXiv
收藏 引用
arXiv 2023年
作者: Xie, Xin Tian, Junlong Peng, Jie Hunan Key Laboratory for Micro-Nano Energy Materials and Devices School of Physics and Optoelectronics Xiangtan University Hunan 411105 China Department of Electronic Science College of Big Data and Information Engineering Guizhou University Guiyang550025 China
We have found the special dark state solutions of the anisotropic two-qubit quantum Rabi model (QRM), which has at most one photon, and constant eigenenergy in the whole coupling regime. Accordingly, we propose a sche... 详细信息
来源: 评论
Sentence Bag Graph Formulation for Biomedical Distant Supervision Relation Extraction
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Hao Liu, Yang Liu, Xiaoyan Liang, Tianming Sharma, Gaurav Xue, Liang Guo, Maozu The School of Computer Science and Technology Harbin Institute of Technology Harbin150001 China The Department of Electrical and Computer Engineering University of Rochester RochesterNY14627 United States The *** HangZhou 310000 China The School of Electrical and Information Engineering Beijing University of Civil Engineering and Architecture Beijing100044 China The Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture Beijing100044 China
We introduce a novel graph-based framework for alleviating key challenges in distantly-supervised relation extraction and demonstrate its effectiveness in the challenging and important domain of biomedical data. Speci... 详细信息
来源: 评论
Automatic Deep Active Contour Model Based on Local Image Characteristics
Automatic Deep Active Contour Model Based on Local Image Cha...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Haijun You Kai Li Junying Chen Key Laboratory of Big Data and Intelligent Robot (SCUT) Ministry of Education School of Software Engineering South China University of Technology Guangzhou China Department of Ultrasound Third Affiliated Hospital of Sun Yat-sen University Guangzhou China
In recent years, convolutional neural networks have made remarkable achievements in medical image segmentation. Unclear margins and fuzzy boundary regions are formed surrounding the thyroid gland area under the influe...
来源: 评论
Block-Structured Optimization for Subgraph Detection in Interdependent Networks
arXiv
收藏 引用
arXiv 2022年
作者: Jie, Fei Wang, Chunpai Chen, Feng Li, Lei Wu, Xindong Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Ministry of Education Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China Department of Computer Science University at Albany – SUNY AlbanyNY United States Erik Jonsson School of Engineering & Computer Science The University of Texas at Dallas DallasTX United States Mininglamp Academy of Sciences Mininglamp Technologies Beijing China Institute of Big Knowledge Science Hefei University of Technology Hefei China
We propose a generalized framework for block-structured nonconvex optimization, which can be applied to structured subgraph detection in interdependent networks, such as multi-layer networks, temporal networks, networ... 详细信息
来源: 评论
Dark-state solution and symmetries of the two-qubit multimode asymmetric quantum Rabi model
arXiv
收藏 引用
arXiv 2023年
作者: Lei, Ze-Feng Tian, Junlong Peng, Jie Hunan Key Laboratory for Micro-Nano Energy Materials and Devices School of Physics and Optoelectronics Xiangtan University Hunan411105 China Department of Electronic Science College of Big Data and Information Engineering Guizhou University Guiyang550025 China
We study the two-qubit asymmetric quantum Rabi model (AQRM) and find its dark-state solution. Such solutions have at most one photon and constant eigenenergy in the whole coupling regime, causing level crossings in th... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
Vulnerability Detection with Graph Simplification and Enhanc...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Xin-Cheng Wen Yupan Chen Cuiyun Gao Hongyu Zhang Jie M. Zhang Qing Liao School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Peng Cheng Laboratory and Guangdong Provincial Key Laboratory Novel Security Intelligence Technologies School of Big Data and Software Engineering Chongqing University China Department of Informatics King's College London UK Peng Cheng Laboratory
Prior studies have demonstrated the effectiveness of Deep Learning (DL) in automated software vulnerability detection. Graph Neural Networks (GNNs) have proven effective in learning the graph representations of source...
来源: 评论
A Framework for Autonomous Vehicle Testing Using Semantic Models
A Framework for Autonomous Vehicle Testing Using Semantic Mo...
收藏 引用
IEEE International Conference on Artificial Intelligence Testing (AITest)
作者: Yejun He Muslim Razi Jerry Gao Chuanqi Tao Ministry Key Laboratory for Safety-Critical Software Development and Verification Nanjing University of Aeronautics and Astronautics Nanjing Jiangsu China Computer Engineering Department and Applied Data Science Department San Jose State University San Jose USA
With the rapid development of big data and artificial intelligence, autonomous vehicles (AV) have achieved great success in diverse application domains. Although the current development of autonomous driving technolog...
来源: 评论
FaceBench: A Multi-View Multi-Level Facial Attribute VQA dataset for Benchmarking Face Perception MLLMs
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Xiaoqin Ma, Xusen Hou, Xianxu Ding, Meidan Li, Yudong Chen, Junliang Chen, Wenting Peng, Xiaoyang Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China AIAC Xi’an Jiaotong-Liverpool University China Tsinghua University China The Hong Kong Polytechnic University Hong Kong City University of Hong Kong Hong Kong Sun Yat-sen University China
Multimodal large language models (MLLMs) have demonstrated remarkable capabilities in various tasks. However, effectively evaluating these MLLMs on face perception remains largely unexplored. To address this gap, we i...
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论