咨询与建议

限定检索结果

文献类型

  • 6,102 篇 期刊文献
  • 4,922 篇 会议
  • 5 册 图书

馆藏范围

  • 11,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,406 篇 工学
    • 4,516 篇 计算机科学与技术...
    • 3,769 篇 软件工程
    • 1,566 篇 信息与通信工程
    • 861 篇 控制科学与工程
    • 835 篇 电气工程
    • 769 篇 生物工程
    • 751 篇 化学工程与技术
    • 711 篇 电子科学与技术(可...
    • 536 篇 光学工程
    • 521 篇 生物医学工程(可授...
    • 512 篇 机械工程
    • 361 篇 材料科学与工程(可...
    • 348 篇 仪器科学与技术
    • 304 篇 动力工程及工程热...
    • 287 篇 交通运输工程
    • 221 篇 建筑学
    • 216 篇 土木工程
  • 4,258 篇 理学
    • 2,075 篇 数学
    • 1,248 篇 物理学
    • 921 篇 生物学
    • 686 篇 统计学(可授理学、...
    • 593 篇 化学
    • 311 篇 系统科学
  • 1,898 篇 管理学
    • 1,095 篇 管理科学与工程(可...
    • 869 篇 图书情报与档案管...
    • 359 篇 工商管理
  • 517 篇 医学
    • 432 篇 临床医学
    • 306 篇 基础医学(可授医学...
    • 217 篇 药学(可授医学、理...
  • 276 篇 法学
    • 229 篇 社会学
  • 228 篇 农学
  • 156 篇 经济学
  • 86 篇 教育学
  • 32 篇 军事学
  • 30 篇 文学
  • 18 篇 艺术学
  • 1 篇 历史学

主题

  • 265 篇 semantics
  • 225 篇 feature extracti...
  • 209 篇 deep learning
  • 163 篇 data mining
  • 137 篇 computational mo...
  • 130 篇 training
  • 122 篇 machine learning
  • 115 篇 convolution
  • 114 篇 knowledge engine...
  • 101 篇 neural networks
  • 98 篇 image segmentati...
  • 97 篇 predictive model...
  • 95 篇 computer science
  • 90 篇 data models
  • 89 篇 object detection
  • 89 篇 reinforcement le...
  • 89 篇 accuracy
  • 87 篇 optimization
  • 86 篇 contrastive lear...
  • 82 篇 laboratories

机构

  • 403 篇 college of compu...
  • 306 篇 university of ch...
  • 257 篇 key laboratory o...
  • 174 篇 iccub universita...
  • 173 篇 infn sezione di ...
  • 171 篇 department of ph...
  • 167 篇 school of inform...
  • 158 篇 infn sezione di ...
  • 157 篇 horia hulubei na...
  • 152 篇 h.h. wills physi...
  • 151 篇 yandex school of...
  • 148 篇 van swinderen in...
  • 138 篇 universiteit maa...
  • 125 篇 massachusetts in...
  • 116 篇 national researc...
  • 113 篇 warsaw
  • 113 篇 university of ci...
  • 113 篇 university of ma...
  • 112 篇 université clerm...
  • 110 篇 lpnhe sorbonne u...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 116 篇 barter w.
  • 114 篇 brundu d.
  • 110 篇 bellee v.
  • 102 篇 bowcock t.j.v.
  • 102 篇 casse g.
  • 101 篇 bobulska d.
  • 101 篇 blake t.
  • 101 篇 borsato m.
  • 101 篇 betancourt c.
  • 100 篇 belin s.
  • 97 篇 afsharnia h.
  • 95 篇 belavin v.
  • 91 篇 bediaga i.
  • 88 篇 cali s.
  • 85 篇 amato s.
  • 83 篇 baryshnikov f.
  • 80 篇 bjørn m.
  • 76 篇 niyato dusit

语言

  • 9,490 篇 英文
  • 1,302 篇 其他
  • 258 篇 中文
  • 6 篇 德文
  • 6 篇 法文
检索条件"机构=Data Engineering and Knowledge Engineering Key Laboratory"
11029 条 记 录,以下是4331-4340 订阅
排序:
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
Open-Vocabulary X-ray Prohibited Item Detection via Fine-tuning CLIP
arXiv
收藏 引用
arXiv 2024年
作者: Lin, Shuyang Jia, Tong Wang, Hao Ma, Bowen Li, Mingyuan Chen, Dongyue The College of Information Science and Engineering Northeastern University Liaoning Shenyang110819 China The Key Laboratory of Data Analytics and Optimization for Smart Industry Ministry of Education Northeastern University Liaoning Shenyang110819 China The Foshan Graduate School of Innovation Northeastern University Guangdong Foshan528311 China
X-ray prohibited item detection is an essential component of security check and categories of prohibited item are continuously increasing in accordance with the latest laws. Previous works all focus on close-set scena... 详细信息
来源: 评论
Hyper-IIoT: A Smart Contract-inspired Access Control Scheme for Resource-constrained Industrial Internet of Things
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2025年
作者: Li, Dun Li, Hongzhi Crespi, Noel Minerva, Roberto Li, Ming Liang, Wei Li, Kuan-Ching Tsinghua University Department of Industrial Engineering China Institut Polytechnique de Paris Samovar Telecom SudParis Palaiseau91120 France Chizhou University College of Big Data and Artificial Intelligence Chizhou247100 China The Hong Kong Polytechnic University Research Institute for Advanced Manufacturing Hung Hom Hong Kong Hunan University of Science and Technology School of Computer Science and Engineering Hunan University of Science and Technology Sanya Research Institute Hunan Key Laboratory for Service Computing and Novel Software Technology China Providence University Dept. of Computer Science and Information Engineering Taiwan
In recent years, the refinements in industrial processes and the increasing complexity of managing privacy-sensitive data in Industrial Internet of Things (IIoT) devices have highlighted the need for secure, robust, a... 详细信息
来源: 评论
A Hybrid Blockchain Scheme for Tracing Manufacturing Processes and Trading Transactions
A Hybrid Blockchain Scheme for Tracing Manufacturing Process...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Ye Yuan Mingxing Yang Ruoting Xiong Yani Sun Xianchao Zhang Wei Ren HuBei Land Resources Vocational College China Gemological Institute China University of Geosciences Wuhan China School of Computing Science University of East Anglia UK Yunnan Key Laboratory of Blockchain Application Technology Yunnan Innovation Institute of Beihang University Kunming China Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province Jiaxing University Jiaxing China State Key Laboratory of Geo-Information Engineering and Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of MNR Beijing China Ministry of Education Key Laboratory of Data Protection and Intelligent Management (Sichuan University) China School of Computer Science China University of Geosciences Wuhan China
Blockchain can be envisioned as an enabling framework in terms of cryptography and distributed computing to construct trusted data records among un-trusted users. It can be applied in two typical scenarios - historica... 详细信息
来源: 评论
A Dynamic Transformer Network for Vehicle Detection
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Tian, Chunwei Liu, Kai Zhang, Bob Huang, Zhixiang Lin, Chia-Wen Zhang, David Harbin Institute of Technology School of Computer Science and Technology Harbin15001 China Macao Special Administrative Region of China PAMI Research Group University of Macau 999078 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Key Laboratory of Electromagnetic Environmental Sensing Hefei230601 China National Tsing Hua University Department of Electrical Engineering Institute of Communications Engineering Hsinchu Taiwan School of Data Science Shenzhen518172 China
Stable consumer electronic systems can assist traffic better. Good traffic consumer electronic systems require collaborative work between traffic algorithms and hardware. However, performance of popular traffic algori... 详细信息
来源: 评论
Unsupervised Community Discovery Algorithm via Reconstructed Graph Neural NEtwork
Unsupervised Community Discovery Algorithm via Reconstructed...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Jinghong Wang Hui Wang Jiateng Yang Xizhao Wang College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Hebei Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security (Hebei Normal University) Shijiazhuang China College of Artificial Intelligence and Big Data Hebei Polytechnic Institute Shijiazhuang China College of Computer Science and Software Engineering ShenZhen University Shenzhen China
Community discovery can help discover potential community structures in the network, which is a fundamental and important issue in network science. Graph neural network-based algorithms are receiving increasing attent...
来源: 评论
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding
Visible Light Positioning Method for Indoor Line-of-Sight Sc...
收藏 引用
IEEE International Conference on data Science in Cyberspace (DSC)
作者: Yonghao Yu Yongde Guo Dawei Zhao Kexue Fu Yongwei Tang Qinyuan Wang Faculty of Data Science City University of Macau China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center(National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China School of Mechanical Engineering Key Laboratory of High Efficiency and Clean Mechanical Manufacture Ministry of Education Shandong University Jinan China
Existing indoor visible light positioning methods, such as those based on fingerprint database algorithms, are complex to construct and consume significant resources. In response to this issue, the text proposes an en... 详细信息
来源: 评论
Generating Targeted Universal Adversarial Perturbation against Automatic Speech Recognition via Phoneme Tailoring
Generating Targeted Universal Adversarial Perturbation again...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yujun Zhang Yanqu Chen Jiakai Wang Jin Hu Renshuai Tao Xianglong Liu State Key Laboratory of Complex & Critical Software Environment Beihang University China School of Computer Science and Engineering Beihang University China College of Computer Science Beijing University of Technology China Zhongguancun Laboratory China School of Computer and Information Technology Beijing Jiaotong University China Institute of Data Space Hefei Comprehensive National Science Center China
There is a growing concern about adversarial attacks against automatic speech recognition (ASR) systems. Although research into targeted universal adversarial examples (AEs) has progressed, current methods are constra... 详细信息
来源: 评论
Multi-Passive/Active-IRS Enhanced Wireless Coverage: Deployment Optimization and Cost-Performance Trade-off
arXiv
收藏 引用
arXiv 2023年
作者: Fu, Min Mei, Weidong Zhang, Rui The Department of Electrical and Computer Engineering National University of Singapore Singapore117583 Singapore The National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China Chengdu611731 China School of Science and Engineering Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Guangdong Shenzhen518172 China
Both passive and active intelligent reflecting surfaces (IRSs) can be deployed in complex environments to enhance wireless network coverage by creating multiple blockage-free cascaded line-of-sight (LoS) links. In thi... 详细信息
来源: 评论
Modeling and adaptive control for a spatial flexible spacecraft with unknown actuator failures
收藏 引用
Science China(Information Sciences) 2021年 第5期64卷 177-192页
作者: Zhijie LIU Zhiji HAN Zhijia ZHAO Wei HE Key Laboratory of Knowledge Automation for Industrial Processes of Ministry of Education School of Automation and Electrical Engineering Institute of Artificial IntelligenceUniversity of Science and Technology Beijing Shunde Graduate School of University of Science and Technology Beijing School of Mechanical and Electrical Engineering Guangzhou University
In this paper, we address simultaneous control of a flexible spacecraft's attitude and vibrations in a three-dimensional space under input disturbances and unknown actuator failures. Using Hamilton's principle... 详细信息
来源: 评论