咨询与建议

限定检索结果

文献类型

  • 32 篇 期刊文献
  • 27 篇 会议

馆藏范围

  • 59 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 28 篇 计算机科学与技术...
    • 23 篇 软件工程
    • 18 篇 信息与通信工程
    • 9 篇 生物工程
    • 8 篇 控制科学与工程
    • 6 篇 化学工程与技术
    • 4 篇 电气工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 电子科学与技术(可...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 动力工程及工程热...
    • 2 篇 轻工技术与工程
    • 2 篇 交通运输工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
  • 26 篇 理学
    • 13 篇 数学
    • 9 篇 生物学
    • 8 篇 物理学
    • 6 篇 化学
    • 2 篇 统计学(可授理学、...
  • 16 篇 管理学
    • 11 篇 图书情报与档案管...
    • 4 篇 管理科学与工程(可...
  • 5 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 2 篇 refining
  • 2 篇 semantics
  • 2 篇 topology
  • 2 篇 benchmarking
  • 2 篇 sports
  • 2 篇 steganography
  • 2 篇 convolutional ne...
  • 2 篇 training
  • 1 篇 power demand
  • 1 篇 sensor nodes
  • 1 篇 largest frequent...
  • 1 篇 computer science
  • 1 篇 gmm
  • 1 篇 e-evidence.
  • 1 篇 reliability
  • 1 篇 group theory
  • 1 篇 energy dissipati...
  • 1 篇 internet protoco...
  • 1 篇 feature map
  • 1 篇 deep neural netw...

机构

  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 8 篇 cluster and grid...
  • 5 篇 school of electr...
  • 3 篇 tianjin key lab ...
  • 3 篇 guangxi colleges...
  • 3 篇 national univers...
  • 3 篇 guangxi colleges...
  • 3 篇 key laboratory o...
  • 3 篇 party committee ...
  • 3 篇 school of inform...
  • 2 篇 college of compu...
  • 2 篇 school of mathem...
  • 2 篇 multigig inc. un...

作者

  • 8 篇 hu shengshan
  • 8 篇 zhang leo yu
  • 8 篇 li minghui
  • 6 篇 jin hai
  • 5 篇 wan wei
  • 4 篇 xue lulu
  • 4 篇 zhou ziqi
  • 3 篇 yao dezhong
  • 3 篇 wei wan
  • 3 篇 leo yu zhang
  • 3 篇 zhan-jiang ji
  • 3 篇 minghui li
  • 3 篇 wei shi
  • 3 篇 hai jin
  • 3 篇 shengshan hu
  • 3 篇 wang xianlong
  • 3 篇 degan zhang
  • 2 篇 man ka lok
  • 2 篇 dong jin song
  • 2 篇 ning yuxuan

语言

  • 55 篇 英文
  • 4 篇 中文
检索条件"机构=Information System and Software Engineering Lab"
59 条 记 录,以下是21-30 订阅
排序:
An online semantic tree for link detection
收藏 引用
Journal of Convergence information Technology 2012年 第5期7卷 147-157页
作者: He, Ruifang Hong, Yu Information System and Software Engineering Lab School of Computer Science and Technology Tianjin University Tianjin 15001 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology School of Computer Science and Technology Soochow University Suzhou 215006 China
Link Detection (abbr. LDT) is to determine whether two stories discuss the same topic in Topic Detection and Tracking (abbr. TDT) track. The key issue is to correctly measure the relevance between two stories. Most re... 详细信息
来源: 评论
A Neuro-Fuzzy Approach to Road Traffic Congestion Prediction
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 295-310页
作者: Mohammed Gollapalli Atta-ur-Rahman Dhiaa Musleh Nehad Ibrahim Muhammad Adnan Khan Sagheer Abbas Ayesha Atta Muhammad Aftab Khan Mehwash Farooqui Tahir Iqbal Mohammed Salih Ahmed Mohammed Imran BAhmed Dakheel Almoqbil Majd Nabeel Abdullah Omer Department of Computer Information System(CIS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Science(CS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Pattern Recognition and Machine Learning Lab Department of Software EngineeringGachon UniversityInchonKorea Department of Computer Science National College of Business Administration and EconomicsLahorePunjab54000Pakistan Department of Computer Science Government College University(GCU)LahorePunjab54000Pakistan Department of Computer Engineering(CE) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia College of Business Administration Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Networks and Communications(NC) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia
The fast-paced growth of artificial intelligence applications provides unparalleled opportunities to improve the efficiency of various *** as the transportation sector faces many obstacles following the implementation... 详细信息
来源: 评论
Distributed multi-agent Q-learning for joint channel allocation and power control in cognitive radio networks
收藏 引用
Journal of Computational information systems 2012年 第17期8卷 7071-7078页
作者: Boumediene, Latifa Gao, Zhenguo Liu, Sheng College of Automation Harbin Engineering University Harbin 150001 China Key Laboratory of System Control and Information Processing Ministry of Education Shanghai 200240 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
This paper deals with the resource allocation in completely distributed cognitive radio network. We propose a form of real-time multi-agent distributed reinforcement learning, which is known as Q-learning, to allow th... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Are We Building on the Rock? On the Importance of Data Preprocessing for Code Summarization
arXiv
收藏 引用
arXiv 2022年
作者: Shi, Lin Mu, Fangwen Chen, Xiao Wang, Song Wang, Junjie Yang, Ye Li, Ge Xia, Xin Wang, Qing Institute of Software Chinese Academy of Sciences Beijing China Lassonde School of Engineering York University Toronto Canada School of Systems and Enterprises Stevens Institute of Technology HobokenNJ United States Key Lab of High Confidence Software Technology Peking University Beijing China Software Engineering Application Technology Lab Huawei China Laboratory for Internet Software Technologies Institute of Software CAS China University of Chinese Academy of Sciences China Science & Technology on Integrated Information System Laboratory Institute of Software CAS China
Code summarization, the task of generating useful comments given the code, has long been of interest. Most of the existing code summarization models are trained and validated on widely-used code comment benchmark data... 详细信息
来源: 评论
Novel Detection Service Method for Moving Object in IOT
Novel Detection Service Method for Moving Object in IOT
收藏 引用
2016 3rd International Conference on Materials engineering,Manufacturing Technology and Control(ICMEMTC 2016)
作者: Jie Chen Degan Zhang School of Electronic and Information Engineering Tianjin Vocational Institute Tianjin Key Lab of Intelligent Computing & Novel software Technology Tianjin University of Technology Key Laboratory of Computer Vision and System (Tianjin University of Technology) Ministry of Education
In embedded Internet of Things(IOT) environment, there are the troubles such as complex background, illumination changes, shadows and other factors for detecting moving object, so we put forward a new detection servic... 详细信息
来源: 评论
RGB-D Fusion Network for Glass Segmentation
SSRN
收藏 引用
SSRN 2024年
作者: Tao, Tao Yang, Jianfeng Xiao, Jinsheng Zheng, Hong Wang, Hanfang School of Electronic information Wuhan University Wuhan China Lab. of Industrial IoT System Wuhan China Wuhan Vocational College of Software and Engineering Wuhan Open University Wuhan China Guangdong University of Technology China
Due to the optical properties of glass materials, most glass appears transparent in RGB images. However, in depth images, different acquisition methods make glass visible. Therefore, Therefore, using RGB-D dual-channe... 详细信息
来源: 评论