咨询与建议

限定检索结果

文献类型

  • 183 篇 期刊文献
  • 143 篇 会议

馆藏范围

  • 326 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 215 篇 工学
    • 84 篇 信息与通信工程
    • 83 篇 计算机科学与技术...
    • 62 篇 软件工程
    • 61 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 26 篇 控制科学与工程
    • 24 篇 仪器科学与技术
    • 24 篇 电气工程
    • 18 篇 机械工程
    • 17 篇 生物工程
    • 15 篇 网络空间安全
    • 14 篇 材料科学与工程(可...
    • 12 篇 化学工程与技术
    • 7 篇 生物医学工程(可授...
    • 6 篇 动力工程及工程热...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
  • 131 篇 理学
    • 73 篇 物理学
    • 42 篇 数学
    • 21 篇 统计学(可授理学、...
    • 17 篇 生物学
    • 15 篇 化学
    • 12 篇 系统科学
  • 31 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 11 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 12 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 7 篇 法学
    • 6 篇 社会学
  • 2 篇 经济学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 quantum cryptogr...
  • 8 篇 wireless communi...
  • 7 篇 image enhancemen...
  • 7 篇 machine learning
  • 7 篇 channel estimati...
  • 6 篇 resource managem...
  • 6 篇 security
  • 6 篇 network-on-chip
  • 5 篇 simulation
  • 5 篇 three-dimensiona...
  • 5 篇 computer archite...
  • 5 篇 peak to average ...
  • 5 篇 wireless sensor ...
  • 5 篇 ofdm
  • 5 篇 satellites
  • 5 篇 training
  • 4 篇 deep neural netw...
  • 4 篇 knowledge graph
  • 4 篇 atoms
  • 4 篇 topology

机构

  • 18 篇 school of cyber ...
  • 16 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 15 篇 school of inform...
  • 14 篇 school of comput...
  • 14 篇 services computi...
  • 13 篇 institute of qua...
  • 13 篇 purple mountain ...
  • 13 篇 cluster and grid...
  • 12 篇 key lab of broad...
  • 11 篇 school of softwa...
  • 9 篇 key lab of optic...
  • 8 篇 national mobile ...
  • 8 篇 cas key laborato...
  • 7 篇 university of sc...
  • 7 篇 national mobile ...
  • 6 篇 china academy of...
  • 6 篇 hefei university...
  • 6 篇 science and tech...

作者

  • 12 篇 timofte radu
  • 12 篇 hu shengshan
  • 12 篇 zhang leo yu
  • 11 篇 zhou heng
  • 9 篇 jin hai
  • 8 篇 guo guang-can
  • 8 篇 qiu kun
  • 8 篇 zhou ziqi
  • 8 篇 guy gogniat
  • 8 篇 li minghui
  • 7 篇 guang-can guo
  • 7 篇 wan wei
  • 7 篇 marius strum
  • 6 篇 ricardo pires
  • 6 篇 zhang zhao
  • 6 篇 huang jie
  • 6 篇 qin wang
  • 6 篇 lei lei
  • 6 篇 wang cheng-xiang
  • 6 篇 geng yong

语言

  • 311 篇 英文
  • 12 篇 其他
  • 3 篇 中文
检索条件"机构=Information and Communication Science and Technology Laboratory Laboratory Lab-STICC"
326 条 记 录,以下是81-90 订阅
排序:
Understanding the Robustness of 3D Object Detection with Bird'View Representations in Autonomous Driving
Understanding the Robustness of 3D Object Detection with Bir...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Zijian Zhu Yichi Zhang Hai Chen Yinpeng Dong Shu Zhao Wenbo Ding Jiachen Zhong Shibao Zheng Institute of Image Communication and Network Engineering Shanghai Jiao Tong University Dept. of Comp. Sci. and Tech. THBI Lab Institute for AI Tsinghua University BNRist Center Zhongguancun Laboratory Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Information Materials and Intelligent Sensing Laboratory of Anhui Province School of Computer Science and Technology Anhui University SAIC Motor AI Lab
3D object detection is an essential perception task in autonomous driving to understand the environments. The Bird's-Eye-View (BEV) representations have significantly improved the performance of 3D detectors with ...
来源: 评论
NTIRE 2023 Image Shadow Removal Challenge Report
NTIRE 2023 Image Shadow Removal Challenge Report
收藏 引用
2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Vasluianu, Florin-Alexandru Seizinger, Tim Timofte, Radu Cui, Shuhao Huang, Junshi Tian, Shuman Fan, Mingyuan Zhang, Jiaqi Zhu, Li Wei, Xiaoming Wei, Xiaolin Luo, Ziwei Gustafsson, Fredrik K. Zhao, Zheng Sjölund, Jens Schön, Thomas B. Dong, Xiaoyi Zhang, Xi Sheryl Li, Chenghua Leng, Cong Yeo, Woon-Ha Oh, Wang-Taek Lee, Yeo-Reum Ryu, Han-Cheol Luo, Jinting Jiang, Chengzhi Han, Mingyan Wu, Qi Lin, Wenjie Yu, Lei Li, Xinpeng Jiang, Ting Fan, Haoqiang Liu, Shuaicheng Xu, Shuning Song, Binbin Chen, Xiangyu Zhang, Shile Zhou, Jiantao Zhang, Zhao Zhao, Suiyi Zheng, Huan Gao, Yangcheng Wei, Yanyan Wang, Bo Ren, Jiahuan Luo, Yan Kondo, Yuki Miyata, Riku Yasue, Fuma Naruki, Taito Ukita, Norimichi Chang, Hua-En Yang, Hao-Hsiang Chen, Yi-Chung Chiang, Yuan-Chun Huang, Zhi-Kai Chen, Wei-Ting Chen, I-Hsiang Hsieh, Chia-Hsuan Kuo, Sy-Yen Xianwei, Li Fu, Huiyuan Liu, Chunlin Ma, Huadong Fu, Binglan He, Huiming Wang, Mengjia She, Wenxuan Liu, Yu Nathan, Sabari Kansal, Priya Zhang, Zhongjian Yang, Huabin Wang, Yan Zhang, Yanru Phutke, Shruti S. Kulkarni, Ashutosh Khan, Md Raqib Murala, Subrahmanyam Vipparthi, Santosh Kumar Ye, Heng Liu, Zixi Yang, Xingyi Liu, Songhua Wu, Yinwei Jing, Yongcheng Yu, Qianhao Zheng, Naishan Huang, Jie Long, Yuhang Yao, Mingde Zhao, Feng Zhao, Bowen Ye, Nan Shen, Ning Cao, Yanpeng Xiong, Tong Xia, Weiran Li, Dingwen Xia, Shuchen Computer Vision Lab Ifi Caidas University of Würzburg Germany Computer Vision Lab Eth Zürich Switzerland Meituan Group China Department of Information Technology Uppsala University Sweden Institute of Automation Chinese Academy of Sciences Beijing China Nanjing China Maicro Nanjing China Department of Artificial Intelligence Convergence Sahmyook University Seoul Korea Republic of Megvii Technology China University of Electronic Science and Technology of China China University of Macau China China Toyota Technological Institute Japan Graduate Institute of Electronics Engineering National Taiwan University Taiwan Department of Electrical Engineering National Taiwan University Taiwan Graduate Institute of Communication Engineering National Taiwan University Taiwan ServiceNow United States Beijing University of Post and Teleconmunication Beijing China Key Laboratory of Intelligent Perception and Image Understanding of Ministry of Education China Couger Inc. Computer Vision and Pattern Recognition Lab Indian Institute of Technology Ropar Punjab Rupnagar India Research Institute Singapore National University of Singapore Singapore Research Institute Singapore University of Sydney Australia Brain-Inspired Vision Laboratory Information Science and Technology Institution University of Science and Technology of China China State Key Laboratory of Fluid Power and Mechatronic Systems School of Mechanical Engineering Zhejiang University Hangzhou310027 China Key Laboratory of Advanced Manufacturing Technology of Zhejiang Province School of Mechanical Engineering Zhejiang University Hangzhou310027 China South China University of Technology China
This work reviews the results of the NTIRE 2023 Challenge on Image Shadow Removal. The described set of solutions were proposed for a novel dataset, which captures a wide range of object-light interactions. It consist... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
A Method of Shadowsocks(R) Traffic Identification Based on Protocol Analysis  21
A Method of Shadowsocks(R) Traffic Identification Based on P...
收藏 引用
21st IEEE International Conference on communication technology, ICCT 2021
作者: Luo, Jie Bao, Liang Ni, Lvlin The 30th Research Institute of China Electronics Technology Group Corporation Science and Technology on Communication Security Laboratory Sichuan Chengdu China The Third Research Institute of Ministry of Public Security Key Lab of Information Network Security of Ministry of Public Security Shanghai China
Shadowsocks (R) is a proxy software based on Socks5, which is the collective name of Shadowsocks and Shadowsocks (R). In order to improves the shortcomings of other softwares breaking internet censorship, Shadowsocks ... 详细信息
来源: 评论
Characterizing Kerr Optical Frequency Combs Using Quantum Interference
Characterizing Kerr Optical Frequency Combs Using Quantum In...
收藏 引用
Asia communications and Photonics Conference and Exhibition (ACP)
作者: Jin Guo Yun-Ru Fan Yong Geng Guang-Wei Deng Hai-Zhi Song You Wang Li-Xing You Zhen Wang Heng Zhou Kun Qiu Guang-Can Guo Qiang Zhou Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of China Chengdu China Key Lab of Optical Fiber Sensing and Communication Networks University of Electronic Science and Technology of China Chengdu China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of China Southwest Institute of Technical Physics Chengdu China Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai China CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei China
For the first time, we characterize the properties of Kerr optical frequency combs using quantum optics. The temporal FWHM of single soliton state is obtained as $\boldsymbol{109.8\pm 6.5}$ fs within the Fourier tra...
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
GBR: Generative Bundle Refinement for High-fidelity Gaussian Splatting and Meshing
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Jianing Zheng, Yuchao Li, Ziwei Dai, Qionghai Yuan, Xiaoyun The School of Information Science and Technology Fudan University Shanghai200433 China The School of Biomedical Engineering Tsinghua University Beijing100084 China The Key Laboratory for Information Science of Electromagnetic Waves MoE Department of Communication Science and Engineering Fudan University Shanghai200433 China The Department of Automation Tsinghua University Beijing100084 China The MoE Key Lab of Artificial Intelligence AI Institute Shanghai Jiao Tong University Shanghai200240 China
Gaussian splatting has gained attention for its efficient representation and rendering of 3D scenes using continuous Gaussian primitives. However, it struggles with sparse-view inputs due to limited geometric and phot... 详细信息
来源: 评论
A Deep Exploration of BitLocker Encryption and Security Analysis  20
A Deep Exploration of BitLocker Encryption and Security Anal...
收藏 引用
20th IEEE International Conference on communication technology, ICCT 2020
作者: Tan, Cheng Zhang, Lijun Bao, Liang Science and Technology on Communication Security Laboratory Chengdu China Security Ministry of Public Security Key Lab of Information Network Shanghai China
Due to the popularity of Windows system, BitLocker is widely used as a built-in disk encryption tool. As a commercial application, the design of BitLocker has to consider a capability of disaster recovery, which helps... 详细信息
来源: 评论
Generation of tunable high-order Laguerre– Gaussian petal-like modes from a mid-infrared optical vortex parametric oscillator
收藏 引用
Advanced Photonics Nexus 2024年 第3期3卷 113-119页
作者: Yuxia Zhou Xining Yang Jianqiang Ye Yuanyuan Ma Ying Wan Jianxiang Wen Taximaiti Yusufu Xinjiang Normal University School of Chemistry and Chemical EngineeringUrumqiChina Xinjiang Normal University School of Physics and Electronic EngineeringXinjiang Key Laboratory for Luminescence Minerals and Optical Functional MaterialsUrumqiChina Chiba University Graduate School of EngineeringChibaJapan Nanjing University of Information Science and Technology School of Physics and Optoelectronic EngineeringJiangsu Key Laboratory for Optoelectronic Detection of Atmosphere and OceanNanjingChina Shanghai University School of Communication and Information EngineeringKey Lab of Specialty Fiber Optics and Optical Access NetworksShanghaiChina
High-order Laguerre–Gaussian(LG)petal-like beams have become a topic of significant interest due to their potential application in next-generation optical trapping,quantum optics,and materials processing *** this wor... 详细信息
来源: 评论