咨询与建议

限定检索结果

文献类型

  • 894 篇 会议
  • 572 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,467 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 997 篇 工学
    • 676 篇 计算机科学与技术...
    • 594 篇 软件工程
    • 212 篇 信息与通信工程
    • 159 篇 控制科学与工程
    • 108 篇 生物工程
    • 107 篇 电气工程
    • 102 篇 机械工程
    • 73 篇 生物医学工程(可授...
    • 68 篇 电子科学与技术(可...
    • 66 篇 光学工程
    • 52 篇 化学工程与技术
    • 40 篇 安全科学与工程
    • 30 篇 动力工程及工程热...
    • 29 篇 土木工程
    • 28 篇 仪器科学与技术
    • 28 篇 建筑学
    • 28 篇 交通运输工程
    • 23 篇 材料科学与工程(可...
  • 494 篇 理学
    • 273 篇 数学
    • 111 篇 生物学
    • 101 篇 物理学
    • 79 篇 统计学(可授理学、...
    • 75 篇 系统科学
    • 51 篇 化学
  • 284 篇 管理学
    • 153 篇 管理科学与工程(可...
    • 146 篇 图书情报与档案管...
    • 61 篇 工商管理
  • 44 篇 法学
    • 39 篇 社会学
  • 43 篇 医学
    • 38 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 22 篇 经济学
  • 17 篇 教育学
  • 11 篇 农学
  • 3 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 54 篇 training
  • 38 篇 semantics
  • 34 篇 feature extracti...
  • 29 篇 computational mo...
  • 27 篇 data mining
  • 26 篇 deep learning
  • 26 篇 neural networks
  • 25 篇 laboratories
  • 24 篇 convolution
  • 21 篇 optimization
  • 21 篇 wireless sensor ...
  • 21 篇 accuracy
  • 20 篇 computer science
  • 19 篇 robustness
  • 18 篇 reinforcement le...
  • 18 篇 machine learning
  • 18 篇 data models
  • 16 篇 image segmentati...
  • 16 篇 software enginee...
  • 15 篇 conferences

机构

  • 69 篇 college of compu...
  • 56 篇 beijing key labo...
  • 51 篇 school of softwa...
  • 48 篇 school of electr...
  • 37 篇 beijing key labo...
  • 36 篇 guangdong key la...
  • 35 篇 key laboratory o...
  • 35 篇 national enginee...
  • 31 篇 state key labora...
  • 29 篇 guangdong provin...
  • 23 篇 school of comput...
  • 22 篇 seventh research...
  • 21 篇 shenzhen institu...
  • 19 篇 school of inform...
  • 19 篇 university of ch...
  • 18 篇 peng cheng labor...
  • 16 篇 beijing key labo...
  • 15 篇 computer vision ...
  • 14 篇 beijing key labo...
  • 14 篇 guangdong key la...

作者

  • 78 篇 junping du
  • 52 篇 shen linlin
  • 51 篇 yingmin jia
  • 30 篇 fashan yu
  • 25 篇 du junping
  • 18 篇 huadong ma
  • 17 篇 jia yingmin
  • 16 篇 linlin shen
  • 15 篇 wu qingyao
  • 15 篇 xie weicheng
  • 14 篇 yin baocai
  • 14 篇 cai yi
  • 13 篇 gao can
  • 13 篇 yu fashan
  • 12 篇 liang liu
  • 12 篇 wang jinbao
  • 11 篇 deyuan meng
  • 11 篇 zhang qiang
  • 11 篇 xi zhang
  • 11 篇 dou wanchun

语言

  • 1,339 篇 英文
  • 100 篇 其他
  • 30 篇 中文
  • 1 篇 西班牙文
检索条件"机构=Intelligent Software and Software Engineering Laboratory"
1467 条 记 录,以下是361-370 订阅
排序:
Label Correlation Guided Feature Selection for Multi-label Learning  9th
Label Correlation Guided Feature Selection for Multi-label ...
收藏 引用
19th International Conference on Advanced Data Mining and Applications, ADMA 2023
作者: Zhang, Kai Liang, Wei Cao, Peng Yang, Jinzhu Li, Weiping Zaiane, Osmar R. Computer Science and Engineering Northeastern University Shenyang China Key Laboratory of Intelligent Computing in Medical Image of Ministry of Education Northeastern University Shenyang China National Frontiers Science Center for Industrial Intelligence and Systems Optimization Shenyang110819 China School of Software and Microelectronics Peking University Beijing China Alberta Machine Intelligence Institute University of Alberta EdmontonAB Canada
Multi-label learning has received much attention due to its wide range of application domains. Multi-label data often has high-dimensional features, which brings more challenges to classification algorithms. Feature s... 详细信息
来源: 评论
Identification Algorithm Framework and Structural model on Input Pattern of Metamorphic Relations  9
Identification Algorithm Framework and Structural model on I...
收藏 引用
9th International Conference on Dependable Systems and Their Applications, DSA 2022
作者: Yan, Shiyu Yang, Xiaohua Lu, Zhongjian Li, Meng Gong, Helin Liu, Jie Computer School University of South China Hunan Hengyang China Intelligent Equipment Software Evaluation Engineering Technology Research Center of Hunan Hengyang China Cnnc Key Laboratory on High Trusted Computing Hunan Hengyang China Nuclear Power Institute of China Science and Technology on Reactor System Design Technology Laboratory Chengdu China
Metamorphic Relation (MR) plays a crucial role in Metamorphic Testing (MT), which can be regarded as the implication relation from the input pattern to the output pattern. Based on MR's properties, the identificat... 详细信息
来源: 评论
Evading Detection Actively: Toward Anti-Forensics against Forgery Localization
arXiv
收藏 引用
arXiv 2023年
作者: Zhuo, Long Luo, Shenghai Tan, Shunquan Chen, Han Li, Bin Huang, Jiwu The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen Institute of Artificial Intelligence and Robotics for Society China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
Anti-forensics seeks to eliminate or conceal traces of tampering artifacts. Typically, anti-forensic methods are designed to deceive binary detectors and persuade them to misjudge the authenticity of an image. However... 详细信息
来源: 评论
Which One is Better? Self-supervised Temporal Coherence Learning for Skeleton Based Action Recognition
Which One is Better? Self-supervised Temporal Coherence Lear...
收藏 引用
IEEE International Joint Conference on Biometrics (IJCB)
作者: Bizhu Wu Mingyan Wu Haoqin Ji Linlin Shen Computer Vision Institute College of Computer Science and Software Engineering Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University China
Recently, researchers have achieved significant results in the skeleton based action recognition task. To better model the skeleton sequences, existing methods learned the feature representations in the self-supervise... 详细信息
来源: 评论
Encoding Temporal Change of Longitudinal EBV DNA for Dynamic Risk Prediction of Nasopharyngeal Carcinoma  7
Encoding Temporal Change of Longitudinal EBV DNA for Dynamic...
收藏 引用
7th International Conference on Biological Information and Biomedical engineering, BIBE 2024
作者: Yang, Fangfang Zhen, Zicheng Lin, Li Liu, Yuyu Gao, Rui Zhang, Taoyu Lu, Lijun Lv, Wenbing School of Information Yunnan University Yunnan Kunming650504 China Yunnan Key Laboratory of Intelligent Systems and Computing Yunnan University Yunnan Kunming650504 China Department of Radiation Oncology Sun Yat-sen University Cancer Center State Key Laboratory of Oncology in South China Collaborative Innovation Center for Cancer Medicine Guangdong Key Laboratory of Nasopharyngeal Carcinoma Diagnosis and Therapy Guangzhou510060 China School of Software Yunnan University Yunnan Kunming650504 China School of Biomedical Engineering Southern Medical University 1023 Shatai Road Guangzhou510515 China
—To accurately predict the risk of recurrence and metastasis of nasopharyngeal carcinoma (NPC) patients, an image-encoded risk prediction model was proposed. 752 patients (training vs. testing: 527 vs. 225) were retr... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
Multi-scale Attention-Based Feature Pyramid Networks for Object Detection  11th
Multi-scale Attention-Based Feature Pyramid Networks for Obj...
收藏 引用
11th International Conference on Image and Graphics, ICIG 2021
作者: Zhao, Xiaodong Chen, Junliang Liu, Minmin Ye, Kai Shen, Linlin Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China
Feature pyramid network (FPN) is widely used for multi-scale object detection. While lots of FPN based methods have been proposed to improve detection performance, there exists semantic difference between cross-scale ... 详细信息
来源: 评论
Meta Computing-Driven Optimization of AoI in Industrial IoT: A Hybrid Scheme with Self-Organizing Maps and Reinforcement Learning
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Min Wang, Yike Wang, Nuanlai Pang, Shanchen Sun, Xiaobing Li, Ming Yangzhou University School of Information Engineering Yangzhou225127 China College of Computer Science and Technology Qingdao China College of Computer Science and Technology China State Key Laboratory of Chemical Safety Shandong Key Laboratory of Intelligent Oil and Gas Industrial Software China Shandong Inspur Database Technology Co. Ltd Jinan250101 China
In the domain of Industrial Internet of Things (IIoT) applications, methodologies such as meta computing are essential for ensuring timely and efficient data acquisition within intricate environments characterized by ... 详细信息
来源: 评论
A Fine-Grained Anomaly Detection Method Fusing Isolation Forest and Knowledge Graph Reasoning  19th
A Fine-Grained Anomaly Detection Method Fusing Isolation For...
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Xu, Jie Zhou, Jiantao College of Computer Science Engineering Research Center of Ecological Big Data Ministry of Education National and Local Joint Engineering Research Center of Mongolian Intelligent Information Processing Technology Inner Mongolia Cloud Computing and Service Software Engineering Laboratory Inner Mongolia Social Computing and Data Processing Key Laboratory Inner Mongolia Discipline Inspection and Supervision Big Data Key Laboratory Inner Mongolia Big Data Analysis Technology Engineering Laboratory Inner Mongolia University Hohhot China
Anomaly detection aims to find outliers data that do not conform to expected behaviors in a specific scenario, which is indispensable and critical in current safety environments related studies. However, when performi... 详细信息
来源: 评论
Multi-granularity Textual Adversarial Attack with Behavior Cloning
Multi-granularity Textual Adversarial Attack with Behavior C...
收藏 引用
2021 Conference on Empirical Methods in Natural Language Processing, EMNLP 2021
作者: Chen, Yangyi Su, Jin Wei, Wei Cognitive Computing and Intelligent Information Processing Laboratory School of Computer Science and Technology Huazhong University of Science and Tehchnology China School of Software Engineering Huazhong University of Science and Tehchnology China
Recently, the textual adversarial attack models become increasingly popular due to their successful in estimating the robustness of NLP models. However, existing works have obvious deficiencies. (1) They usually consi... 详细信息
来源: 评论