咨询与建议

限定检索结果

文献类型

  • 898 篇 会议
  • 578 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,477 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 993 篇 工学
    • 672 篇 计算机科学与技术...
    • 587 篇 软件工程
    • 211 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 108 篇 生物工程
    • 102 篇 电气工程
    • 100 篇 机械工程
    • 72 篇 生物医学工程(可授...
    • 70 篇 光学工程
    • 67 篇 电子科学与技术(可...
    • 52 篇 化学工程与技术
    • 39 篇 安全科学与工程
    • 31 篇 动力工程及工程热...
    • 28 篇 仪器科学与技术
    • 28 篇 土木工程
    • 28 篇 交通运输工程
    • 27 篇 建筑学
    • 23 篇 材料科学与工程(可...
  • 499 篇 理学
    • 277 篇 数学
    • 111 篇 生物学
    • 105 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 76 篇 系统科学
    • 51 篇 化学
  • 279 篇 管理学
    • 151 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 61 篇 工商管理
  • 44 篇 法学
    • 39 篇 社会学
  • 43 篇 医学
    • 38 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 22 篇 经济学
  • 17 篇 教育学
  • 11 篇 农学
  • 3 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 52 篇 training
  • 36 篇 semantics
  • 35 篇 feature extracti...
  • 29 篇 computational mo...
  • 27 篇 data mining
  • 26 篇 deep learning
  • 25 篇 neural networks
  • 25 篇 laboratories
  • 24 篇 convolution
  • 22 篇 accuracy
  • 21 篇 optimization
  • 21 篇 wireless sensor ...
  • 20 篇 computer science
  • 19 篇 machine learning
  • 19 篇 data models
  • 19 篇 robustness
  • 17 篇 reinforcement le...
  • 17 篇 software enginee...
  • 15 篇 conferences
  • 15 篇 image segmentati...

机构

  • 70 篇 college of compu...
  • 56 篇 beijing key labo...
  • 53 篇 school of softwa...
  • 48 篇 school of electr...
  • 37 篇 beijing key labo...
  • 36 篇 guangdong key la...
  • 35 篇 key laboratory o...
  • 35 篇 national enginee...
  • 33 篇 state key labora...
  • 29 篇 guangdong provin...
  • 23 篇 school of comput...
  • 22 篇 shenzhen institu...
  • 22 篇 seventh research...
  • 19 篇 school of inform...
  • 19 篇 university of ch...
  • 18 篇 peng cheng labor...
  • 15 篇 guangdong key la...
  • 15 篇 beijing key labo...
  • 15 篇 computer vision ...
  • 14 篇 beijing key labo...

作者

  • 78 篇 junping du
  • 53 篇 shen linlin
  • 51 篇 yingmin jia
  • 30 篇 fashan yu
  • 25 篇 du junping
  • 17 篇 jia yingmin
  • 17 篇 huadong ma
  • 16 篇 linlin shen
  • 15 篇 wu qingyao
  • 15 篇 xie weicheng
  • 14 篇 yin baocai
  • 14 篇 cai yi
  • 13 篇 gao can
  • 13 篇 yu fashan
  • 12 篇 liang liu
  • 12 篇 wang jinbao
  • 12 篇 zhang qiang
  • 11 篇 deyuan meng
  • 11 篇 xi zhang
  • 11 篇 dou wanchun

语言

  • 1,283 篇 英文
  • 168 篇 其他
  • 34 篇 中文
  • 1 篇 西班牙文
检索条件"机构=Intelligent Software and Software Engineering Laboratory"
1477 条 记 录,以下是491-500 订阅
排序:
Dynamic Random Route Mutation Mechanism for Moving Target Defense in SDN  6
Dynamic Random Route Mutation Mechanism for Moving Target De...
收藏 引用
6th International Symposium on Computer and Information Processing Technology, ISCIPT 2021
作者: Zhang, Bofeng Han, Li Sun, Shimin Tianjin University of Technology School of Computer Science and Engineering Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China Tiangong University Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Computer Science and Technology Tianjin China
Moving Target Defense (MTD) is commonly used in changing the asymmetric situation between attack and defense in cyberspace. Route mutation is a vital branch of MTD. Current route mutation methods still have some limit... 详细信息
来源: 评论
Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
收藏 引用
China Communications 2024年 第3期21卷 149-159页
作者: Zhang Lejun Peng Minghui Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin Cyberspace Institute Advanced Technology Guangzhou UniversityGuangzhou 510006China College of Information Engineering Yangzhou UniversityYangzhou 225127China School Math&Computer Science Quanzhou Normal UniversityQuanzhou 362000China Computer Science Department City University of Hong KongHong Kong 999077China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 21004China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and TechnologyAnhui UniversityHefei 230601China Department of Computer Science and Artificial Intelligence Wenzhou UniversityWenzhou 325035China Guangzhou University Library Guangzhou UniversityGuangzhou 510006China Central Economic and Mathematics Institute Russian Academy of Sciences MIREA-Russian Technological University Moscow RegionRussia
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers ... 详细信息
来源: 评论
MLFuse: Multi-Scenario Feature Joint Learning for Multi-Modality Image Fusion
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Lei, Jia Li, Jiawei Liu, Jinyuan Wang, Bin Zhou, Shihua Zhang, Qiang Wei, Xiaopeng Kasabov, Nikola K. Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian116622 China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China Dalian University of Technology School of Mechanical Engineering Dalian116024 China Dalian University of Technology School of Computer Science and Technology Dalian116024 China Auckland University of Technology Knowledge Engineering and Discovery Research Institute Auckland1010 New Zealand Ulster University Intelligent Systems Research Center LondonderryBT52 1SA United Kingdom
Multi-modality image fusion (MMIF) entails synthesizing images with detailed textures and prominent objects. Existing methods tend to use general feature extraction to handle different fusion tasks. However, these met... 详细信息
来源: 评论
Uncovering the Unseen: Discover Hidden Intentions by Micro-Behavior Graph Reasoning
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Zhuo Liu, Wenxuan Xu, Danni Wang, Zheng Zhao, Jian School of Computer Science Wuhan University Wuhan China School of Computing National University of Singapore Singapore National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Intelligent Game and Decision Laboratory Beijing China
This paper introduces a new and challenging Hidden Intention Discovery (HID) task. Unlike existing intention recognition tasks, which are based on obvious visual representations to identify common intentions for norma... 详细信息
来源: 评论
Anomize: Better Open Vocabulary Video Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Li, Fei Liu, Wenxuan Chen, Jingjing Zhang, Ruixu Wang, Yuran Zhong, Xian Wang, Zheng National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University China State Key Laboratory for Multimedia Information Processing School of Computer Science Peking University China Hubei Key Laboratory of Transportation Internet of Things Wuhan University of Technology China
Open Vocabulary Video Anomaly Detection (OVVAD) seeks to detect and classify both base and novel anomalies. However, existing methods face two specific challenges related to novel anomalies. The first challenge is det...
来源: 评论
Context-aware Bug Reproduction for Mobile Apps
Context-aware Bug Reproduction for Mobile Apps
收藏 引用
International Conference on software engineering (ICSE)
作者: Yuchao Huang Junjie Wang Zhe Liu Song Wang Chunyang Chen Mingyang Li Qing Wang Science and Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences Beijing China State Key Laboratory of Intelligent Game Beijing China University of Chinese Academy of Sciences Beijing China Electrical Engineering and Computer Science York University Canada Monash University Melbourne Australia
Bug reports are vital for software maintenance that allow the developers being informed of the problems encountered in the software. Before bug fixing, developers need to reproduce the bugs which is an extremely time-...
来源: 评论
WMAJL: Watcher-Mediated Attention Joint Learning Model for Multimodal Relation Extraction
WMAJL: Watcher-Mediated Attention Joint Learning Model for M...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yunrui Dong Guiduo Duan Tianxi Huang Yunhao Li School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Laboratory of Intelligent Collaborative Computing University of Electronic Science and Technology of China Chengdu China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu China Chengdu Textile College College of Humanities and General Education Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
In the domain of Multimodal Relation Extraction (MRE), we present the $\color{Red}{\text{W}}$atcher-$\color{Red}{\text{M}}$ediated $\color{Red}{\text{A}}$ttention $\color{Red}{\text{J}}$oint $\color{Red}{\text{L}}$ear... 详细信息
来源: 评论
Detecting Adversarial Data by Probing Multiple Perturbations Using Expected Perturbation Score
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Shuhai Liu, Feng Yang, Jiahao Yang, Yifan Li, Changsheng Han, Bo Tan, Mingkui School of Software Engineering South China University of Technology China Pazhou Laboratory China The University of Melbourne Australia Beijing Institute of Technology Beijing China Department of Computer Science Hong Kong Baptist University Hong Kong Key Laboratory of Big Data and Intelligent Robot Ministry of Education China
Adversarial detection aims to determine whether a given sample is an adversarial one based on the discrepancy between natural and adversarial distributions. Unfortunately, estimating or comparing two data distribution... 详细信息
来源: 评论
Deep Feature Surgery: Towards Accurate and Efficient Multi-Exit Networks
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Cheng Chen, Yao Luo, Qiuyang Lu, Ye Li, Tao Zhang, Yuzhi Sun, Yufei Zhang, Le College of Software Nankai University China College of Computer Science Nankai University China National University of Singapore Singapore School of Information and Communication Engineering University of Electronic Science and Technology of China China HAIHE Lab of ITAI China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education
Multi-exit network is a promising architecture for efficient model inference by sharing backbone networks and weights among multiple exits. However, the gradient conflict of the shared weights results in sub-optimal a... 详细信息
来源: 评论
Robust Adversarial Defenses in Federated Learning: Exploring the Impact of Data Heterogeneity
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 6005-6018页
作者: Li, Qian Wu, Di Zhou, Dawei Lin, Chenhao Liu, Shuai Wang, Cong Shen, Chao Xi’an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an 710049 China Xi’an Jiaotong University School of Computer Science and Technology Xi’an 710049 China Xidian University Xi’an 710071 China Xi’an Jiaotong University School of Software Xi’an 710049 China City University of Hong Kong Department of Computer Science Hong Kong
Federated Learning (FL) enables geographically distributed clients to collaboratively train machine learning models by exchanging local model parameters while preserving data privacy. In practice, FL faces two critica... 详细信息
来源: 评论