咨询与建议

限定检索结果

文献类型

  • 898 篇 会议
  • 578 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,477 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 993 篇 工学
    • 672 篇 计算机科学与技术...
    • 587 篇 软件工程
    • 211 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 108 篇 生物工程
    • 102 篇 电气工程
    • 100 篇 机械工程
    • 72 篇 生物医学工程(可授...
    • 70 篇 光学工程
    • 67 篇 电子科学与技术(可...
    • 52 篇 化学工程与技术
    • 39 篇 安全科学与工程
    • 31 篇 动力工程及工程热...
    • 28 篇 仪器科学与技术
    • 28 篇 土木工程
    • 28 篇 交通运输工程
    • 27 篇 建筑学
    • 23 篇 材料科学与工程(可...
  • 499 篇 理学
    • 277 篇 数学
    • 111 篇 生物学
    • 105 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 76 篇 系统科学
    • 51 篇 化学
  • 279 篇 管理学
    • 151 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 61 篇 工商管理
  • 44 篇 法学
    • 39 篇 社会学
  • 43 篇 医学
    • 38 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 22 篇 经济学
  • 17 篇 教育学
  • 11 篇 农学
  • 3 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 52 篇 training
  • 36 篇 semantics
  • 35 篇 feature extracti...
  • 29 篇 computational mo...
  • 27 篇 data mining
  • 26 篇 deep learning
  • 25 篇 neural networks
  • 25 篇 laboratories
  • 24 篇 convolution
  • 22 篇 accuracy
  • 21 篇 optimization
  • 21 篇 wireless sensor ...
  • 20 篇 computer science
  • 19 篇 machine learning
  • 19 篇 data models
  • 19 篇 robustness
  • 17 篇 reinforcement le...
  • 17 篇 software enginee...
  • 15 篇 conferences
  • 15 篇 image segmentati...

机构

  • 70 篇 college of compu...
  • 56 篇 beijing key labo...
  • 53 篇 school of softwa...
  • 48 篇 school of electr...
  • 37 篇 beijing key labo...
  • 36 篇 guangdong key la...
  • 35 篇 key laboratory o...
  • 35 篇 national enginee...
  • 33 篇 state key labora...
  • 29 篇 guangdong provin...
  • 23 篇 school of comput...
  • 22 篇 shenzhen institu...
  • 22 篇 seventh research...
  • 19 篇 school of inform...
  • 19 篇 university of ch...
  • 18 篇 peng cheng labor...
  • 15 篇 guangdong key la...
  • 15 篇 beijing key labo...
  • 15 篇 computer vision ...
  • 14 篇 beijing key labo...

作者

  • 78 篇 junping du
  • 53 篇 shen linlin
  • 51 篇 yingmin jia
  • 30 篇 fashan yu
  • 25 篇 du junping
  • 17 篇 jia yingmin
  • 17 篇 huadong ma
  • 16 篇 linlin shen
  • 15 篇 wu qingyao
  • 15 篇 xie weicheng
  • 14 篇 yin baocai
  • 14 篇 cai yi
  • 13 篇 gao can
  • 13 篇 yu fashan
  • 12 篇 liang liu
  • 12 篇 wang jinbao
  • 12 篇 zhang qiang
  • 11 篇 deyuan meng
  • 11 篇 xi zhang
  • 11 篇 dou wanchun

语言

  • 1,283 篇 英文
  • 168 篇 其他
  • 34 篇 中文
  • 1 篇 西班牙文
检索条件"机构=Intelligent Software and Software Engineering Laboratory"
1477 条 记 录,以下是631-640 订阅
排序:
Low-Light Enhancement Effect on Classification and Detection: An Empirical Study
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Xu Lai, Zhihui Jie, Zhou Gao, Can Hou, Xianxu Zhang, Ya-Nan Shen, Linlin The Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518060 China
Low-light images are commonly encountered in real-world scenarios, and numerous low-light image enhancement (LLIE) methods have been proposed to improve the visibility of these images. The primary goal of LLIE is to g... 详细信息
来源: 评论
Towards Privacy-Preserving Aggregated Prediction from SPDZ  3rd
Towards Privacy-Preserving Aggregated Prediction from SPDZ
收藏 引用
3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020
作者: Zhao, Qi Zhang, Bo Yan, Anli Jing, Shan Zhao, Chuan School of Information Science and Engineering University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Network-Based Intelligent Computing University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Software Engineering Jinan China
Machine learning models trained on data collected from multiple parties can offer prediction services to clients. However, it raises privacy concerns for both model owners and clients. The models may disclose the deta... 详细信息
来源: 评论
An Adaptive Decision-Making Approach for Better Selection of Blockchain Platform for Health Insurance Frauds Detection with Smart Contracts: Development and Performance Evaluation
收藏 引用
Procedia Computer Science 2023年 220卷 470-477页
作者: Rima Kaafarani Leila Ismail Oussama Zahwe ICCS-Lab Computer Science Department American University of Culture and Education 1507 Beirut Lebanon Cloud Computing and Distributed Systems (CLOUDS) Laboratory School of Computing and Information Systems The University of Melbourne Melbourne Australia Intelligent Distributed Computing and Systems (INDUCE) Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University Abu Dhabi United Arab Emirates National Water and Energy Center United Arab Emirates University Abu Dhabi United Arab Emirates
Blockchain technology has piqued the interest of businesses of all types, while consistently improving and adapting to business requirements. Several blockchain platforms have emerged, making it challenging to select ... 详细信息
来源: 评论
Generative Adversarial Learning for Trusted and Secure Clustering in Industrial Wireless Sensor Networks
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Liu Yang, Simon X. Li, Yun Lu, Yinzhi Guo, Tan The School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China The School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China The Advanced Robotics and Intelligent Systems Laboratory School of Engineering University of Guelph GuelphONN1G2W1 Canada
Traditional machine learning techniques have been widely used to establish the trust management systems. However, the scale of training dataset can significantly affect the security performances of the systems, while ... 详细信息
来源: 评论
Improving Critical Node Detection Using Neural Network-based Initialization in a Genetic Algorithm
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Chanjuan Ge, Shike Chen, Zhihan Pei, Wenbin Zhu, Enqiang Mei, Yi Ishibuchi, Hisao The School of Computer Science and Technology Dalian University of Technology 116024 China The Institute of Software Chinese Academy of Science Beijing100190 China The Institute of Computing Science and Technology Guangzhou University Guangzhou510006 China The School of Engineering and Computer Science Victoria University of Wellington Wellington6012 New Zealand The Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent Computation Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China
The Critical Node Problem (CNP) is concerned with identifying the critical nodes in a complex network. These nodes play a significant role in maintaining the connectivity of the network, and removing them can negative... 详细信息
来源: 评论
SGNet: Salient Geometric Network for Point Cloud Registration
SGNet: Salient Geometric Network for Point Cloud Registratio...
收藏 引用
IEEE/RSJ International Conference on intelligent Robots and Systems (IROS)
作者: Qianliang Wu Yaqing Ding Lei Luo Haobo Jiang Shuo Gu Chuanwei Zhou Jin Xie Jian Yang PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Visual Recognition Group Faculty of Electrical Engineering Czech Technical University in Prague Prague Czech Republic State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Intelligence Science and Technology Nanjing University Suzhou China
Point Cloud Registration (PCR) is a critical and challenging task in computer vision and robotics. One of the primary difficulties in PCR is identifying salient and meaningful points that exhibit consistent semantic a... 详细信息
来源: 评论
Leveraging the Dual Capabilities of LLM: LLM-Enhanced Text Mapping Model for Personality Detection  39
Leveraging the Dual Capabilities of LLM: LLM-Enhanced Text M...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Bi, Weihong Kou, Feifei Shi, Lei Li, Yawen Li, Haisheng Chen, Jinpeng Xu, Mingying School of Computer Science National Pilot School of Software Engineering BUPT Beijing100876 China Key Laboratory of Trustworthy Distributed Computing and Service BUPT Ministry of Education Beijing100876 China State Key Laboratory of Media Convergence and Communication CUC Beijing100024 China State Key Laboratory of Intelligent Game Yangtze River Delta Research Institute of NPU Taicang215400 China School of Economics and Management BUPT Beijing100876 China Beijing Technology and Business University Beijing100048 China Xiangjiang Laboratory Changsha410205 China North China University of Technology Beijing100144 China
Personality detection aims to deduce a user’s personality from their published posts. The goal of this task is to map posts to specific personality types. Existing methods encode post information to obtain user vecto... 详细信息
来源: 评论
Deep Learning-based 3D Point Cloud Classification: A Systematic Survey and Outlook
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Huang Wang, Changshuo Tian, Shengwei Lu, Baoli Zhang, Liping Ning, Xin Bai, Xiao The School of Software Xinjiang University Xinjiang830000 China The Institute of Semiconductors Chinese Academy of Sciences Beijing100083 China Center of Materials Science and Optoelectronics Engineering School of Microelectronics Beijing Key Laboratory of Semiconductor Neural Network Intelligent Sensing and Computing Technology Beijing100083 China University of Chinese Academy of Sciences Beijing100049 China Cognitive Computing Technology Joint Laboratory Wave Group Beijing102208 China Beijing Key Laboratory of Semiconductor Neural Network Intelligent Sensing and Computing Technology Beijing100083 China The School of Computer Science and Engineering Beihang University Beijing100083 China
In recent years, point cloud representation has become one of the research hotspots in the field of computer vision, and has been widely used in many fields, such as autonomous driving, virtual reality, robotics, etc.... 详细信息
来源: 评论
Multi-granularity textual adversarial attack with behavior cloning
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Yangyi Su, Jin Wei, Wei Cognitive Computing and Intelligent Information Processing Laboratory School of Computer Science and Technology Huazhong University of Science Tehchnology School of Software Engineering Huazhong University of Science Tehchnology
Recently, the textual adversarial attack models become increasingly popular due to their successful in estimating the robustness of NLP models. However, existing works have obvious deficiencies. (1) They usually consi... 详细信息
来源: 评论
Speech Emotion Recognition Based on Three-Channel Feature Fusion of CNN and BiLSTM  2020
Speech Emotion Recognition Based on Three-Channel Feature Fu...
收藏 引用
4th International Conference on Innovation in Artificial Intelligence, ICIAI 2020
作者: Huang, Lilong Dong, Jing Zhou, Dongsheng Zhang, Qiang Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian University Dalian China School of Computer Science and Technology Dalian University of Technology Dalian China
It is important for human-computer natural interaction that the computer can quickly and effectively identify the interactor's emotional state. We proposed a three-channel feature fusion algorithm based on Convolu... 详细信息
来源: 评论