咨询与建议

限定检索结果

文献类型

  • 612 篇 会议
  • 226 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 841 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 640 篇 工学
    • 540 篇 计算机科学与技术...
    • 448 篇 软件工程
    • 123 篇 信息与通信工程
    • 93 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 215 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 111 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 data mining
  • 13 篇 computational mo...
  • 13 篇 web services
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 accuracy
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy

机构

  • 91 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 school of comput...
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 791 篇 英文
  • 32 篇 中文
  • 19 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
841 条 记 录,以下是161-170 订阅
排序:
Joint Time Allocation and Beamforming Design for IRS-Aided Coexistent Cellular and Sensor Networks
Joint Time Allocation and Beamforming Design for IRS-Aided C...
收藏 引用
2021 IEEE Global Communications Conference (GLOBECOM)
作者: Yanze Zhu Yang Liu Jun Zhao Ming Li Qingqing Wu School of Information and Communication Engineering Dalian University of Technology School of Computer Science and Engineering Nanyang Technological University State Key Lab. of Internet of Things for Smart City Univ. of Macau
Internet of things (IoT) technology is an essential enabler to realize ubiquitous connections and pervasive intelli-gence for the future wireless communication system. The energy self-sustainability based on the wirel... 详细信息
来源: 评论
Limit-Cycle-Based Design of Formation Control for Mobile Agents
Limit-Cycle-Based Design of Formation Control for Mobile Age...
收藏 引用
作者: Wang, Chen Xia, Weiguo Xie, Guangming National Engineering Research Center for Software Engineering Key Lab. of Intelligent Control and Optimization for Industrial Equipment of Ministry of Education School of Control Science and Engineering Dalian University of Technology Dalian116024 China State Key Laboratory of Turbulence and Complex Systems Intelligent Biomimetic Design Lab College of Engineering Peking University Beijing China
In this article, we study the formation problem for a group of mobile agents in a plane, in which the agents are required to maintain a distribution pattern, as well as to rotate around or remain static relative to a ... 详细信息
来源: 评论
Supercomputer Supported Online Deep Learning Techniques for High Throughput EEG Prediction
Supercomputer Supported Online Deep Learning Techniques for ...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xiang Li Yazhou Zhang Jing Li Shandong Computer Science Center (National Supercomputing Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China State Key Lab. for Novel Software Technology Nanjing University and Software Engineering College Zhengzhou University of Light Industry China Jiuquan Satellite Launch Center China
Electroencephalogram (EEG) is a precise reflection of the brain activities and has been widely studied in clinical medicine, neuroscience, brain interface, etc. Intelligent prediction of the EEG’s evolution accuratel... 详细信息
来源: 评论
V2X-Assisted Distributed Computing and Control Framework for Connected and Automated Vehicles under Ramp Merging Scenario
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Qiong Chu, Jiahou Fan, Pingyi Wang, Kezhi Cheng, Nan Chen, Wen Letaief, Khaled B. The School of Internet of Things Engineering Jiangnan University Wuxi214122 China The Department of Electronic Engineering Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China The Department of Computer Science Brunel University London MiddlesexUB8 3PH United Kingdom The State Key Lab. of ISN School of Telecommunications Engineering Xidian University Xi'An71007l China The Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China Hong Kong
This paper investigates distributed computing and cooperative control of connected and automated vehicles (CAVs) in ramp merging scenario under transportation cyber-physical system. Firstly, a centralized cooperative ... 详细信息
来源: 评论
Generalized Face Forgery Detection via Adaptive Learning for Pre-trained Vision Transformer
arXiv
收藏 引用
arXiv 2023年
作者: Luo, Anwei Cai, Rizhao Kong, Chenqi Ju, Yakun Kang, Xiangui Huang, Jiwu Kot, Alex C. The School of Information Technology Jiangxi University of Finance and Economics Nanchang330013 China The School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China Lab. School of Electrical and Electronic Engineering Nanyang Technology University Singapore The Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The China-Singapore International Joint Research Institute Singapore
With the rapid progress of generative models, the current challenge in face forgery detection is how to effectively detect realistic manipulated faces from different unseen domains. Though previous studies show that p... 详细信息
来源: 评论
Semi-supervised software vulnerability assessment via code lexical and structural information fusion
收藏 引用
Automated software Engineering 2025年 第2期32卷
作者: Pei, Wenlong Huang, Yilin Chen, Xiang Lu, Guilong Liu, Yong Ni, Chao School of Artificial Intelligence and Computer Science Nantong University Jiangsu Nantong226019 China State Key Lab. for Novel Software Technology Nanjing University Jiangsu Nanjing China College of Information Science and Technology Beijing University of Chemical Technology Beijing100029 China School of Software Technology Zhejiang University Zhejiang Hangzhou310058 China
In recent years, data-driven approaches have become popular for software vulnerability assessment (SVA). However, these approaches need a large amount of lab.led SVA data to construct effective SVA models. This proces... 详细信息
来源: 评论
The Minority Matters: A Diversity-Promoting Collab.rative Metric Learning Algorithm
arXiv
收藏 引用
arXiv 2022年
作者: Bao, Shilong Xu, Qianqian Yang, Zhiyong He, Yuan Cao, Xiaochun Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Alibaba Group China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China Peng Cheng Laboratory China
Collab.rative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collab.rative Filtering. Following the convention of RS, existin... 详细信息
来源: 评论
Image-based Pose Representation for Action Recognition and Hand Gesture Recognition
Image-based Pose Representation for Action Recognition and H...
收藏 引用
International Conference on Automatic Face and Gesture Recognition
作者: Zeyi Lin Wei Zhang Xiaoming Deng Cuixia Ma Hongan Wang Beijing Key Lab. of Human-Computer Interactions Institute of Software Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences
In this paper, we propose an effective and compact image-based pose representation named Poseimage Pyramid, which encodes the spatial and temporal information of human pose or hand pose as an image pyramid. Poseimage ... 详细信息
来源: 评论
Adversarial Learning with Cost-Sensitive Classes
arXiv
收藏 引用
arXiv 2021年
作者: Shen, Haojing Chen, Sihong Wang, Ran Wang, Xizhao Big Data Institute College of Computer Science and Software Engineering Guangdong Key Lab. of Intelligent Information Processing Shenzhen University Guangdong Shenzhen518060 China The College of Mathematics and Statistics Shenzhen University Shenzhen518060 China The Shenzhen Key Laboratory of Advanced Machine Learning and Applications Shenzhen University Shenzhen518060 China
It is necessary to improve the performance of some special classes or to particularly protect them from attacks in adversarial learning. This paper proposes a framework combining cost-sensitive classification and adve... 详细信息
来源: 评论
Finding optimal tangent points for reducing distortions of hard-lab.l attacks  21
Finding optimal tangent points for reducing distortions of h...
收藏 引用
Proceedings of the 35th International Conference on Neural Information Processing systems
作者: Chen Ma Xiangyu Guo Li Chen Jun-Hai Yong Yisen Wang School of Software BNRist Tsinghua University Beijing China Department of Computer Science and Engineering University at Buffalo Buffalo NY Key Lab. of Machine Perception School of Artificial Intelligence Peking University Beijing China and Institute for Artificial Intelligence Peking University Beijing China
One major problem in black-box adversarial attacks is the high query complexity in the hard-lab.l attack setting, where only the top-1 predicted lab.l is availab.e. In this paper, we propose a novel geometric-based ap...
来源: 评论