咨询与建议

限定检索结果

文献类型

  • 2,719 篇 会议
  • 2,104 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 4,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,265 篇 工学
    • 2,046 篇 计算机科学与技术...
    • 1,628 篇 软件工程
    • 577 篇 信息与通信工程
    • 444 篇 控制科学与工程
    • 400 篇 电子科学与技术(可...
    • 376 篇 电气工程
    • 373 篇 机械工程
    • 321 篇 生物工程
    • 300 篇 光学工程
    • 202 篇 仪器科学与技术
    • 194 篇 生物医学工程(可授...
    • 172 篇 化学工程与技术
    • 129 篇 动力工程及工程热...
    • 117 篇 材料科学与工程(可...
    • 104 篇 交通运输工程
    • 93 篇 建筑学
    • 93 篇 土木工程
  • 1,689 篇 理学
    • 899 篇 数学
    • 441 篇 物理学
    • 354 篇 生物学
    • 250 篇 统计学(可授理学、...
    • 176 篇 系统科学
    • 167 篇 化学
  • 846 篇 管理学
    • 530 篇 管理科学与工程(可...
    • 343 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 163 篇 医学
    • 143 篇 临床医学
    • 115 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
  • 96 篇 法学
    • 77 篇 社会学
  • 58 篇 经济学
  • 51 篇 农学
  • 29 篇 教育学
  • 16 篇 艺术学
  • 13 篇 军事学
  • 6 篇 文学

主题

  • 129 篇 laboratories
  • 124 篇 feature extracti...
  • 104 篇 computer archite...
  • 100 篇 semantics
  • 94 篇 training
  • 90 篇 computational mo...
  • 73 篇 optimization
  • 70 篇 computer science
  • 69 篇 deep learning
  • 60 篇 virtual reality
  • 59 篇 object detection
  • 54 篇 computer vision
  • 51 篇 image segmentati...
  • 49 篇 data mining
  • 48 篇 educational tech...
  • 48 篇 clustering algor...
  • 46 篇 neural networks
  • 46 篇 visualization
  • 46 篇 delay
  • 45 篇 accuracy

机构

  • 185 篇 hubei province k...
  • 184 篇 state key labora...
  • 176 篇 state key labora...
  • 126 篇 school of comput...
  • 123 篇 department of co...
  • 116 篇 key laboratory o...
  • 107 篇 college of compu...
  • 94 篇 tianjin key labo...
  • 93 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 74 篇 department of co...
  • 72 篇 university of ch...
  • 69 篇 state key labora...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 hubei province k...
  • 54 篇 school of comput...
  • 53 篇 school of softwa...
  • 49 篇 zhongguancun lab...
  • 48 篇 school of comput...

作者

  • 49 篇 xiaowei li
  • 34 篇 heng pheng-ann
  • 32 篇 dan feng
  • 32 篇 li jia
  • 31 篇 jianwei niu
  • 30 篇 zhang hua
  • 30 篇 huawei li
  • 28 篇 zhou mengchu
  • 27 篇 niu jianwei
  • 26 篇 ren jiadong
  • 25 篇 li bo
  • 25 篇 aimin hao
  • 25 篇 hai jin
  • 25 篇 jin hai
  • 23 篇 chen xiaowu
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 wang lei
  • 21 篇 li peng
  • 21 篇 liu jun

语言

  • 4,473 篇 英文
  • 214 篇 中文
  • 143 篇 其他
检索条件"机构=Key Laboratory for Computer Virtual Technology and System"
4824 条 记 录,以下是181-190 订阅
排序:
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
DRSC: Dual-Reweighted Siamese Contrastive Learning Network for Cross-Domain Rotating Machinery Fault Diagnosis With Multi-Source Domain Imbalanced Data
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Bi, Yuanguo Fu, Rao Jiang, Cunyu Zhang, Xiaoling Li, Fengyun Zhao, Liang Han, Guangjie Northeastern University School of Computer Science and Engineering Shenyang110169 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110169 China Shenyang University of Technology Institute of Artificial Intelligence Shenyang110870 China Shenyang Aerospace University School of Computer Science Shenyang110135 China Hohai University Key Laboratory of Maritime Intelligent Network Information Technology Ministry of Education China
To enhance the reliability of rotating machinery, cross-domain fault diagnosis becomes vital for detecting faults under unknown operating conditions. However, multi-source domain imbalanced data present significant ch... 详细信息
来源: 评论
Mobility-Aware User Association and Computation Offloading in Ultra-Dense Networks
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and Networking 2025年
作者: Qiu, Bin Feng, Ke Li, Xian Xiao, Hailin Zhang, Zhongshan Guilin University of Technology School of Computer Science and Engineering Guilin541004 China Guilin University of Technology Guangxi Key Laboratory of Embedded Technology and Intelligent System Guilin541004 China Guangxi Modern Polytechnic College Hechi530700 China Shenzhen University College of Electronics and Information Engineering Shenzhen518060 China Hubei University School of Computer Science and Information Engineering Wuhan430062 China Wuhan430062 China School of Cyberspace Science and Technology Guangdong519088 China
The integration of mobile edge computing (MEC) into ultra-dense network (UDN) has emerged as a promising solution for providing uninterrupted task offloading services to computation-demanding mobile devices (MDs), lev... 详细信息
来源: 评论
Capturing Rich Behavior Representations: A Dynamic Action Semantic-Aware Graph Transformer for Video Captioning
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Caihua Li, Xu Xue, Wenjing Tang, Wei Feng, Xia College of Computer Science and Technology Civil Aviation University of China Tianjin China Key Laboratory of Smart Airport Theory and System CAAC 2898 Jinbei Road Dongli District Tianjin China Science and Technology Innovation Research Institute Civil Aviation University of China Tianjin China
Existing video captioning methods merely provide shallow or simplistic representations of object behaviors, resulting in superficial and ambiguous descriptions. However, object behavior is dynamic and complex. To comp...
来源: 评论
A Risk-Averse Just-In-Time Scheme for Learning-Based Operation of Microgrids With Coupled Electricity-Hydrogen-Ammonia Under Uncertainties
收藏 引用
IEEE Transactions on Sustainable Energy 2025年
作者: Li, Longyan Ning, Chao Pan, Guangsheng Zhang, Leiqi Gu, Wei Zhao, Liang Du, Wenli Shahidehpour, Mohammad Shanghai Jiao Tong University Department of Automation Shanghai200240 China Ministry of Education of China Key Laboratory of System Control and Information Processing Shanghai200240 China School of Electrical Engineering Southeast University Nanjing210096 China Zhejiang Key Laboratory of Distributed Generations and Microgrid Technology State Grid Zhejiang Electric Power Research Institute Hangzhou310014 China Key Laboratory of Smart Manufacturing in Energy Chemical Process Ministry of Education East China University of Science and Technology China Department of Electrical and Computer Engineering Illinois Institute of Technology ChicagoIL60616 United States
This paper proposes a Risk-Averse Just-In-Time (RAJIT) operation scheme for Ammonia-Hydrogen-based Micro-Grids (AHMGs) to boost electricity-hydrogen-ammonia coupling under uncertainties. First, an off-grid AHMG model ... 详细信息
来源: 评论
Privacy-Preserving IoT Image Transmission: Multi-Stage SVD Data Embedding and Heatmap Alignment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Du, Kaixin Ma, Bin Yang, Meihong Wang, Xiaoyu Li, Xiaolong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250101 China Beijing Jiaotong University School of Computer and Information Technology Beijing100044 China
The images transmitted by IoT devices, particularly those used for surveillance or sensor data, are vulnerable to malicious screenshots and unauthorized access, leading to potential privacy breaches. To address this, ... 详细信息
来源: 评论
Semantic and Emotional Dual Channel for Emotion Recognition in Conversation
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Yang, Zhenyu Zhang, Zhibo Cheng, Yuhu Zhang, Tong Wang, Xuesong Jinan250353 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China China University of Mining and Technology Engineering Research Center of Intelligent Control for Underground Space Ministry of Education Xuzhou Key Laboratory of Artificial Intelligence and Big Data School of Information and Control Engineering Xuzhou221116 China South China University of Technology Guangdong Provincial Key Laboratory of Computational Intelligence and Cyberspace Information School of Computer Science and Engineering Guangzhou510006 China Pazhou Lab Guangzhou510335 China Engineering Research Center Ministry of Education on Health Intelligent Perception and Paralleled Digital-Human Guangzhou China
Emotion recognition in conversation (ERC) aims at accurately identifying emotional states expressed in conversational content. Existing ERC methods, although relying on semantic understanding, often encounter challeng... 详细信息
来源: 评论
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collaboratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
Edge-Preserving Depth Map Super-Resolution with Intensity Guidance
收藏 引用
Journal of Beijing Institute of technology 2019年 第1期28卷 51-56页
作者: Xiaochuan Wang Xiaohui Liang State Key Laboratory of Virtual Reality Technology and System Beihang University
Depth discontinuity edge affects the visual quality of synthesized images in 3D image ***,it suffers from accuracy degradation when up-sampled from low-resolution depth maps,especially at large scaling *** preserve th... 详细信息
来源: 评论