咨询与建议

限定检索结果

文献类型

  • 250 篇 会议
  • 141 篇 期刊文献

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 266 篇 工学
    • 212 篇 计算机科学与技术...
    • 183 篇 软件工程
    • 55 篇 信息与通信工程
    • 27 篇 生物工程
    • 22 篇 控制科学与工程
    • 20 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 14 篇 建筑学
    • 11 篇 网络空间安全
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 农业工程
    • 8 篇 光学工程
  • 129 篇 理学
    • 89 篇 数学
    • 30 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 14 篇 系统科学
    • 9 篇 化学
  • 87 篇 管理学
    • 50 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 33 篇 教育学
    • 33 篇 教育学
  • 17 篇 医学
    • 14 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
    • 10 篇 作物学
  • 3 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 13 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 heuristic algori...
  • 7 篇 access control
  • 7 篇 education
  • 7 篇 educational inst...
  • 7 篇 ontology
  • 6 篇 support vector m...
  • 6 篇 motion planning
  • 6 篇 face recognition
  • 6 篇 computational mo...
  • 6 篇 websites
  • 6 篇 algorithm design...
  • 6 篇 genetic algorith...
  • 6 篇 cloud computing
  • 6 篇 cryptography
  • 5 篇 complex networks
  • 5 篇 deep neural netw...
  • 5 篇 information tech...

机构

  • 157 篇 school of inform...
  • 97 篇 shandong provinc...
  • 79 篇 shandong provinc...
  • 18 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 school of softwa...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 14 篇 services computi...
  • 13 篇 school of inform...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 13 篇 cluster and grid...
  • 12 篇 shandong normal ...
  • 11 篇 shandong provinc...
  • 11 篇 school of inform...
  • 10 篇 school of inform...
  • 9 篇 school of inform...
  • 7 篇 key laboratory o...

作者

  • 48 篇 liu hong
  • 24 篇 zhang yongsheng
  • 22 篇 zheng xiangwei
  • 22 篇 zhang huaxiang
  • 21 篇 zhang guijuan
  • 20 篇 lu dianjie
  • 19 篇 hong liu
  • 13 篇 wang hong
  • 12 篇 hu shengshan
  • 12 篇 li minghui
  • 11 篇 xiangwei zheng
  • 9 篇 guijuan zhang
  • 9 篇 liu peiyu
  • 9 篇 dianjie lu
  • 9 篇 yongsheng zhang
  • 9 篇 wu lei
  • 9 篇 jin hai
  • 8 篇 zhang leo yu
  • 8 篇 hong wang
  • 8 篇 liu li

语言

  • 379 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=Key Laboratory for Distributed Computer Software"
391 条 记 录,以下是351-360 订阅
排序:
Violence Detection In Videos via Motion-Guided Global and Local Views
Violence Detection In Videos via Motion-Guided Global and Lo...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Ning Su Lijuan Sun Yutong Gao Jingchen Wu Xu Wu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT
Video violence detection aims to locate the time window in which violent behavior occurs. Most methods focus on utilizing RGB features directly or only fusing RGB and audio features, ignoring the effective exploitatio...
来源: 评论
Excitement Surfeited Turns to Errors: Deep Learning Testing Framework Based on Excitable Neurons
arXiv
收藏 引用
arXiv 2022年
作者: Jin, Haibo Chen, Ruoxi Zheng, Haibin Chen, Jinyin Cheng, Yao Yu, Yue Liu, Xianglong College of Information Engineering Zhejiang University of Technology Hangzhou China Institute of Cyberspace Security Zhejiang University of Technology Hangzhou China Huawei International Singapore National Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha China State Key Laboratory of Software Development Environment Beihang University Beijing China
Despite impressive capabilities and outstanding performance, deep neural networks (DNNs) have captured increasing public concern about their security problems, due to their frequently occurred erroneous behaviors. The... 详细信息
来源: 评论
Ontology-based Knowledge Modeling for Using Physical Effects
收藏 引用
Procedia Engineering 2015年 131卷 601-615页
作者: Wei Yan Cecilia Zanni-Merk François Rousselot Denis Cavallucci Pierre Collet School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China LGECO / INSA Strasbourg 24 Boulevard de la Victoire 67084 Strasbourg Cedex France ICube / BFO Team (UMR CNRS 7005) – Pôle API BP 10413 67412 Illkirch Cedex France
Su-Field analysis, as one of the inventive problem solving tools, can be used to analyse and improve the efficacy of the technical system. Generally, the process of using Su-Field model to solve a specific inventive p... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
A Method for Facilitating Inventive Design Based on Semantic Similarity and Case-Based Reasoning
收藏 引用
Procedia Engineering 2015年 131卷 194-203页
作者: Wei Yan Cecilia Zanni-Merk François Rousselot Denis Cavallucci School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China LGECO / INSA Strasbourg 24 Boulevard de la Victoire 67084 Strasbourg Cedex France LSIIT / FDBT Team (UMR CNRS 7005) – Pôle API BP 10413 67412 Illkirch Cedex France
While TRIZ is increasingly developing both in research and education, new users always encounter difficulties in their first attempts to practice it. In such situation, Altshuller's original matrix often appears a... 详细信息
来源: 评论
A Heuristic Method of Using the Pointers to Physical Effects in Su-Field Analysis
收藏 引用
Procedia Engineering 2015年 131卷 539-550页
作者: Wei Yan Cecilia Zanni-Merk François Rousselot Denis Cavallucci Pierre Collet School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China LGECO / INSA Strasbourg 24 Boulevard de la Victoire 67084 Strasbourg Cedex France LSIIT / BFO Team (UMR CNRS 7005) – Pôle API BP 10413 67412 Illkirch Cedex France
While TRIZ is increasingly developing both in research and education, users always encounter difficulties in their attempts to practice it, especially for one of the most complicated inventive problem solving tools, t... 详细信息
来源: 评论
Vehicle Destination Prediction Based on Trajectory Data
Vehicle Destination Prediction Based on Trajectory Data
收藏 引用
Neural Networks, Information and Communication Engineering (NNICE), International Conference on
作者: Wenming Guo Ruiqi Jia Che Zong Ruichao Li Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China School of Information Engineering Xinjiang Institute of Engineering Urumqi China School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China
With the increasing requirements of real-time traffic management in urban transportation, vehicle destination prediction data, as an important part of smart city brain data, is becoming more and more important in urba...
来源: 评论
X-Prcaf : Xposed Based Protecting Cache File from Leaks in Android Social Applications
X-Prcaf : Xposed Based Protecting Cache File from Leaks in A...
收藏 引用
International Conference on Trustworthy Systems and their Applications (TSA)
作者: Qi Tang Wen Zhang Xiaoyong Li Bin Wang Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing P.R. China Beijing Key Lab of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications Beijing P.R. China School of Computer Science Beijing University of Posts and Telecommunications Beijing P.R. China
With the high frequent use of social applications on Android platform, the cache file privacy disclosure issues have become increasingly serious. To our best knowledge, there is no effective privacy protection solutio... 详细信息
来源: 评论
Penetration of authority under cloud environment based on RBAC
收藏 引用
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) 2013年 第SUPPL.2期41卷 68-71页
作者: Zou, Jiashun Zhang, Yongsheng Gao, Yan School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan 250014 China
A research was made on the weak security of access control model based on the role, which was showed in the cross-domain access of cloud computing. An access control strategy based on the hops was put forward by intro... 详细信息
来源: 评论
Review of Semi-Structured Document Information Extraction Techniques Based on Deep Learning
Review of Semi-Structured Document Information Extraction Te...
收藏 引用
Machine Learning, Cloud Computing and Intelligent Mining (MLCCIM), International Conference on
作者: Yangchun Li Wei Jiang Shouyou Song Chinese Academy of Cybersapce Studies School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Chinese Academy of Cybersapce Studies Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Chinese Academy of Cybersapce Studies Ministry of Education Beijing University of Posts and Telecommunications Beijing China
With the advent of global digital transformation, using an intelligent method based on deep learning to extract crucial information from semi-structured documents, as represented by various types of receipts and invoi...
来源: 评论