咨询与建议

限定检索结果

文献类型

  • 1,743 篇 会议
  • 1,588 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 3,332 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,122 篇 工学
    • 1,527 篇 计算机科学与技术...
    • 1,277 篇 软件工程
    • 515 篇 信息与通信工程
    • 297 篇 生物工程
    • 284 篇 控制科学与工程
    • 275 篇 电气工程
    • 165 篇 光学工程
    • 165 篇 电子科学与技术(可...
    • 157 篇 生物医学工程(可授...
    • 137 篇 机械工程
    • 109 篇 化学工程与技术
    • 100 篇 交通运输工程
    • 90 篇 仪器科学与技术
    • 76 篇 动力工程及工程热...
    • 74 篇 土木工程
    • 71 篇 建筑学
    • 68 篇 网络空间安全
  • 1,184 篇 理学
    • 652 篇 数学
    • 336 篇 生物学
    • 239 篇 物理学
    • 206 篇 统计学(可授理学、...
    • 129 篇 化学
    • 96 篇 系统科学
  • 588 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 283 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 149 篇 医学
    • 128 篇 临床医学
    • 101 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 103 篇 法学
    • 84 篇 社会学
  • 61 篇 农学
  • 44 篇 经济学
  • 39 篇 教育学
  • 6 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 138 篇 feature extracti...
  • 132 篇 semantics
  • 117 篇 training
  • 96 篇 deep learning
  • 74 篇 accuracy
  • 73 篇 computational mo...
  • 60 篇 predictive model...
  • 56 篇 contrastive lear...
  • 56 篇 data models
  • 55 篇 machine learning
  • 54 篇 convolution
  • 50 篇 graph neural net...
  • 47 篇 neural networks
  • 44 篇 federated learni...
  • 43 篇 reinforcement le...
  • 42 篇 object detection
  • 42 篇 data mining
  • 39 篇 optimization
  • 38 篇 visualization
  • 37 篇 task analysis

机构

  • 78 篇 beijing advanced...
  • 68 篇 key laboratory o...
  • 63 篇 college of compu...
  • 62 篇 key laboratory o...
  • 61 篇 university of ch...
  • 58 篇 shandong provinc...
  • 58 篇 school of comput...
  • 54 篇 south china univ...
  • 53 篇 national enginee...
  • 52 篇 shandong enginee...
  • 51 篇 peng cheng labor...
  • 46 篇 school of softwa...
  • 43 篇 school of comput...
  • 42 篇 jiangsu key labo...
  • 41 篇 school of cyber ...
  • 40 篇 school of electr...
  • 36 篇 key laboratory o...
  • 36 篇 guangdong key la...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...

作者

  • 39 篇 wang guoyin
  • 38 篇 xu xiaolong
  • 35 篇 tan mingkui
  • 30 篇 jin hai
  • 27 篇 xiaolong xu
  • 26 篇 huang qingming
  • 25 篇 shen linlin
  • 22 篇 hai jin
  • 21 篇 guo wenzhong
  • 21 篇 xu qianqian
  • 20 篇 hu shengshan
  • 20 篇 hongyan ma
  • 19 篇 chen huajun
  • 18 篇 niyato dusit
  • 17 篇 xia shuyin
  • 17 篇 wu di
  • 16 篇 li jianxin
  • 16 篇 guo kun
  • 15 篇 peng hao
  • 15 篇 chen gang

语言

  • 2,798 篇 英文
  • 497 篇 其他
  • 66 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data Intelligent Computing "
3332 条 记 录,以下是1221-1230 订阅
排序:
Deep Vision Guided Mobile Robot Dual Axis PID Dynamic Real Time Adjustment Following
Deep Vision Guided Mobile Robot Dual Axis PID Dynamic Real T...
收藏 引用
WRC Symposium on Advanced Robotics and Automation (WRC SARA)
作者: Yang Li Guanci Yang Ling He Le Zhao Tianyi Zhao Haoran Sun Key Laboratory of Advanced Manufacturing Technology of the Ministry of Education Guizhou University Guiyang Guizhou China Key Laboratory of Advanced Manufacturing Technology of the Ministry of Education/ State Key Laboratory of Public Big Data / Guizhou Provincial Key Laboratory of Internet+” Collaborative Intelligent Manufacturing Guizhou University Guiyang Guizhou China
The real-time tracking of moving objects by social robots is crucial for ensuring object-oriented services. This paper presents a real-time following algorithm for mobile robots based on deep vision object detection. ...
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Sensor Placement Optimization and Rapid Deployment of a Class of Visual Sensor Networks
Sensor Placement Optimization and Rapid Deployment of a Clas...
收藏 引用
Chinese Control Conference (CCC)
作者: Heng Deng Jiahui Zhou Zhiyao Zhao Liguo Zhang Key Laboratory of Computational Intelligence and Intelligent Systems Faculty of Information Technology Beijing University of Technology Beijing China Key Laboratory of Industrial Internet and Big Data China National Light Industry Beijing Technology and Business University Beijing China
To achieve the purpose of large-scale visual tracking of targets based on Visual Sensor Networks (VSNs), this paper proposes a sensor placement optimization method to provide a suitable sensor configuration that satis...
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kang Chen Ming Wen Haoxiang Jia Rongxin Wu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology (HRUST) Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Jin YinHu Laboratory Wuhan China School of Informatics Xiamen University Xiamen China School of Computer Science and Technology HUST Wuhan China Cluster and Grid Computing Lab
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
An Offensive Language Identification Based on Deep Semantic Feature Fusion  8
An Offensive Language Identification Based on Deep Semantic ...
收藏 引用
8th IEEE International Conference on Computer and Communications, ICCC 2022
作者: Li, Xiang Zeng, Zhi Wu, Mingmin Huang, Zhongqiang Sha, Ying Shi, Lei College of Informatics Huazhong Agricultural University Wuhan China Key Laboratory of Smart Farming for Agricultural Animals Wuhan China Hubei Engineering Technology Research Center of Agricultural Big Data Wuhan China Engineering Research Center of Intelligent Technology for Agriculture Ministry of Education China
Various forms of social interactions are often char-acterized by toxic or offensive words that can be collectively referred to as offensive languages, which has become a unique linguistic phenomenon in social media pl... 详细信息
来源: 评论
Exploiting Robust Model Watermarking Against the Model Fine-Tuning Attack via Flat Minima Aware Optimizers
Exploiting Robust Model Watermarking Against the Model Fine-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Dongdong Lin Yue Li Bin Li Jiwu Huang Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China SZU-AFS Joint Innovation Center for AI Technology Shenzhen University Shenzhen China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Xiamen China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University Shenzhen China
With the rapid advancement of deep neural networks (DNNs), model watermarking has emerged as a widely adopted technique for safeguarding model copyrights. A prevalent method involves utilizing a watermark decoder to r... 详细信息
来源: 评论
Research on super-resolution reconstruction of single-frame image of infrared focal plane polarization imaging  8
Research on super-resolution reconstruction of single-frame ...
收藏 引用
8th Symposium on Novel Photoelectronic Detection Technology and Applications
作者: Yuan, Hongwu Wang, Yiqing Xu, Guoming Wang, Feng School of Big Data and Artificial Intelligence Anhui Xinhua University Hefei China Key Laboratory of Polarization Imaging Detection Technology in Anhui Province Hefei China Institute of Intelligent Information Anhui Xinhua University Hefei China School of Internet Anhui University Hefei China
Since the low resolution of infrared focal plane arrays may degrade the performance of polarization imaging significantly, it is necessary to study the super-resolution reconstruction method for superior image resolut... 详细信息
来源: 评论
Kinematic inventory of rock glaciers in the Nyainqentanglha Range using the MT-InSAR method
收藏 引用
International Journal of Digital Earth 2023年 第1期16卷 3923-3948页
作者: Xuefei Zhang Min Feng Jinhao Xu Dezhao Yan Jing Wang Xiaoqing Zhou Tao Li Xiang Zhang Land Satellite Remote Sensing Application Center Ministry of Natural ResourcesBeijingPeople’s Republic of China Tibetan Plateau Data Center State Key Laboratory of Tibetan Plateau Earth SystemEnvironment and Resources(TPESER)Institute of Tibetan Plateau ResearchChinese Academy of SciencesBeijingPeople’s Republic of China Academy of Plateau Science and Sustainability Qinghai Normal UniversityXiningPeople’s Republic of China University of Chinese Academy of Sciences BeijingPeople’s Republic of China Research Institute of Intelligent Computing Zhejiang LaboratoryHangzhouPeople’s Republic of China
Rock glaciers are typical periglacial landforms with tongue or lobate morphological shapes and characterized by the distinct front,lateral margins,and often by ridge-and-furrow surface topography textures as well as k... 详细信息
来源: 评论
IIoT Mobile Business data Placement Strategy Based on Bayesian Optimization Algorithm  24
IIoT Mobile Business Data Placement Strategy Based on Bayesi...
收藏 引用
24th IEEE International Conference on High Performance computing and Communications, 8th IEEE International Conference on data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and big data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Shen, Zhijie Liu, Bowen Xu, Xiaolong Qi, Lianyong Dai, Fei Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Shenzhen China College of Big Data and Intelligent Engineering Southwest Forestry University Kunming China Qingdao China School of Computer Science Nanjing University of Information Science and Technology Nanjing China
As a standardized and systematic management method, business process management plays an important role in the industrial Internet of Things (IIoT) scenario. With the rapid development of mobile Internet and the incre... 详细信息
来源: 评论