咨询与建议

限定检索结果

文献类型

  • 330 篇 期刊文献
  • 278 篇 会议

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 415 篇 工学
    • 308 篇 计算机科学与技术...
    • 266 篇 软件工程
    • 94 篇 信息与通信工程
    • 70 篇 生物工程
    • 52 篇 电气工程
    • 48 篇 控制科学与工程
    • 38 篇 机械工程
    • 35 篇 光学工程
    • 31 篇 生物医学工程(可授...
    • 29 篇 电子科学与技术(可...
    • 16 篇 化学工程与技术
    • 14 篇 建筑学
    • 14 篇 土木工程
    • 13 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 11 篇 交通运输工程
    • 11 篇 网络空间安全
  • 206 篇 理学
    • 112 篇 数学
    • 73 篇 生物学
    • 38 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 18 篇 系统科学
    • 17 篇 化学
  • 116 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 24 篇 法学
    • 19 篇 社会学
  • 18 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 8 篇 教育学
    • 8 篇 教育学
  • 6 篇 经济学
  • 6 篇 农学
  • 3 篇 军事学

主题

  • 34 篇 semantics
  • 22 篇 training
  • 20 篇 deep learning
  • 16 篇 feature extracti...
  • 13 篇 convolution
  • 11 篇 neural networks
  • 11 篇 visualization
  • 10 篇 conferences
  • 10 篇 graph neural net...
  • 9 篇 data models
  • 8 篇 task analysis
  • 8 篇 signal processin...
  • 8 篇 optimization
  • 8 篇 predictive model...
  • 8 篇 decoding
  • 8 篇 codes
  • 7 篇 deep neural netw...
  • 7 篇 three-dimensiona...
  • 7 篇 recommender syst...
  • 7 篇 speech processin...

机构

  • 49 篇 school of softwa...
  • 38 篇 school of big da...
  • 38 篇 key laboratory o...
  • 21 篇 school of softwa...
  • 20 篇 state key labora...
  • 20 篇 school of cyber ...
  • 19 篇 school of comput...
  • 18 篇 national enginee...
  • 17 篇 hubei key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...
  • 16 篇 key laboratory o...
  • 16 篇 college of compu...
  • 16 篇 services computi...
  • 15 篇 key laboratory o...
  • 15 篇 beijing advanced...
  • 15 篇 cluster and grid...
  • 15 篇 state key labora...
  • 14 篇 school of inform...
  • 12 篇 peng cheng labor...

作者

  • 15 篇 huang sheng
  • 15 篇 wu qingyao
  • 14 篇 hu shengshan
  • 14 篇 li minghui
  • 13 篇 tan mingkui
  • 13 篇 cai yi
  • 12 篇 shen linlin
  • 11 篇 jin hai
  • 10 篇 zhang leo yu
  • 10 篇 qingyao wu
  • 9 篇 cui bin
  • 9 篇 meng yan
  • 8 篇 hai jin
  • 8 篇 zhou ziqi
  • 7 篇 lü jinhu
  • 7 篇 ling xu
  • 7 篇 minghui li
  • 7 篇 shengshan hu
  • 7 篇 fei dai
  • 7 篇 zhang wentao

语言

  • 562 篇 英文
  • 42 篇 其他
  • 5 篇 中文
检索条件"机构=Key Laboratory of Big Data and Intelligent Robot School of Software Engineering"
608 条 记 录,以下是241-250 订阅
排序:
Vehicle Segmentation with Coarse Distance Estimation Based on Monocular Vision
Vehicle Segmentation with Coarse Distance Estimation Based o...
收藏 引用
IEEE International Conference on e-Business engineering (ICEBE)
作者: Fangyuan Xie Pengshuai Yin Zehui Ke Ruizhou Sun Ke Ding Jian Chen Qingyao Wu School of Software Engineering South China University of Technology Guangzhou China Key Laboratory of Big Data and Intelligent Robot Ministry of Education China Pazhou Lab Guangzhou China
With the increasing population of drivers and the popularity of intelligent cars, traffic safety is becoming more concerned. Aiming to reduce the probability of road accidents, many works have explored how to provide ... 详细信息
来源: 评论
Aspect-Based Capsule Network With Mutual Attention for Recommendations
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2021年 第3期2卷 228-237页
作者: Yang, Zhenyu Wang, Xuesong Cheng, Yuhu Liu, GuoJing The School of Information and Control Engineering China University of Mining and Technology Xuzhou221116 China The Qilu University of Technology Shandong Academy of Sciences Software Integration Institute Jinan250353 China The Engineering Research Center of Intelligent Control for Underground Space Ministry of Education Xuzhou Key Laboratory of Artificial Intelligence and Big Data School of Information and Control Engineering China University of Mining and Technology Xuzhou221116 China The School of Computer Science and Technology Qilu University of Technology Jinan250353 China
Review text is a valuable source of information for recommendation systems and often contains rich semantics with user preferences and item attributes. Recently, mainstream recommendation approaches have been using de... 详细信息
来源: 评论
How to train your agent to read and write
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Li He, Mengge Xu, Guanghui Tan, Mingkui Wu, Qi School of Software Engineering South China University of Technology China Pazhou Laboratory China University of Adelaide Australia Key Laboratory of Big Data and Intelligent Robot Ministry of Education United Kingdom
Reading and writing research papers is one of the most privileged abilities that a qualified researcher should master. However, it is difficult for new researchers (e.g., students) to fully grasp this ability. It woul... 详细信息
来源: 评论
Deep Feature Surgery: Towards Accurate and Efficient Multi-Exit Networks
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Cheng Chen, Yao Luo, Qiuyang Lu, Ye Li, Tao Zhang, Yuzhi Sun, Yufei Zhang, Le College of Software Nankai University China College of Computer Science Nankai University China National University of Singapore Singapore School of Information and Communication Engineering University of Electronic Science and Technology of China China HAIHE Lab of ITAI China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education
Multi-exit network is a promising architecture for efficient model inference by sharing backbone networks and weights among multiple exits. However, the gradient conflict of the shared weights results in sub-optimal a... 详细信息
来源: 评论
StyleGene: Crossover and Mutation of Region-level Facial Genes for Kinship Face Synthesis
StyleGene: Crossover and Mutation of Region-level Facial Gen...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Hao Li Xianxu Hou Zepeng Huang Linlin Shen Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of AI and Advanced Computing Xi'an Jiaotong-Liverpool University Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University
High-fidelity kinship face synthesis has many potential applications, such as kinship verification, missing child identification, and social media analysis. However, it is challenging to synthesize high-quality descen...
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle Networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes
Understanding and Detecting Privacy Leakage Vulnerabilities ...
收藏 引用
International Symposium on software Reliability engineering (ISSRE)
作者: Ziming Chen Yue Li Jianbo Gao Jiashuo Zhang Ke Wang Jianbin Hu Zhi Guan Zhong Chen School of Computer Science Peking University Beijing China College of Computer Science and Technology Taiyuan University of Technology Taiyuan China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China Peking University Chongqing Research Institute of Big Data Chongqing China National Engineering Research Center for Software Engineering Peking University Beijing China
The application on a blockchain cannot maintain secrecy because its data is replicated across all peers in the network. To remedy this problem, Hyperledger Fabric introduces private data collection (PDC) into its smar... 详细信息
来源: 评论
Leapfrog Polymorphic Neural Ordinary Differential Equation
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 2139-2143页
作者: Zhang, Xiao Wei, Wei Zhang, Zhen Zhang, Lei Northwestern Polytechnical University School of Software Xi'an710072 China Northwestern Polytechnical University Shaanxi Provincial Key Laboratory of Speech and Image Information Processing School of Computer Science Xi'an710072 China Northwestern Polytechnical University National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science Xi'an710072 China The University of Adelaide school of computer science AdelaideSA5005 Australia
Neural Ordinary Differential Equations (NODEs) revolutionize the way we view residual networks as solvers for initial value problems (IVPs), with layer depth serving as the time step. In this study, we propose a more ... 详细信息
来源: 评论
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Validating SMT Solvers via Skeleton Enumeration Empowered by...
收藏 引用
International Conference on software engineering (ICSE)
作者: Maolin Sun Yibiao Yang Ming Wen Yongcong Wang Yuming Zhou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Huazhong University of Science and Technology China
SMT solvers check the satisfiability of logic formulas over first-order theories, which have been utilized in a rich number of critical applications, such as software verification, test case generation, and program sy...
来源: 评论
Container lifecycle-aware scheduling for serverless computing
Container lifecycle-aware scheduling for serverless computin...
收藏 引用
作者: Wu, Song Tao, Zhiheng Fan, Hao Huang, Zhuo Zhang, Xinmin Jin, Hai Yu, Chen Cao, Chun National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Elastic scaling in response to changes on demand is a main benefit of serverless computing. When bursty workloads arrive, a serverless platform launches many new containers and initializes function environments (known... 详细信息
来源: 评论