咨询与建议

限定检索结果

文献类型

  • 325 篇 期刊文献
  • 278 篇 会议

馆藏范围

  • 603 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 411 篇 工学
    • 305 篇 计算机科学与技术...
    • 263 篇 软件工程
    • 94 篇 信息与通信工程
    • 70 篇 生物工程
    • 49 篇 电气工程
    • 48 篇 控制科学与工程
    • 38 篇 机械工程
    • 35 篇 光学工程
    • 31 篇 生物医学工程(可授...
    • 29 篇 电子科学与技术(可...
    • 16 篇 化学工程与技术
    • 14 篇 建筑学
    • 14 篇 土木工程
    • 13 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 11 篇 交通运输工程
    • 11 篇 网络空间安全
  • 204 篇 理学
    • 110 篇 数学
    • 73 篇 生物学
    • 38 篇 物理学
    • 29 篇 统计学(可授理学、...
    • 18 篇 系统科学
    • 17 篇 化学
  • 115 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 23 篇 法学
    • 19 篇 社会学
  • 18 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 8 篇 教育学
    • 8 篇 教育学
  • 6 篇 经济学
  • 6 篇 农学
  • 3 篇 军事学

主题

  • 34 篇 semantics
  • 23 篇 training
  • 20 篇 deep learning
  • 16 篇 feature extracti...
  • 13 篇 convolution
  • 11 篇 neural networks
  • 11 篇 visualization
  • 10 篇 conferences
  • 10 篇 graph neural net...
  • 10 篇 data models
  • 8 篇 task analysis
  • 8 篇 signal processin...
  • 8 篇 optimization
  • 8 篇 predictive model...
  • 8 篇 decoding
  • 8 篇 codes
  • 7 篇 deep neural netw...
  • 7 篇 three-dimensiona...
  • 7 篇 recommender syst...
  • 7 篇 speech processin...

机构

  • 49 篇 school of softwa...
  • 38 篇 school of big da...
  • 38 篇 key laboratory o...
  • 21 篇 school of softwa...
  • 20 篇 state key labora...
  • 20 篇 school of cyber ...
  • 19 篇 school of comput...
  • 18 篇 national enginee...
  • 17 篇 hubei key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...
  • 16 篇 key laboratory o...
  • 16 篇 college of compu...
  • 16 篇 services computi...
  • 15 篇 key laboratory o...
  • 15 篇 beijing advanced...
  • 15 篇 cluster and grid...
  • 15 篇 state key labora...
  • 14 篇 school of inform...
  • 12 篇 peng cheng labor...

作者

  • 15 篇 huang sheng
  • 15 篇 wu qingyao
  • 14 篇 hu shengshan
  • 14 篇 li minghui
  • 13 篇 tan mingkui
  • 13 篇 cai yi
  • 12 篇 shen linlin
  • 11 篇 jin hai
  • 10 篇 zhang leo yu
  • 10 篇 qingyao wu
  • 9 篇 cui bin
  • 9 篇 meng yan
  • 8 篇 hai jin
  • 8 篇 zhou ziqi
  • 7 篇 lü jinhu
  • 7 篇 ling xu
  • 7 篇 minghui li
  • 7 篇 shengshan hu
  • 7 篇 fei dai
  • 7 篇 zhang wentao

语言

  • 557 篇 英文
  • 42 篇 其他
  • 5 篇 中文
检索条件"机构=Key Laboratory of Big Data and Intelligent Robot School of Software Engineering"
603 条 记 录,以下是291-300 订阅
排序:
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
Usage: Uncertain Flow Graph and Spatio-Temporal Graph Network-Based Saturation Attack Detection Method
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Kaixi Cui, Yunhe Qian, Qing Chen, Yi Guo, Chun Shen, Guowei Engineering Research Center of Text Computing & Cognitive Intelligence Guizhou University China State Key Laboratory of Public Big Data Guizhou University China Guizhou Provincial Characteristic Key Laboratory of Software Engineering and Information Security Guizhou University China College of Computer Science and Technology Guizhou University China School of Information Guizhou University of Finance and Economics China
With the development of software-Defined Networking (SDN), its security problems have become important research content. Among these security problems, saturation attack is one of the most destructive problems. Satura... 详细信息
来源: 评论
Detecting and Corrupting Convolution-based Unlearnable Examples
arXiv
收藏 引用
arXiv 2023年
作者: Li, Minghui Wang, Xianlong Yu, Zhifei Hu, Shengshan Zhou, Ziqi Zhang, Longling Zhang, Leo Yu School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Convolution-based unlearnable examples (UEs) employ class-wise multiplicative convolutional noise to training samples, severely compromising model performance. This fire-new type of UEs have successfully countered all... 详细信息
来源: 评论
FF-KGAT: Feature Fusion Based Knowledge Graph Attention Network for Recommendation  5
FF-KGAT: Feature Fusion Based Knowledge Graph Attention Netw...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Tao, Li Xiaoge, Li Chaodong, Wang Xianliang, Li Shuai, Gao Dan, Han Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xian University of Posts and Telecommunications Shaanxi Xi'an710121 China School of Computer Xian University of Posts and Telecommunications Shaanxi Xi'an710121 China Inspur Software Technology Co Ltd Software Development Project Management China Xian University of Posts and Telecommunications Shaanxi Xi'an710121 China School of Communication and Information Engineering Xian University of Posts and Telecommunications Shaanxi Xi'an710121 China
It is commonly agreed that a recommender system based on knowledge graph (KG) should not only use user-item interactions, but also take side information into account to deal with the problem of data sparsity. However,... 详细信息
来源: 评论
Towards Making More Reliable Cardiotocogram data Prediction with Limited Expert Knowledge: Exploiting Unlabeled data with Semi-supervised Boosting Method  6th
Towards Making More Reliable Cardiotocogram Data Prediction ...
收藏 引用
6th International Conference on data Mining and big data, DMBD 2021
作者: Hong, Jiaming Qin, Chen Huang, Yun Zhou, Yin School of Medical Information Engineering Guangzhou University of Chinese Medicine Guangzhou China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Software College Jishou University Zhangjiajie China School of Computer Science Shenzhen Institute of Information Technology Shenzhen China
Cardiotocography (CTG) is frequently used as a method of diagnosing fetal distress during pregnancy and delivery, including listening to Fetal Heart Rate (FHR) and monitoring Uterine Contractions (UC). Many scholars h... 详细信息
来源: 评论
Debiased visual question answering from feature and sample perspectives  21
Debiased visual question answering from feature and sample p...
收藏 引用
Proceedings of the 35th International Conference on Neural Information Processing Systems
作者: Zhiquan Wen Guanghui Xu Mingkui Tan Qingyao Wu Qi Wu School of Software Engineering South China University of Technology China and PengCheng Laboratory China School of Software Engineering South China University of Technology China School of Software Engineering South China University of Technology China and Key Laboratory of Big Data and Intelligent Robot (South China University of Technology) Ministry of Education School of Computer Science University of Adelaide
Visual question answering (VQA) is designed to examine the visual-textual reasoning ability of an intelligent agent. However, recent observations show that many VQA models may only capture the biases between questions...
来源: 评论
Transformer-based stereo-aware 3D object detection from binocular images
arXiv
收藏 引用
arXiv 2023年
作者: Sun, Hanqing Pang, Yanwei Cao, Jiale Xie, Jin Li, Xuelong Changchun Institute of Optics Fine Mechanics and Physics Chinese Academy of Sciences Changchun China Tianjin Key Laboratory of Brain-Inspired Intelligence Technology School of Electrical and Information Engineering Tianjin University Tianjin China School of Big Data and Software Engineering Chongqing University Chongqing China Northwestern Polytechnical University Xi’an China
Transformers have shown promising progress in various visual object detection tasks, including monocular 2D/3D detection and surround-view 3D detection. More importantly, the attention mechanism in the Transformer mod... 详细信息
来源: 评论
Exploring A CAM - Based Approach for Weakly Supervised Fire Detection Task
Exploring A CAM - Based Approach for Weakly Supervised Fire ...
收藏 引用
IEEE International Conference on e-Business engineering (ICEBE)
作者: Lvlong Lai Jian Chen Huichou Huang Qingyao Wu School of Software Engineering South China University of Technology Guangzhou China Key Laboratory of Big Data and Intelligent Robot Ministry of Education City University of Hong Kong Hong Kong China Pazhou Lab Guangzhou China
Most existing works in fire detection literature use available detectors like Faster RCNN, SSD, YOLO, etc. to localize the fire in images. These approaches work well but require object-level annotation for training, w... 详细信息
来源: 评论
Cooperative Sensing Via Matrix Factorization of the Partially Received Sample Covariance Matrix
Cooperative Sensing Via Matrix Factorization of the Partiall...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Rui Zhou Wenqiang Pu Licheng Zhao Ming-Yi You Qingjiang Shi Sergios Theodoridis Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen China National Key Laboratory of Electromagnetic Space Security Jiaxing China School of Software Engineering Tongji University Shanghai China Department of Electronics Systems Aalborg University Denmark Department of Informatics and Telecommunications National and Kapodistrian University of Athens Greece
A fundamental problem in cognitive radio is spectrum sensing, which detects the presence of the primary users in a licensed spectrum. To boost the detection performance and robustness, the multiantenna detector has be...
来源: 评论