咨询与建议

限定检索结果

文献类型

  • 862 篇 会议
  • 810 篇 期刊文献

馆藏范围

  • 1,672 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,105 篇 工学
    • 705 篇 计算机科学与技术...
    • 587 篇 软件工程
    • 238 篇 信息与通信工程
    • 148 篇 控制科学与工程
    • 135 篇 生物工程
    • 122 篇 电气工程
    • 109 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 90 篇 核科学与技术
    • 80 篇 机械工程
    • 77 篇 生物医学工程(可授...
    • 53 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 44 篇 材料科学与工程(可...
    • 35 篇 网络空间安全
    • 34 篇 动力工程及工程热...
    • 31 篇 交通运输工程
  • 709 篇 理学
    • 330 篇 物理学
    • 281 篇 数学
    • 148 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 52 篇 化学
    • 41 篇 系统科学
  • 265 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 127 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 66 篇 医学
    • 50 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 40 篇 法学
    • 34 篇 社会学
  • 20 篇 经济学
  • 20 篇 教育学
  • 19 篇 农学
  • 9 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 100 篇 hadron colliders
  • 50 篇 deep learning
  • 37 篇 semantics
  • 33 篇 feature extracti...
  • 32 篇 training
  • 29 篇 w & z bosons
  • 28 篇 higgs bosons
  • 26 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 graph neural net...
  • 22 篇 machine learning
  • 20 篇 accuracy
  • 20 篇 data models
  • 18 篇 convolutional ne...
  • 17 篇 object detection
  • 17 篇 convolution
  • 16 篇 semantic segment...
  • 16 篇 relativistic hea...
  • 16 篇 computer vision
  • 16 篇 forecasting

机构

  • 140 篇 irfu cea univers...
  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 126 篇 charles universi...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 122 篇 infn sezione di ...
  • 122 篇 department of ph...
  • 121 篇 imperial college...
  • 121 篇 university of de...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 1,552 篇 英文
  • 88 篇 其他
  • 35 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Application Technology"
1672 条 记 录,以下是531-540 订阅
排序:
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China The School of Computing Kent Interdisciplinary Research Centre in Cyber Security University of Kent CanterburyCT2 7NF United Kingdom Shenzhen Institute of Advanced Technology Chinese Academy of Sciences China The Intelligent Transportation Systems Lab Innopolis University Innopolis Russia The School of Computer Science and Technology Xidian University China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
More than Encoder: Introducing Transformer Decoder to Upsample
More than Encoder: Introducing Transformer Decoder to Upsamp...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Li, Yijiang Cai, Wentian Gao, Ying Li, Chengming Hu, Xiping South China University of Technology School of Computer Science and Engineering Guangzhou China Guangdong Prov. Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application Guangdong Provincial People's Hospital Guangdong Academy of Medical Sciences Guangzhou China Sun Yat-sen University School of Intelligent Systems Engineering Shenzhen China Beijing Institute of Technology School of Medical Technology Beijing China
Medical image segmentation methods downsample images for feature extraction and then upsample them to restore resolution for pixel-level predictions. In such schema, upsample technique is vital in restoring informatio... 详细信息
来源: 评论
A Multi-Feature Fusion Method with Inception Architecture for Image Steganalysis
A Multi-Feature Fusion Method with Inception Architecture fo...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Ming Jiang Shuo Zhang Feng Zhang Biao Guo Yun Li School of Computer Science and Information Security Guilin University Of Electronic Technology Guilin China Guangxi Metaverse Application Engineering Center Nanning China School of Information Engineering Guangxi Polytechnic of Construction Nanning China Guangxi Institute of Digital Technology Nanning China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
Image steganography and image steganalysis is one of the research hotspots in the field of information security, the abuse of steganography causes many security risks. As an attack method of image steganography, the m... 详细信息
来源: 评论
New Insights on Relieving Task-Recency Bias for Online Class Incremental Learning
arXiv
收藏 引用
arXiv 2023年
作者: Liang, Guoqiang Chen, Zhaojie Chen, Zhaoqiang Ji, Shiyu Zhang, Yanning Northwestern Polytechnical University 710072 China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology China Key Laboratory of Big Data Storage and Management China School of Computer Science China School of Software Engineering China
—To imitate the ability of keeping learning of human, continual learning which can learn from a never-ending data stream has attracted more interests recently. In all settings, the online class incremental learning (... 详细信息
来源: 评论
Match and Retrieval: Legal Similar Case Retrieval via Graph Matching Network
Match and Retrieval: Legal Similar Case Retrieval via Graph ...
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Shang Gao Yanling Li Fengpei Ge Min Lin Haiqing Yu Sukun Wang Zhongyi Miao College of Computer Science and Technology Key Laboratory of Infinite-Dimensional Hamiltonian System and Its Algorithm Application (Ministry of Education) Inner Mongolia Normal University Hohhot China Library Beijing University of Posts and Telecommunications Beijing China College of Computer Science and Technology Inner Mongolia Normal University Hohhot China
Legal document retrieval is a crucial application in the field of legal Artificial Intelligence (AI). It involves retrieving the most relevant legal cases from a legal document database when inputting a query. Mainstr...
来源: 评论
Tensor Graph Convolutional Network for Dynamic Graph Representation Learning
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Ling Yuan, Ye The School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China The Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Engineering Research Center of Big Data Application for Smart Cities Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing400714 China The College of Computer and Information Science Southwest University Chongqing400715 China
Dynamic graphs (DG) describe dynamic interactions between entities in many practical scenarios. Most existing DG representation learning models combine graph convolutional network and sequence neural network, which mo... 详细信息
来源: 评论
A Novel Binary Firefly Algorithm for the Minimum Labeling Spanning Tree Problem
收藏 引用
computer Modeling in Engineering & Sciences 2020年 第10期125卷 197-214页
作者: Mugang Lin Fangju Liu Huihuang Zhao Jianzhen Chen College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002China School of Computer Science University of South ChinaHengyang421001China
Given a connected undirected graph G whose edges are labeled,the minimumlabeling spanning tree(MLST)problemis to find a spanning tree of G with the smallest number of different *** is anNP-hard combinatorial optimizat... 详细信息
来源: 评论
An Asymptotically Consistent Shell Model for Compressible Biological Structures with Finite-Strain Deformation
SSRN
收藏 引用
SSRN 2024年
作者: Yu, Xiang Chen, Xiaoyi Department of Mathematics School of Computer Science and Technology Dongguan University of Technology Dongguan523808 China Guangdong Provincial Key Laboratory of Interdisciplinary Research and Application for Data Science Department of Applied Mathematics Beijing Normal University-Hong Kong Baptist University BNU-HKBU United International College Zhuhai519087 China
We derive an asymptotically consistent morphoelastic shell model to describe the finite deformations of biological tissues using an energy approach. Biological materials may exhibit remarkable compressibility when und... 详细信息
来源: 评论
Efficiently Computing Geodesic Loop for Interactive Segmentation of a 3D Mesh
收藏 引用
Recent Advances in computer Science and Communications 2021年 第8期14卷 2477-2488页
作者: Meng, Yun Zhu, Shaojun Liu, Bangquan Sun, Dechao Liu, Li Yang, Weihua College of Digital Technology and Engineering Ningbo University of Finance & Economics Ningbo China Zhejiang Province Key Laboratory of Smart Management & Application of Modern Agricultural Resources Huzhou University Huzhou China College of Electronics and Computer Zhejiang Wanli University Ningbo China First People’s Hospital of Huzhou Huzhou China
Introduction: Shape segmentation is a fundamental problem of computer graphics and geometric modeling. Although the existence of segmentation algorithms of shapes have been widely studied in the mathematics community,... 详细信息
来源: 评论
Characteristic analysis and similarity calculation of molecular compounds of traditional chinese medicine  2020
Characteristic analysis and similarity calculation of molecu...
收藏 引用
3rd International Conference on Data Science and Information technology, DSIT 2020
作者: Hong, Juxing Wang, Lu Zhang, Shoude Xie, Fenfen Computer Technology and Application Qinghai University Xining China State Key Laboratory Qinghai University Xining China
To be able to extract corresponding features of molecular compounds of traditional Chinese medicine, and to use the extracted features to analyze physical and chemical properties and similarities. In this study, Pytho... 详细信息
来源: 评论