咨询与建议

限定检索结果

文献类型

  • 1,702 篇 会议
  • 1,349 篇 期刊文献

馆藏范围

  • 3,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,017 篇 工学
    • 1,493 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 546 篇 信息与通信工程
    • 275 篇 电气工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 控制科学与工程
    • 199 篇 生物工程
    • 134 篇 机械工程
    • 127 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 97 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 67 篇 交通运输工程
    • 65 篇 化学工程与技术
    • 64 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 920 篇 理学
    • 532 篇 数学
    • 219 篇 生物学
    • 199 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 75 篇 化学
  • 565 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 244 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 94 篇 法学
    • 60 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 59 篇 deep learning
  • 59 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 42 篇 robustness
  • 41 篇 security
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 162 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 37 篇 school of cyber ...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...
  • 31 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 237 篇 其他
  • 120 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3051 条 记 录,以下是731-740 订阅
排序:
MTGA: Multi-View Temporal Granularity Aligned Aggregation for Event-Based Lip-Reading  39
MTGA: Multi-View Temporal Granularity Aligned Aggregation fo...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhang, Wenhao Wang, Jun Luo, Yong Yu, Lei Yu, Wei He, Zheng Shen, Jialie School of Computer Science National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China School of Electronics and Information Wuhan University China Department of Computer Science City University of London United Kingdom
Lip-reading is to utilize the visual information of the speaker's lip movements to recognize words and sentences. Existing event-based lip-reading solutions integrate different frame rate branches to learn spatio-...
来源: 评论
Disambiguated Attention Embedding for Multi-Instance Partial-Label Learning
arXiv
收藏 引用
arXiv 2023年
作者: Tang, Wei Zhang, Weijia Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China School of Information and Physical Sciences The University of Newcastle CallaghanNSW2308 Australia
In many real-world tasks, the concerned objects can be represented as a multi-instance bag associated with a candidate label set, which consists of one ground-truth label and several false positive labels. Multi-insta... 详细信息
来源: 评论
Transformer-based Multi-Instance Learning for Weakly Supervised Object Detection
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Zhaofei Zhang, Weijia Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China School of Information and Physical Sciences The University of Newcastle CallaghanNSW2308 Australia
Weakly Supervised Object Detection (WSOD) enables the training of object detection models using only image-level annotations. State-of-the-art WSOD detectors commonly rely on multi-instance learning (MIL) as the backb... 详细信息
来源: 评论
Multi-dimensional classification via stacked dependency exploitation
收藏 引用
Science China(information Sciences) 2020年 第12期63卷 104-117页
作者: Bin-Bin JIA Min-Ling ZHANG School of Computer Science and Engineering Southeast University College of Electrical and Information Engineering Lanzhou University of Technology Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of EducationChina Collaborative Innovation Center of Wireless Communications Technology
Multi-dimensional classification(MDC) aims to build classification models for multiple heterogenous class spaces simultaneously, where each class space characterizes the semantics of an object w.r.t. one specific dime... 详细信息
来源: 评论
PAIR: Complementarity-guided Disentanglement for Composed Image Retrieval
PAIR: Complementarity-guided Disentanglement for Composed Im...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhiheng Fu Zixu Li Zhiwei Chen Chunxiao Wang Xuemeng Song Yupeng Hu Liqiang Nie School of Software Shandong University Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) School of Computer Science and Technology Shandong University School of Computer Science and Technology Harbin Institute of Technology (Shenzhen)
Composed Image Retrieval (CIR) is a novel image retrieval paradigm that aims at searching for the target images via the multimodal query including a reference image and a modification text. Although existing works hav... 详细信息
来源: 评论
Towards an Ontology of Traceable Impact Management in the Food Supply Chain
arXiv
收藏 引用
arXiv 2025年
作者: Gajderowicz, Bart Fox, Mark S. Gao, Yongchao Urban Data Centre School of Cities University of Toronto Toronto Canada Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China
The pursuit of quality improvements and accountability in the food supply chains, especially how they relate to food-related outcomes, such as hunger, has become increasingly vital, necessitating a comprehensive appro...
来源: 评论
MEDIAN: Adaptive Intermediate-grained Aggregation network for Composed Image Retrieval
MEDIAN: Adaptive Intermediate-grained Aggregation Network fo...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qinlei Huang Zhiwei Chen Zixu Li Chunxiao Wang Xuemeng Song Yupeng Hu Liqiang Nie School of Software Shandong University Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) School of Computer Science and Technology Shandong University School of Computer Science and Technology Harbin Institute of Technology (Shenzhen)
The Composed Image Retrieval (CIR) task aims to retrieve a target image that meets the requirements based on a given multimodal query (includes a reference image and modification text). Most existing works align multi... 详细信息
来源: 评论
Revocable Registered Attribute-Based Encryption With User Deregistration
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Jiguo Chen, Shaobo Lu, Yang Ning, Jianting Shen, Jian Zhang, Yichen Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Nanjing Normal University School of Computer and Electronic Information Nanjing210023 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China
Many businesses are putting their sensitive data in the cloud with the fast growth of cloud computing and storage. To ensure user privacy, it is necessary to keep encrypted data only in the cloud. Attribute-based encr... 详细信息
来源: 评论
Short Text Clustering Using Joint Optimization of Feature Representations and Cluster Assignments  18th
Short Text Clustering Using Joint Optimization of Feature Re...
收藏 引用
18th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2021
作者: Sun, Liping Du, Tingli Duan, Xiaoyu Luo, Yonglong School of Computer and Information Anhui Normal University Wuhu Anhui241002 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal University Wuhu Anhui241002 China
The application of traditional text clustering methods to short text data is inefficient owing to the high dimensionality and semantic sparseness of such data. Contrastingly, convolutional neural networks can capture ... 详细信息
来源: 评论
The Design and Implementation of KMeans Based on Unified Batch and Streaming Processing  15th
The Design and Implementation of KMeans Based on Unified Bat...
收藏 引用
15th CCF Conference on computer Supported Cooperative Work and Social Computing, Chinese CSCW 2020
作者: Chen, Hao Guo, Kun Chen, Yuzhong Guo, Hong College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fuzhou350108 China
Clustering algorithms aim at gathering similar data points from a dataset in an unsupervised manner. Although the batch clustering algorithms have relatively high accuracy, they cannot make use of the dynamic clusteri... 详细信息
来源: 评论