咨询与建议

限定检索结果

文献类型

  • 223 篇 会议
  • 209 篇 期刊文献

馆藏范围

  • 432 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 295 篇 工学
    • 238 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 78 篇 信息与通信工程
    • 55 篇 电气工程
    • 43 篇 控制科学与工程
    • 34 篇 生物工程
    • 22 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 12 篇 交通运输工程
    • 11 篇 化学工程与技术
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
    • 7 篇 安全科学与工程
  • 128 篇 理学
    • 70 篇 数学
    • 36 篇 生物学
    • 27 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 11 篇 系统科学
    • 10 篇 化学
  • 74 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 14 篇 法学
    • 10 篇 社会学
  • 9 篇 医学
    • 8 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 19 篇 feature extracti...
  • 17 篇 semantics
  • 15 篇 machine learning
  • 13 篇 contrastive lear...
  • 12 篇 privacy
  • 11 篇 graph neural net...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 optimization
  • 8 篇 task analysis
  • 8 篇 anomaly detectio...
  • 8 篇 federated learni...
  • 7 篇 conferences
  • 7 篇 sensors
  • 7 篇 forecasting
  • 6 篇 data privacy
  • 6 篇 speech processin...
  • 6 篇 neural networks
  • 6 篇 data mining
  • 6 篇 computational mo...

机构

  • 54 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 20 篇 key laboratory o...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 chongqing key la...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 10 篇 key laboratory o...
  • 9 篇 key lab. of inte...
  • 9 篇 south china univ...
  • 9 篇 nanjing universi...
  • 9 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 school of comput...
  • 8 篇 chongqing key la...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 20 篇 wang guoyin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 11 篇 tao li
  • 10 篇 xia shuyin
  • 10 篇 liu jun
  • 10 篇 cao xiaochun
  • 8 篇 xiao bin
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 chen ke-jia
  • 7 篇 zou zhiqiang
  • 7 篇 xuemiao xu
  • 7 篇 shengfeng he
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang

语言

  • 372 篇 英文
  • 58 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Cyberspace Big Data Intelligent Security"
432 条 记 录,以下是191-200 订阅
排序:
Hierarchical Alignment-enhanced Adaptive Grounding Network for Generalized Referring Expression Comprehension
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Yaxian Ding, Henghui He, Shuting Jiang, Xudong Wei, Bifan Liu, Jun School of Computer Science and Technology Xi'an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University China Institute of Big Data Fudan University China Shanghai University of Finance and Economics China Nanyang Technological University Singapore School of Continuing Education Xi'an Jiaotong University China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University China
In this work, we address the challenging task of Generalized Referring Expression Comprehension (GREC). Compared to the classic Referring Expression Comprehension (REC) that focuses on single-target expressions, GREC ... 详细信息
来源: 评论
EncryptFlow: Efficient and Lossless Image Encryption Network Based on Normalizing Flows
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: Yang, Menglin Xie, Dong Zhang, Guiting Chen, Fulong Wang, Taochun Hu, Peng Anhui Normal University Anhui Provincial Key Laboratory of Industrial Intelligence Data Security Anhui Engineering Research Centers of Medical Big Data Intelligent System Wuhu241002 China Anhui Normal University School of Computer and Information Wuhu241002 China
Compared to cryptographic image encryption schemes, neural networks (NN) based image encryption schemes exhibit a significantly larger key space and offer enhanced capabilities for parallel processing of image data. H... 详细信息
来源: 评论
A comprehensive survey on shadow removal from document images: datasets, methods, and opportunities
收藏 引用
Vicinagearth 2025年 第1期2卷 1-18页
作者: Wang, Bingshu Li, Changping Zou, Wenbin Zhang, Yongjun Chen, Xuhang Chen, C.L. Philip School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing & Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen University Shenzhen China Yongjun Zhang is with the State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Computer Science and Engineering Huizhou University Huizhou China School of Computer Science and Engineering South China University of Technology and Pazhou Lab Guangzhou China
With the rapid development of document digitization, people have become accustomed to capturing and processing documents using electronic devices such as smartphones. However, the captured document images often suffer...
来源: 评论
Towards a Smaller Student: Capacity Dynamic Distillation for Efficient Image Retrieval
arXiv
收藏 引用
arXiv 2023年
作者: Xie, Yi Zhang, Huaidong Xu, Xuemiao Zhu, Jianqing He, Shengfeng South China University of Technology China Huaqiao University China Singapore Management University Singapore State Key Laboratory of Subtropical Building Science China Ministry of Education Key Laboratory of Big Data and Intelligent Robot China Guangdong Provincial Key Lab of Computational Intelligence and Cyberspace Information China
Previous Knowledge Distillation based efficient image retrieval methods employs a lightweight network as the student model for fast inference. However, the lightweight student model lacks adequate representation capac... 详细信息
来源: 评论
Graph Structure Prefix Injection Transformer for Multi-Modal Entity Alignment
SSRN
收藏 引用
SSRN 2024年
作者: Li, Zhifei Luo, Xiangyu Zhang, Miao Zhang, Yan Xiao, Kui School of Computer Science and Information Engineering Hubei University Wuhan430062 China School of Cyber Science and Technology Hubei University Wuhan430062 China Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education Wuhan430062 China Hubei Key Laboratory of Big Data Intelligent Analysis and Application Hubei University Wuhan430062 China
Multi-modal entity alignment aims to integrate equivalent entities in diverse multi-modal knowledge graphs. However, previous studies have primarily focused on multi-modal fusion methods without considering the impact... 详细信息
来源: 评论
Large Language Models Enhanced Personalized Graph Neural Architecture Search in Federated Learning  39
Large Language Models Enhanced Personalized Graph Neural Arc...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Fang, Hui Gao, Yang Zhang, Peng Yao, Jiangchao Chen, Hongyang Wang, Haishuai Zhejiang Key Laboratory of Accessible Perception and Intelligent Systems College of Computer Science Zhejiang University China Cyberspace Institute of Advanced Technology Guangzhou University China Cooperative Medianet Innovation Center Shanghai Jiaotong University China Research Center for Data Hub and Security Zhejiang Lab China
Personalized federated learning (PFL) on graphs is an emerging field focusing on the collaborative development of architectures across multiple clients, each with distinct graph data distributions while adhering to st... 详细信息
来源: 评论
Point Cloud Compression Method Based on Curvature Grading and Inter-point Compression for Industrial Products
Point Cloud Compression Method Based on Curvature Grading an...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Lei Wang Wei Huang Yiping Chen Ran Chen School of Computer Nanjing University of Posts and Telecommunications Nanjing P. R. China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing P. R. China
The traditional point cloud compression methods fail to meet the compression requirements of complex surface point cloud files in the industrial field. This paper proposes a point cloud compression method suitable for...
来源: 评论
GNEA: A Novel GCN-based Network Embedding Algorithm for Semantic Social Network
GNEA: A Novel GCN-based Network Embedding Algorithm for Sema...
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Jinbo Zhao Jinling He Yuanhan Du Ming Tang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
With the development of semantic social networks, social networks become more complex and their size expands rapidly, which brings significant challenges to social network analysis. Network Embedding can transform the... 详细信息
来源: 评论
Dlr: Adversarial Examples Detection and Label Recovery for Deep Neural Networks
SSRN
收藏 引用
SSRN 2024年
作者: Han, Keji Li, Yun Ge, Yao Wang, Ruchuan Nanjing University of Posts and Telecommunications Wenyuan Road 9 Nanjing210046 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Wenyuan Road 9 Nanjing210046 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Wenyuan Road 9 Nanjing210046 China
Deep neural networks (DNNs) are demonstrated to be vulnerable to the adversarial example crafted by the adversary to fool the target model. Adversarial training and adversarial example detection are two popular method... 详细信息
来源: 评论
Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVs
Path Planning based on Reinforcement Learning with Improved ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qun Ding Xiaolong Xu Wenming Gui Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Jinling Institute of Technology Nanjing China
As the emerging technology of Unmanned Aerial Vehicles (UAVs) becomes mature, UAVs are widely used in environmental monitoring, communication and other fields. In view of this, this paper analyzed the task of synergis...
来源: 评论