咨询与建议

限定检索结果

文献类型

  • 951 篇 期刊文献
  • 712 篇 会议
  • 1 册 图书

馆藏范围

  • 1,664 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,129 篇 工学
    • 808 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 305 篇 信息与通信工程
    • 201 篇 电气工程
    • 153 篇 生物工程
    • 134 篇 控制科学与工程
    • 106 篇 生物医学工程(可授...
    • 104 篇 光学工程
    • 100 篇 电子科学与技术(可...
    • 61 篇 机械工程
    • 52 篇 化学工程与技术
    • 47 篇 仪器科学与技术
    • 47 篇 交通运输工程
    • 38 篇 网络空间安全
    • 35 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 安全科学与工程
  • 606 篇 理学
    • 330 篇 数学
    • 173 篇 生物学
    • 130 篇 物理学
    • 113 篇 统计学(可授理学、...
    • 59 篇 化学
    • 45 篇 系统科学
  • 318 篇 管理学
    • 185 篇 管理科学与工程(可...
    • 150 篇 图书情报与档案管...
    • 75 篇 工商管理
  • 103 篇 医学
    • 95 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 44 篇 法学
    • 35 篇 社会学
  • 25 篇 经济学
  • 19 篇 农学
  • 18 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 85 篇 semantics
  • 69 篇 feature extracti...
  • 49 篇 training
  • 48 篇 deep learning
  • 38 篇 federated learni...
  • 36 篇 computational mo...
  • 36 篇 accuracy
  • 32 篇 data models
  • 30 篇 convolution
  • 28 篇 contrastive lear...
  • 25 篇 data mining
  • 25 篇 machine learning
  • 24 篇 predictive model...
  • 21 篇 deep neural netw...
  • 21 篇 image segmentati...
  • 21 篇 neural networks
  • 21 篇 visualization
  • 21 篇 robustness
  • 20 篇 measurement
  • 19 篇 optimization

机构

  • 59 篇 college of compu...
  • 55 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 52 篇 shandong enginee...
  • 51 篇 national enginee...
  • 39 篇 beijing advanced...
  • 39 篇 school of cyber ...
  • 37 篇 school of comput...
  • 37 篇 university of ch...
  • 34 篇 college of compu...
  • 31 篇 nanyang technolo...
  • 31 篇 school of big da...
  • 29 篇 national enginee...
  • 28 篇 college of compu...
  • 28 篇 hubei key labora...
  • 27 篇 peng cheng labor...
  • 27 篇 hubei engineerin...
  • 26 篇 services computi...
  • 26 篇 school of comput...
  • 25 篇 cluster and grid...

作者

  • 75 篇 niyato dusit
  • 31 篇 jin hai
  • 24 篇 shen linlin
  • 23 篇 sun geng
  • 22 篇 hai jin
  • 20 篇 hu shengshan
  • 20 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 xu qianqian
  • 16 篇 liu bin
  • 15 篇 zhang leo yu
  • 15 篇 li jiahui
  • 15 篇 liu ya-feng
  • 14 篇 huang sheng
  • 14 篇 zhou ziqi
  • 13 篇 cao xiaochun
  • 13 篇 du hongyang
  • 13 篇 li minghui
  • 12 篇 wang jinbao
  • 12 篇 wang lihui

语言

  • 1,241 篇 英文
  • 403 篇 其他
  • 34 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Visual Computing"
1664 条 记 录,以下是991-1000 订阅
排序:
Improved publicly verifiable auditing protocol for cloud storage
Improved publicly verifiable auditing protocol for cloud sto...
收藏 引用
作者: Zhang, Jindan Lin, Chuan Ogiela, Urszula Nedjah, Nadia Sangaiah, Arun K. Wang, Xuan Department of Electronic Information Xianyang Vocational Technical College Xianyang China Guizhou Provincial Key Laboratory of Public Big Data GuiZhou University Guiyang China Pedagogical University of Krakow Krakow Poland Department of Electronics Engineering and Telecommunications at the Faculty of Engineering State University of Rio de Janeiro Rio de Janeiro Brazil School of Computing Science and Engineering Vellore Institute of Technology Vellore India
Outsourcing data to cloud servers is a popular service for data owners, however, how to check the integrity and freshness of the outsourced data is very challenge. Recently, Jin et al. proposed a cloud auditing protoc... 详细信息
来源: 评论
Semantic-Enhanced Attention Network for Image-Text Matching
Semantic-Enhanced Attention Network for Image-Text Matching
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Huanxiao Zhou Yushui Geng Jing Zhao Xishan Ma Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Graduate School Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Image-text matching is an important task in cross-modal information processing, which consists of evaluating the similarity between images and text. However, the data of the two modalities have different distributions... 详细信息
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qing Liu Qian Gao Jun Fan Zhiqiang Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China China Telecom Digital Intelligence Techonology Co Ltd Jinan China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
Generative AI for Deep Reinforcement Learning: Framework, Analysis, and Use Cases
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Geng Xie, Wenwen Niyato, Dusit Mei, Fang Kang, Jiawen Du, Hongyang Mao, Shiwen College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore School of Automation Guangdong University of Technology Guangzhou510006 China Department of Electrical and Electronic Engineering The University of Hong Kong 999077 Hong Kong Department of Electrical and Computer Engineering Auburn University Auburn36830 United States
As a form of artificial intelligence (AI) technology based on interactive learning, deep reinforcement learning (DRL) has been widely applied across various fields and has achieved remarkable accomplishments. However,... 详细信息
来源: 评论
Optimization for Task Offloading and Downloading in UAV-Assisted MEC Systems with Aerial to Aerial Collaboration
Optimization for Task Offloading and Downloading in UAV-Assi...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Jiawei Jiang Xiang Tian Yubing Han Chunyu Hu Bin Feng Jiguo Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Information Science and Technology Taishan University Taian China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Big Data Institute Qilu University of Technology Jinan China
Owing to the easy deployment and mobile flexibility, Unmanned Aerial Vehicle (UAV) assisted Mobile Edge computing (MEC) has been deemed as one potential technology for handling the computation-intensive tasks at termi... 详细信息
来源: 评论
MagLive: Robust Voice Liveness Detection on Smartphones Using Magnetic Pattern Changes
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Xiping Chen, Jing Wu, Cong He, Kun Xu, Haozhe Feng, Yebo Du, Ruiying Chen, Xianhao Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Rizhao Institute of Information Technology Wuhan University Rizhao276800 China School of Computer Science and Engineering Nanyang Technological University Singapore Collaborative Innovation Center of Geospatial Technology Wuhan430079 China The Department of Electrical and Electronic Engineering HKU Musketeers Foundation Institute of Data Science University of Hong Kong Pok Fu Lam Hong Kong
Voice authentication has been widely used on smartphones. However, it remains vulnerable to spoofing attacks, where the attacker replays recorded voice samples from authentic humans using loudspeakers to bypass the vo... 详细信息
来源: 评论
Hierarchical Text Classification Method Driven by Dynamic Hierarchical Fusion and Prompt Embedding
Hierarchical Text Classification Method Driven by Dynamic Hi...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yiyun Xing Kaili Zhou Jianqiang Zhang Gongpeng Song Qin Lu Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Computer Science and Technology Shandong Engineering Research Center of Big Data Applied Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Hierarchical Text Classification, as a critical task in natural language processing, has broad applications in scenarios with complex label structures and limited samples. However, existing methods still face challeng... 详细信息
来源: 评论
Source-free domain adaptation via avatar prototype generation and adaptation
arXiv
收藏 引用
arXiv 2021年
作者: Qiu, Zhen Zhang, Yifan Lin, Hongbin Niu, Shuaicheng Liu, Yanxia Du, Qing Tan, Mingkui School of Software Engineering South China University of Technology School of Computing National University of Singapore Singapore Key Laboratory of Big Data and Intelligent Robot Ministry of Education Pazhou Laboratory
We study a practical domain adaptation task, called source-free unsupervised domain adaptation (UDA) problem, in which we cannot access source domain data due to data privacy issues but only a pre-trained source model... 详细信息
来源: 评论
Normal Distribution Function on Descriptor Extraction  11th
Normal Distribution Function on Descriptor Extraction
收藏 引用
11th International Conference on Image and Graphics, ICIG 2021
作者: Yin, Jianhua Liu, Cong Jiang, Jun Wen, Jie Yang, Lihang Zhu, Shilong School of Computer Science and Technology Harbin Institute of Technology Shenzhen518055 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518055 China Peng Cheng Laboratory Shenzhen518055 China Shenzhen Key Laboratory of Visual Object Detection and Recognition Harbin Institute of Technology Shenzhen518055 China College of Big Data and Information Engineering Guizhou University Guizhou Guiyang550025 China
The triplet-loss function is widely used in fields of descriptor extraction in recent years and owing to its good performance in various databases. However, some recent works make less effort on the relationship of ad... 详细信息
来源: 评论
Multimodal Knowledge Graph Completion Method Based on Integrated Modality Adversarial Training and Relation-Enhanced Attention Mechanism
Multimodal Knowledge Graph Completion Method Based on Integr...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Ruijia Zhang Zheng Dong Jianqiang Zhang Gongpeng Song Qin Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Negative sampling (NS) is widely used in knowledge graph completion (KGC) to generate negative triples for contrastive learning during training. However, existing NS methods are not suitable when multimodal informatio... 详细信息
来源: 评论