咨询与建议

限定检索结果

文献类型

  • 914 篇 期刊文献
  • 659 篇 会议
  • 1 册 图书

馆藏范围

  • 1,574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,070 篇 工学
    • 766 篇 计算机科学与技术...
    • 653 篇 软件工程
    • 286 篇 信息与通信工程
    • 188 篇 电气工程
    • 153 篇 生物工程
    • 114 篇 控制科学与工程
    • 108 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 95 篇 电子科学与技术(可...
    • 60 篇 机械工程
    • 50 篇 化学工程与技术
    • 45 篇 交通运输工程
    • 44 篇 仪器科学与技术
    • 35 篇 网络空间安全
    • 30 篇 建筑学
    • 30 篇 安全科学与工程
    • 29 篇 土木工程
  • 580 篇 理学
    • 317 篇 数学
    • 170 篇 生物学
    • 119 篇 物理学
    • 110 篇 统计学(可授理学、...
    • 55 篇 化学
    • 46 篇 系统科学
  • 300 篇 管理学
    • 172 篇 管理科学与工程(可...
    • 141 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 99 篇 医学
    • 90 篇 临床医学
    • 78 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 42 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
  • 19 篇 农学
  • 13 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 80 篇 semantics
  • 61 篇 feature extracti...
  • 45 篇 training
  • 43 篇 deep learning
  • 32 篇 computational mo...
  • 32 篇 data models
  • 30 篇 accuracy
  • 28 篇 convolution
  • 28 篇 federated learni...
  • 25 篇 predictive model...
  • 25 篇 machine learning
  • 23 篇 data mining
  • 22 篇 contrastive lear...
  • 21 篇 deep neural netw...
  • 20 篇 image segmentati...
  • 20 篇 neural networks
  • 19 篇 graph neural net...
  • 19 篇 visualization
  • 18 篇 robustness
  • 17 篇 codes

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 43 篇 college of compu...
  • 41 篇 national enginee...
  • 39 篇 beijing advanced...
  • 37 篇 school of cyber ...
  • 36 篇 college of compu...
  • 35 篇 school of comput...
  • 33 篇 nanyang technolo...
  • 33 篇 university of ch...
  • 28 篇 school of big da...
  • 27 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 26 篇 national enginee...
  • 25 篇 hubei engineerin...
  • 24 篇 school of comput...
  • 23 篇 services computi...
  • 23 篇 cluster and grid...
  • 21 篇 college of compu...

作者

  • 68 篇 niyato dusit
  • 30 篇 jin hai
  • 22 篇 sun geng
  • 21 篇 hai jin
  • 19 篇 shen linlin
  • 18 篇 hu shengshan
  • 18 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 liu ya-feng
  • 16 篇 xu qianqian
  • 15 篇 li jiahui
  • 15 篇 liu bin
  • 14 篇 huang sheng
  • 14 篇 zhang leo yu
  • 13 篇 chen yanping
  • 13 篇 cao xiaochun
  • 13 篇 li minghui
  • 12 篇 yang yang
  • 12 篇 zhou ziqi
  • 12 篇 wang lihui

语言

  • 1,428 篇 英文
  • 125 篇 其他
  • 34 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Visual Computing"
1574 条 记 录,以下是421-430 订阅
排序:
Artificial intelligence for geoscience:Progress,challenges,and perspectives
收藏 引用
The Innovation 2024年 第5期5卷 136-160,135页
作者: Tianjie Zhao Sheng Wang Chaojun Ouyang Min Chen Chenying Liu Jin Zhang Long Yu Fei Wang Yong Xie Jun Li Fang Wang Sabine Grunwald Bryan MWong Fan Zhang Zhen Qian Yongjun Xu Chengqing Yu Wei Han Tao Sun Zezhi Shao Tangwen Qian Zhao Chen Jiangyuan Zeng Huai Zhang Husi Letu Bing Zhang Li Wang Lei Luo Chong Shi Hongjun Su Hongsheng Zhang Shuai Yin Ni Huang Wei Zhao Nan Li Chaolei Zheng Yang Zhou Changping Huang Defeng Feng Qingsong Xu Yan Wu Danfeng Hong Zhenyu Wang Yinyi Lin Tangtang Zhang Prashant Kumar Antonio Plaza Jocelyn Chanussot Jiabao Zhang Jiancheng Shi Lizhe Wang Aerospace Information Research Institute Chinese Academy of SciencesBeijing 100094China School of Computer Science China University of GeosciencesWuhan 430078China State Key Laboratory of Mountain Hazards and Engineering Resilience Institute of Mountain Hazards and EnvironmentChinese Academy of SciencesChengdu 610299China Key Laboratory of Virtual Geographic Environment(Ministry of Education of PRC) Nanjing Normal UniversityNanjing 210023China Data Science in Earth Observation Technical University of Munich80333 MunichGermany The National Key Laboratory of Water Disaster Prevention Yangtze Institute for Conservation and DevelopmentHohai UniversityNanjing 210098China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China School of Geographical Sciences Nanjing University of Information Science and TechnologyNanjing 210044China State Key Laboratory of Soil and Sustainable Agriculture Institute of Soil ScienceChinese Academy of SciencesNanjing 210008China Soil Water and Ecosystem Sciences DepartmentUniversity of FloridaPO Box 110290GainesvilleFLUSA Materials Science Engineering Program Cooperating Faculty Member in the Department of Chemistry and Department of Physics Astronomy University of CaliforniaCaliforniaRiversideCA 92521USA Institute of Remote Sensing and Geographical Information System School of Earth and Space SciencesPeking UniversityBeijing 100871China Key Laboratory of Computational Geodynamics University of Chinese Academy of SciencesBeijing 100049China International Research Center of Big Data for Sustainable Development Goals Beijing 100094China College of Geography and Remote Sensing Hohai UniversityNanjing 211100China Department of Geography The University of Hong KongHong Kong 999077SARChina Jiangsu Key Laboratory of Atmospheric Environment Monitoring and Pollution Control Nanjing 210044China School of Environmental Science and Engineering Nanjing University of Information Science&TechnologyNanjing 210044China Collaborative Inno
This paper explores the evolution of geoscientific inquiry,tracing the progression from traditional physics-based models to modern data-driven approaches facilitated by significant advancements in artificial intellige... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论
High-Level Synthesis for Microfluidic Biochips Considering Actual Volume Management and Channel Storage
High-Level Synthesis for Microfluidic Biochips Considering A...
收藏 引用
IEEE International Symposium on Quality Electronic Design
作者: Zhengyang Chen Yuhan Zhu Zhen Chen Zhisheng Chen Genggeng Liu College of Computer and Data Science Fuzhou University Fuzhou China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing (Fuzhou University) Fuzhou China School of Informatics Xiamen University Xiamen China
In recent years, microfluidic biochips have been widely applied in various fields of human society. The emergence of distributed channel-storage architecture enables fluid to be directly cached within the flow channel... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
DNN Task Assignment in UAV Networks: A Generative AI Enhanced Multi-Agent Reinforcement Learning Approach
arXiv
收藏 引用
arXiv 2024年
作者: Tang, Xin Chen, Qian Weng, Wenjie Liao, Binhan Wang, Jiacheng Cao, Xianbin Li, Xiaohuan Guangxi University Key Laboratory of Intelligent Networking and Scenario System School of Information and Communication Guilin University of Electronic Technology Guilin541004 China The College of Computing and Data Science Nanyang Technological University 639798 Singapore School of Architecture and Transportation Engineering Guilin University of Electronic Technology Guilin541004 China National Engineering Laboratory for Comprehensive Transportation Big Data Application Technology Guangxi Nanning530001 China College of Computing and Data Science Nanyang Technological University 639798 Singapore School of Electronic and Information Engineering The Key Laboratory of Advanced Technology of Near Space Information System Ministry of Industry and Information Technology of China Beihang University Beijing100191 China
Unmanned Aerial Vehicles (UAVs) possess high mobility and flexible deployment capabilities, prompting the development of UAVs for various application scenarios within the Internet of Things (IoT). The unique capabilit... 详细信息
来源: 评论
Gradient-Guided Test Case Generation for Image Classification Software
Gradient-Guided Test Case Generation for Image Classificatio...
收藏 引用
IEEE Annual International Computer Software and Applications Conference (COMPSAC)
作者: Shunhui Ji Yunhe Li Hai Dong Mingxuan Xiao Pengcheng Zhang Mengyuan Zhang Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China College of Computer Science and Software Engineering Hohai University Nanjing China School of Computing Technologies RMIT University Melbourne Australia
The widespread use of deep neural networks (DNNs) in image classification sofwares underlines the importance of the robustness. Researchers have proposed sparse adversarial attack methods for generating test cases, wh... 详细信息
来源: 评论
Audio Steganography Based Backdoor Attack for Speech Recognition Software
Audio Steganography Based Backdoor Attack for Speech Recogni...
收藏 引用
IEEE Annual International Computer Software and Applications Conference (COMPSAC)
作者: Mengyuan Zhang Shunhui Ji Hanbo Cai Hai Dong Pengcheng Zhang Yunhe Li Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China College of Computer Science and Software Engineering Hohai University Nanjing China School of Computing Technologies RMIT University Melbourne Australia
With the growing prevalence of deep learning in the speech area, speech recognition, voice control, and related applications have become integral parts of people's lives. However, the rise of malicious third-party... 详细信息
来源: 评论
ABXI: Invariant Interest Adaptation for Task-Guided Cross-Domain Sequential Recommendation
arXiv
收藏 引用
arXiv 2025年
作者: Bian, Qingtian Vinícius de Carvalho, Marcus Li, Tieying Xu, Jiaxing Fang, Hui Ke, Yiping College of Computing and Data Science Nanyang Technological University Singapore School of Computer Science and Engineering Northeastern University China Research Institute for Interdisciplinary Sciences Key Laboratory of Interdisciplinary Research of Computation and Economics Shanghai University of Finance and Economics Shanghai China
Cross-Domain Sequential Recommendation (CDSR) has recently gained attention for countering data sparsity by transferring knowledge across domains. A common approach merges domain-specific sequences into cross-domain s... 详细信息
来源: 评论