咨询与建议

限定检索结果

文献类型

  • 930 篇 期刊文献
  • 651 篇 会议
  • 1 册 图书

馆藏范围

  • 1,582 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,096 篇 工学
    • 783 篇 计算机科学与技术...
    • 663 篇 软件工程
    • 297 篇 信息与通信工程
    • 209 篇 电气工程
    • 153 篇 生物工程
    • 119 篇 控制科学与工程
    • 108 篇 生物医学工程(可授...
    • 104 篇 光学工程
    • 98 篇 电子科学与技术(可...
    • 61 篇 机械工程
    • 50 篇 化学工程与技术
    • 48 篇 交通运输工程
    • 44 篇 仪器科学与技术
    • 38 篇 网络空间安全
    • 32 篇 安全科学与工程
    • 31 篇 建筑学
    • 30 篇 土木工程
  • 589 篇 理学
    • 323 篇 数学
    • 171 篇 生物学
    • 122 篇 物理学
    • 111 篇 统计学(可授理学、...
    • 56 篇 化学
    • 46 篇 系统科学
  • 308 篇 管理学
    • 176 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 100 篇 医学
    • 92 篇 临床医学
    • 79 篇 基础医学(可授医学...
    • 57 篇 药学(可授医学、理...
  • 43 篇 法学
    • 34 篇 社会学
  • 25 篇 经济学
  • 19 篇 农学
  • 13 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 81 篇 semantics
  • 61 篇 feature extracti...
  • 45 篇 deep learning
  • 45 篇 training
  • 33 篇 computational mo...
  • 32 篇 data models
  • 31 篇 accuracy
  • 29 篇 convolution
  • 28 篇 federated learni...
  • 25 篇 machine learning
  • 24 篇 predictive model...
  • 23 篇 data mining
  • 23 篇 contrastive lear...
  • 21 篇 deep neural netw...
  • 20 篇 image segmentati...
  • 20 篇 neural networks
  • 19 篇 visualization
  • 18 篇 codes
  • 18 篇 robustness
  • 17 篇 graph neural net...

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 44 篇 college of compu...
  • 44 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 beijing advanced...
  • 36 篇 school of cyber ...
  • 36 篇 college of compu...
  • 35 篇 nanyang technolo...
  • 35 篇 school of comput...
  • 34 篇 university of ch...
  • 28 篇 school of big da...
  • 27 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 26 篇 national enginee...
  • 25 篇 hubei engineerin...
  • 24 篇 school of comput...
  • 23 篇 services computi...
  • 23 篇 cluster and grid...
  • 21 篇 college of compu...

作者

  • 74 篇 niyato dusit
  • 31 篇 jin hai
  • 23 篇 sun geng
  • 21 篇 hai jin
  • 19 篇 shen linlin
  • 19 篇 wang jiacheng
  • 18 篇 hu shengshan
  • 17 篇 huang qingming
  • 16 篇 li jiahui
  • 16 篇 liu ya-feng
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 14 篇 huang sheng
  • 14 篇 zhang leo yu
  • 13 篇 chen yanping
  • 13 篇 cao xiaochun
  • 13 篇 du hongyang
  • 13 篇 li minghui
  • 12 篇 qin yongbin
  • 12 篇 zhou ziqi

语言

  • 1,434 篇 英文
  • 127 篇 其他
  • 34 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Visual Computing"
1582 条 记 录,以下是441-450 订阅
排序:
Dual attention mechanism object tracking algorithm based on Fully-convolutional Siamese network
Dual attention mechanism object tracking algorithm based on ...
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Ma, Sugang Zhang, Zixian Zhang, Lei Chen, Yanping Yang, Xiaobao Pu, Lei Hou, Zhiqiang Xi'an University of Posts and Telecommunications School of Computer Science and Technology Shaanxi Xi'an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China School of Information and Navigation Air Force Engineering University Shaanxi Xi'an710077 China School of Information Engineering Chang'an University Shaanxi Xi'an710064 China
In an effort to the problem of insufficient tracking performance of the Fully-convolutional Siamese network (SiamFC) in complex scenarios, a dual attention mechanism object tracking algorithm based on the Fully-convol... 详细信息
来源: 评论
Communication Encryption Scheme of 5G Power Trading Private Network Based on Dynamic key  2
Communication Encryption Scheme of 5G Power Trading Private ...
收藏 引用
2nd Asia Conference on Electrical, Power and Computer engineering, EPCE 2023
作者: Zhou, Rui Song, Yiyang Xu, Ying Harbin Institute of Technology Electrical Engineering and Automation School Harbin China Guangdong Power Exchange Center Information Data Department Guangzhou China Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
Security has been the primary concern for the 5G power trading private network, which involves a large amount of power trading information. The communication must be encrypted to prevent the leakage of important infor... 详细信息
来源: 评论
A Three-party Repeated Game Model for data Privacy in Mobile Edge Crowdsensing of IoT  13
A Three-party Repeated Game Model for Data Privacy in Mobile...
收藏 引用
13th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2020
作者: Zhao, Mingfeng Chen, Lei Xiong, Jinbo Tian, Youliang Fujian Provincial Key Laboratory of Network Security and Cryptology College of Mathematics and Informatics Fujian Normal University Fuzhou350117 China College of Engineering and Computing Georgia Southern University GA30458 United States State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
The low request response delay of mobile edge crowdsensing (MECS) paradigm allows quick interactions among entities in practical scenarios. However, there often exist dishonest behaviors in such interactions, and the ... 详细信息
来源: 评论
Thematic Event Extraction Based on Event-Related Sentence Detection  1
Thematic Event Extraction Based on Event-Related Sentence De...
收藏 引用
1st IEEE International Conference on Medical Artificial Intelligence, MedAI 2023
作者: Zhang, Xing Guo, Yucan Jin, Xiaolong Liang, Haozhe Guan, Saiping School of Computer Science and Technology University of Chinese Academy of Sciences China Institute of Computing Technology Chinese Academy of Sciences Cas Key Laboratory of Network Data Science and Technology China Institute of Systems Engineering Academy of Military Science Australia
Existing works in event extraction typically extract event arguments within the sentence scope. However, besides the sentence level, events may also be naturally presented at the document level. A document-level event... 详细信息
来源: 评论
Parallel generated method of transcriptional regulatory networks
Parallel generated method of transcriptional regulatory netw...
收藏 引用
作者: Liu, Shuai Ta, Na Lu, Mengye Liu, Gaocheng Bai, Weiling Li, Wenhui College of Computer Science Inner Mongolia University Hohhot010012 China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot010012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China College of Computer Science and Technology Jilin University Changchun130012 China
Generated method of transcriptional regulatory networks remains an important research in biology. Many approaches have been proposed to construct transcriptional regulatory networks. However, with the increase of ChIP... 详细信息
来源: 评论
Collusion Resistant Identity-based Proxy Re-encryption Scheme on Lattice  6
Collusion Resistant Identity-based Proxy Re-encryption Schem...
收藏 引用
6th International Conference on Computer Information Science and Application Technology, CISAT 2023
作者: Deng, Xiaohong Xie, Hua Xiong, Weizhi School of Electronics and Information Engineering Gannan University of Science and Technology Ganzhou341000 China College of Information Science Jiangxi University of Science and Technology Ganzhou341000 China Key Laboratory of Cloud Computing and Big Data Ganzhou341000 China
Proxy re-encryption plays an important role for data security in cloud computing and big data, but the traditional reencryption scheme based on the classical number theory problem cannot resist quantum attack, and the... 详细信息
来源: 评论
A holistic stream partitioning algorithm for distributed stream processing systems  20
A holistic stream partitioning algorithm for distributed str...
收藏 引用
20th International Conference on Parallel and Distributed computing, Applications and Technologies, PDCAT 2019
作者: Li, Kejian Liu, Gang Lu, Minhua Guangdong Province Key Laboratory of Popular High Performance Computers Guangdong Province Engineering Center of China-made High Performance Data Computing System College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China School of Biomedical Engineering Shenzhen University Shenzhen518060 China
The performances of modern distributed stream processing systems are critically affected by the distribution of the load across workers. Skewed data streams in real world are very common and pose a great challenge to ... 详细信息
来源: 评论
Research on Star/Galaxy Classification Based on Stacking Ensemble Learning
收藏 引用
Chinese Astronomy and Astrophysics 2020年 第3期44卷 345-355页
作者: Chao, L.I. Wen-hui, ZHANG Ran, L.I. Jun-yi, W.A.N.G. Ji-ming, L.I.N. College of Information and Communication Engineering Guilin University of Electronic Technology Guilin 541004 Key Laboratory of Education Ministry for Cognitive Radio and Information Processing Guilin University of Electronic Technology Guilin 541004 Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin 541004 Guangxi College and University Key Laboratory for Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin 541004 Guangxi Key Laboratory for Wireless Wideband Communication and Signal Processing Guilin University of Electronic Technology Guilin 541004 Guangxi College and University Key Laboratory for Satellite Navigation and Position Sensing Guilin 541004
Machine learning has achieved great success in many areas today, but the forecast effect of machine learning often depends on the specific problem. An ensemble learning forecasts results by combining multiple base cla... 详细信息
来源: 评论
Feature Rotation Invariance Learning for Point Cloud Analysis  10
Feature Rotation Invariance Learning for Point Cloud Analysi...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Shi, Lu Cao, Qi Zhang, Guoqing Yi, Jin Huang, Yansen Cen, Yigang Beijing Jiaotong University State Key Laboratory of Advanced Rail Autonomous Operation The School of Computer Science and Technology Visual Intellgence +X International Cooperation Joint Laboratory of Moe Beijing100044 China University of Glasgow The School of Computing Science 567739 Singapore Beijing Jiaotong University With the Key Laboratory of Big Data & Artificial Intelligence in Transportation Ministry of Education The State Key Laboratory of Advanced Rail Autonomous Operation The School of Computer and Information Technology Beijing100044 China Guizhou University Guizhou Lianjian Civil Engineering Quality Testing Monitoring Center Co. Ltd The College of Civil Engineering Guizhou550025 China
While deep learning has significantly advanced point cloud analysis, extracting effective features from their disordered structure remains challenging. Existing approaches often rely on complex network architectures o... 详细信息
来源: 评论
An Advanced Quantum-Resistant Signature Scheme for Cloud Based on Eisenstein Ring
收藏 引用
Computers, Materials & Continua 2018年 第7期56卷 19-34页
作者: Faguo Wu Xiao Zhang Wang Yao Zhiming Zheng Lipeng Xiang Wanpeng Li Key Laboratory of Mathematics Informatics and Behavioral SemanticsMinistry of EducationSchool of Mathematics and Systems ScienceBeihang UniversityBeijing100191China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang UniversityBeijing100191China The Fifth Electronics Research Institute of Ministry of Industry and Information Technology Guangzhou510610China Department of Electrical and Electronic Engineering City University of LondonUK
Signature,widely used in cloud environment,describes the work as readily identifying its *** existing signature schemes in the literature mostly rely on the Hardness assumption which can be easily solved by quantum **... 详细信息
来源: 评论