咨询与建议

限定检索结果

文献类型

  • 930 篇 期刊文献
  • 651 篇 会议
  • 1 册 图书

馆藏范围

  • 1,582 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,096 篇 工学
    • 783 篇 计算机科学与技术...
    • 663 篇 软件工程
    • 297 篇 信息与通信工程
    • 209 篇 电气工程
    • 153 篇 生物工程
    • 119 篇 控制科学与工程
    • 108 篇 生物医学工程(可授...
    • 104 篇 光学工程
    • 98 篇 电子科学与技术(可...
    • 61 篇 机械工程
    • 50 篇 化学工程与技术
    • 48 篇 交通运输工程
    • 44 篇 仪器科学与技术
    • 38 篇 网络空间安全
    • 32 篇 安全科学与工程
    • 31 篇 建筑学
    • 30 篇 土木工程
  • 589 篇 理学
    • 323 篇 数学
    • 171 篇 生物学
    • 122 篇 物理学
    • 111 篇 统计学(可授理学、...
    • 56 篇 化学
    • 46 篇 系统科学
  • 308 篇 管理学
    • 176 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 100 篇 医学
    • 92 篇 临床医学
    • 79 篇 基础医学(可授医学...
    • 57 篇 药学(可授医学、理...
  • 43 篇 法学
    • 34 篇 社会学
  • 25 篇 经济学
  • 19 篇 农学
  • 13 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 81 篇 semantics
  • 61 篇 feature extracti...
  • 45 篇 deep learning
  • 45 篇 training
  • 33 篇 computational mo...
  • 32 篇 data models
  • 31 篇 accuracy
  • 29 篇 convolution
  • 28 篇 federated learni...
  • 25 篇 machine learning
  • 24 篇 predictive model...
  • 23 篇 data mining
  • 23 篇 contrastive lear...
  • 21 篇 deep neural netw...
  • 20 篇 image segmentati...
  • 20 篇 neural networks
  • 19 篇 visualization
  • 18 篇 codes
  • 18 篇 robustness
  • 17 篇 graph neural net...

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 44 篇 college of compu...
  • 44 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 beijing advanced...
  • 36 篇 school of cyber ...
  • 36 篇 college of compu...
  • 35 篇 nanyang technolo...
  • 35 篇 school of comput...
  • 34 篇 university of ch...
  • 28 篇 school of big da...
  • 27 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 26 篇 national enginee...
  • 25 篇 hubei engineerin...
  • 24 篇 school of comput...
  • 23 篇 services computi...
  • 23 篇 cluster and grid...
  • 21 篇 college of compu...

作者

  • 74 篇 niyato dusit
  • 31 篇 jin hai
  • 23 篇 sun geng
  • 21 篇 hai jin
  • 19 篇 shen linlin
  • 19 篇 wang jiacheng
  • 18 篇 hu shengshan
  • 17 篇 huang qingming
  • 16 篇 li jiahui
  • 16 篇 liu ya-feng
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 14 篇 huang sheng
  • 14 篇 zhang leo yu
  • 13 篇 chen yanping
  • 13 篇 cao xiaochun
  • 13 篇 du hongyang
  • 13 篇 li minghui
  • 12 篇 qin yongbin
  • 12 篇 zhou ziqi

语言

  • 1,434 篇 英文
  • 127 篇 其他
  • 34 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Visual Computing"
1582 条 记 录,以下是41-50 订阅
排序:
MEFA-Net: A mask enhanced feature aggregation network for polyp segmentation
收藏 引用
Computers in Biology and Medicine 2025年 186卷 109601-109601页
作者: Ke, Xiao Chen, Guanhong Liu, Hao Guo, Wenzhong Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing College of Computer and Data Science Fuzhou University Fuzhou350116 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou350116 China
Accurate polyp segmentation is crucial for early diagnosis and treatment of colorectal cancer. This is a challenging task for three main reasons: (i) the problem of model overfitting and weak generalization due to the... 详细信息
来源: 评论
Task Prioritization in Multiagent Environments: A Novel Approach Using Nash Q-Learning
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Li, Kexin Hu, Yu Wang, Jielei Li, Lin Zhang, Shuyuan Luo, Guangchun Laboratory of Intelligent Collaborative Computing University of Electronic Science and Technology of China China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu611731 China College of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
—With the rapid proliferation of smartphones and various terminal devices, edge computing has gained increasing importance in overcoming computational limitations and enhancing service quality through task offloading... 详细信息
来源: 评论
SRv6-INT Enabled Network Monitoring and Measurement: Toward High-Yield Network Observability for Digital Twin  3rd
SRv6-INT Enabled Network Monitoring and Measurement: Toward...
收藏 引用
3rd International Conference on Machine Learning, Cloud computing and Intelligent Mining, MLCCIM 2024
作者: Zhang, Xu Feng, Chuan Han, Pengchao Liu, Wei Gong, Xiaoxue Zhang, Qiupei Guo, Lei School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China School of Information Engineering Guangdong University of Technology Guangzhou510006 China
Network monitoring and measurement is an important part of realizing the network digital twin. However, it introduces the problem of high cost when obtaining the status data of physical networks. Therefore, to efficie... 详细信息
来源: 评论
Mamba in Speech: Towards an Alternative to Self-Attention
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 1933-1948页
作者: Xiangyu Zhang Qiquan Zhang Hexin Liu Tianyi Xiao Xinyuan Qian Beena Ahmed Eliathamby Ambikairajah Haizhou Li Julien Epps School of Electrical Engineering and Telecommunications The University of New South Wales (UNSW) Sydney NSW Australia College of Computing and Data Science Nanyang Technological University Singapore School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China Guangdong Provincial Key Laboratory of Big Data Computing The Chinese University of Hong Kong (Shenzhen) Shenzhen China Shenzhen Research Institute of Big Data Shenzhen China
Transformer and its derivatives have achieved success in diverse tasks across computer vision, natural language processing, and speech processing. To reduce the complexity of computations within the multi-head self-at... 详细信息
来源: 评论
Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channel-Based Mechanism
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4874-4889页
作者: Cao, Hangcheng Xu, Guowen He, Ziyang Shi, Shaoqing Xu, Shengmin Wu, Cong Ning, Jianting Hunan University College of Computer Science and Electronic Engineering Changsha410012 China City University of Hong Kong Department of Computer Science Hong Kong Hong Kong University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China Zhengzhou University School of Cyber Science and Engineering Zhengzhou450001 China Zhengzhou University International College Zhengzhou450001 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350007 China Nanyang Technological University College of Computing and Data Science Jurong West 639798 Singapore Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Macau Faculty of Data Science Macau China
Ample profits of GPU cryptojacking attract hackers to recklessly invade victims’ devices, for completing specific cryptocurrency mining tasks. Such malicious invasion undoubtedly obstructs normal device usage and was... 详细信息
来源: 评论
Learning with Open-world Noisy data via Class-independent Margin in Dual Representation Space
arXiv
收藏 引用
arXiv 2025年
作者: Pan, Linchao Gao, Can Zhou, Jie Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China
Learning with Noisy Labels (LNL) aims to improve the model generalization when facing data with noisy labels, and existing methods generally assume that noisy labels come from known classes, called closed-set noise. H... 详细信息
来源: 评论
Big-Moe: Bypassing Isolated Gating For Generalized Multimodal Face Anti-Spoofing
Big-Moe: Bypassing Isolated Gating For Generalized Multimoda...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yingjie Ma Zitong Yu Xun Lin Weicheng Xie Linlin Shen College of Computer Science and Software Engineering Shenzhen University Great Bay University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing
In the domain of facial recognition security, multimodal Face Anti-Spoofing (FAS) is essential for countering presentation attacks. However, existing technologies encounter challenges due to modality biases and imbala... 详细信息
来源: 评论
Location Privacy Preservation Crowdsensing With Federated Reinforcement Learning
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 1877-1894页
作者: You, Zhichao Dong, Xuewen Liu, Ximeng Gao, Sheng Wang, Yongzhi Shen, Yulong Xidian University School of Computer Science and Technology The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi'an710071 China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an710071 China Fuzhou University College of Computer and Data Science Fuzhou350025 China Central University of Finance and Economics School of Information Beijing102206 China California State Polytechnic University Pomona Department of Computer Information Systems PomonaCA91768 United States Xidian University School of Computer Science and Technology Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xi'an710071 China
Crowdsensing has become a popular method of sensing data collection while facing the problem of protecting participants' location privacy. Existing location-privacy crowdsensing mechanisms focus on static tasks an... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
Extracting High-order Connectivity of EEG-based Dynamic Functional Connectivity Networks for Diagnosis of Major Depressive Disorder  24
Extracting High-order Connectivity of EEG-based Dynamic Func...
收藏 引用
4th Asia-Pacific Artificial Intelligence and Big data Forum, AIBDF 2024
作者: Zhao, Feng Fan, Wenxuan Han, Zhongwei Chen, Hongyu School of Computer Science and Technology Shandong Technology and Business University Shandong Yantai China Yantai Key Laboratory of Big Data Modeling and Intelligent Computing Shandong Yantai China Immersion Technology and Evaluation Shandong Engineering Research Center Shandong Yantai China Information Engineering College Yantai Institute of Technology Shandong Yantai China Shandong Technology and Business University Shandong Yantai China
Functional connectivity networks (FCNs), particularly those utilizing the phase lag index (PLI) method, have been instrumental in elucidating the pathological features of Major Depressive Disorder (MDD) by assessing t... 详细信息
来源: 评论